Small business information networks in Georgia now have quick and economical online technical support from Progent's accredited security professionals to help with urgent security problems. The cost is competitive, billing is by the minute, sign-up is quick, and support is unbeatable. Progent also offers assistance for complex engagements that demand the knowledge of seasoned security engineers with top security credentials.

In case your Georgia office is away from larger urban areas like Atlanta, Augusta, Columbus, Savannah, or Athens, support from nearby certified security consultants could be problematic when you have a crisis. This can cause lost revenue for your business, upset customers, unproductive workers, and distracted management. By calling Progent's online services, you can get in touch with a certified security professional ready to provide assistance whenever you need it to keep your network running and recover your information.

Progent can help you in a variety of ways in your initiatives to guard your information system with services ranging from network security assessments to developing a company-wide security strategy. Progent offers affordable service to assist companies of any size to set up and manage safe networks powered by Microsoft Windows and Cisco products and that can include computers based on UNIX or Linux operating systems plus BYOD clients with Apple iOS handhelds or Google Android or Windows Phone smart phones and tablets.

Progent can also help you outsource spam filtering and defense against e-mail-based assaults. Email Guard is Progent's email security platform that uses the services and infrastructure of leading information security companies to provide web-based control and comprehensive protection for your email traffic. The powerful architecture of Email Guard managed service combines cloud-based filtering with a local security gateway device to provide complete defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. The Cloud Protection Layer acts as a first line of defense and blocks most threats from making it to your network firewall. This decreases your exposure to external threats and conserves system bandwidth and storage space. ProSight Email Guard's onsite gateway device provides a further level of inspection for incoming email. For outbound email, the local gateway provides anti-virus and anti-spam filtering, protection against data leaks, and encryption. The local gateway can also help Exchange Server to monitor and protect internal email traffic that originates and ends inside your security perimeter.

Progent's certified experts are accessible remotely or on premises to offer a range of emergency or project-based network security services such as:

  • Run extensive security evaluations
  • Recover rapidly after virus and worm attacks
  • Install hardware and software firewalls
  • Configure secure techniques for remote and mobile access
  • Install effective applications for automatic defense against viruses, spam and DHAs
  • Develop a company-wide security strategy with 24x7 monitoring
  • Provide outsourced Call Center Support
  • Help Create a practical data backup and recovery strategy based on Data Protection Manager automated backup capability
If your company has an emergency need for computer security support, refer to Progent's Emergency Online Network Support.

Progent's engineers can deliver advanced services in key areas of system protection that include security assessment, firewall/VPN support, and advanced security consulting.

System Assessment
Progent's expert security engineers can evaluate the effectiveness of your existing computer security systems through exhaustive remote automated testing based on advanced software tools and proven procedures. Progent's skill in administering this service saves you consulting fees and offers an accurate picture of system vulnerability. The knowledge your company is provided can be used as the foundation of a security strategy that will allow your network to operate dependably and react rapidly to future risks.

Automated Vulnerability Assessment
Progent provides expertise in the use of security analysis packages including Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard for economically performing a set of programmed system testing scans to identify potential security holes. Progent has extensive knowledge of other security auditing products such as NMAP Port Scanner, AMAP Application Scanner, eEye, as well as utilities like Metasploit, Netcat, Socat, and Nikto. Progent can show you how to understand testing reports and react effectively.

Progent can show you how to design security into your company processes, install scanning software, plan and deploy a secure network environment, and recommend procedures to optimize the safety of your IT system. Progent's security engineers are ready to show you how to configure a firewall, implement safe remote access to email and data, and install VPN. Find out more concerning Progent's automated security assessment.

Security Inventory Scanning Packages for Small Businesses
Progent offers two ultra-affordable security inventory bundles designed to enable small businesses to receive an objective network security assessment from a certified security engineer. With Progent's External Security Inventory Checkup, a security expert runs an extensive test of your IT infrastructure from beyond your company firewall to uncover potential risks in the security posture you present to the public. With Progent's Internal Security Inventory Scan, a certified security professional executes a network scan from a secure machine within your firewall to evaluate the risk to inside assaults. Both security inventory packages are set up and run from a protected external location. The process is managed by an engineer who has earned high-level security accreditations and who generates a report that details and analyzes the information collected by the security scan and proposes practical remediation if called for.

Network Intrusion Analysis Consulting
Stealth intrusion checking is a key part of any successful IT system security strategy. Progentís security experts can run extensive intrusion tests without the knowledge of your organization's internal network support resources. Unannounced penetration testing uncovers whether current security monitoring systems such as intrusion detection alerts and event log monitoring are correctly configured and consistently checked. Find out more concerning Progent's stealth penetration analysis consulting.

Firewall/VPN Support
Progent's background in network security solutions encompasses in-depth field work with leading firewalls and Virtual Private Network (VPN) technology from multiple vendors including Cisco, Microsoft, and Juniper. Progent offers the support of engineers with important industry accreditations including Cisco Certified Internetwork Expert (CCIE) and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Security Appliances Configuration and Debugging
The latest generation of ASA 5500-X Series of firewalls with Firepower Services provide significantly more bang for the buck than Cisco's previous PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX firewalls for new installations. Following Cisco's acquisition of Sourcefire, the entire line of Cisco ASA 5500-X firewalls can be provisioned to support Firepower Services, based on Sourcefire's Snort technology, which is the world's most popular network intrusion protection system (IPS). Firepower services bring powerful new features such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-qualified CCIE network experts can assist you to maintain your current PIX or Cisco ASA 5500 firewalls and upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises support for ASA 5500-X firewalls with Firepower Services and can help your organization to plan, configure, optimize, manage and debug firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services. Read more details about Cisco ASA Firewalls with Firepower integration and debugging services.

Cisco Security and Virtual Private Network Engineering Services
Cisco's network security and remote connection technology provide a complete range of easy-to-administer security solutions to help protect your local and remote information system. Cisco's Virtual Private Network product family features switches, firewalls, intrusion detection systems and Virtual Private Network concentrators. Progent's professional staff of consultants includes experienced specialists with Cisco Certified Internetwork Expert and Cisco Certified Network Professional certifications who can help your company to evaluate Cisco VPN, Cisco RADIUS Security, and additional Cisco security solutions that align best with your company goals. Read additional information about Progent's Engineering Services for Cisco Security Technology and Virtual Private Network Products.

Engineering Services for Additional Firewall and VPN Technology
Progent provides small and mid-size businesses professional support for Intrusion Protection Systems and IPsec VPN technology from leading firewall and VPN security vendors such as Check Point Software, Juniper Networks, and SonicWALL. Progent can show you how to create a detailed security strategy and choose appropriate technologies from a variety of vendors to support your security objectives while sticking within your spending limits.

Progent's Flat-rate Managed Services for Information Security
Progent offers a portfolio of affordable, set-price monthly services designed to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. Managed services offered by Progent include:
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's email security solution that uses the technology of leading data security vendors to provide centralized control and world-class security for your email traffic. The hybrid structure of Progent's Email Guard integrates a Cloud Protection Layer with an on-premises gateway device to provide complete protection against spam, viruses, Denial of Service Attacks, DHAs, and other email-based threats. The cloud filter serves as a first line of defense and blocks the vast majority of threats from making it to your network firewall. This decreases your exposure to external attacks and conserves network bandwidth and storage space. ProSight Email Guard's onsite security gateway appliance adds a further layer of inspection for inbound email. For outbound email, the on-premises gateway offers anti-virus and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The on-premises gateway can also help Exchange Server to monitor and protect internal email that stays within your security perimeter. Learn more about Progent's ProSight Email Guard Spam Filtering, Virus Blocking, Content Filtering and Data Loss Prevention.

ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection service that utilizes next generation behavior analysis tools to defend endpoint devices as well as servers and VMs against modern malware attacks like ransomware and file-less exploits, which routinely escape legacy signature-based anti-virus products. ProSight Active Security Monitoring protects local and cloud-based resources and provides a unified platform to manage the entire threat lifecycle including blocking, detection, mitigation, remediation, and forensics. Key capabilities include single-click rollback using Windows Volume Shadow Copy Service and real-time system-wide immunization against newly discovered attacks. Find out more about Progent's ProSight Active Security Monitoring Next-Generation Endpoint Protection and Ransomware Defense.

ProSight Data Protection Services: Managed Cloud Backup and Recovery
ProSight Data Protection Services offer small and medium-sized businesses an affordable end-to-end service for reliable backup/disaster recovery (BDR). Available at a low monthly rate, ProSight Data Protection Services automates and monitors your backup processes and allows fast recovery of vital data, applications and virtual machines that have become unavailable or corrupted as a result of hardware breakdowns, software bugs, disasters, human mistakes, or malware attacks like ransomware. ProSight DPS can help you back up, recover and restore files, folders, apps, system images, plus Microsoft Hyper-V and VMware images. Important data can be protected on the cloud, to an on-promises device, or mirrored to both. Progent's BDR specialists can provide advanced expertise to set up ProSight DPS to be compliant with regulatory requirements such as HIPPA, FINRA, and PCI and, when needed, can assist you to recover your business-critical data. Read more about ProSight Data Protection Services Managed Backup.

Certified Security Planning
Any business should have a thoroughly thought out security program that incorporates both proactive processes and response plans. The proactive plan is a set of steps intended to reduce vulnerabilities. The reactive strategy assists your company's network security personnel to evaluate the damage caused by an attack, repair the damage, document the event, and get the IT network restored as soon as possible.

Progent's expert information security consultants can to help your business to perform a complete risk evaluation and define a computer security plan to establish security processes and mechanisms to mitigate ongoing attacks and dangers.

CISM Accredited Security Engineering Assistance
The Certified Information Security Manager (CISM) committee describes the core capabilities and international standards of skill that IT security professionals are required to master. CISM gives executive management the confidence that those who have earned their CISM credential have the background and capability to deliver efficient security management and support consulting. Progent can provide the support of CISM certified security consultants to assist businesses with:

  • Network Security Governance
  • Vulnerability Management
  • Network Security Implementation Management
  • IS Security Management
  • Response Planning
Find out more details concerning Progent's CISM Certified Information Security Consulting Services.

CISSP Accredited Security Engineering Expertise
CISSP certification denotes mastery of a worldwide standard for network security. The American National Standards Institute has granted the CISSP credential recognition in the field of information protection defined by ISO/IEC 17024. Progent can provide access to of security consultants who have earned CISSP certification. Progent can provide a CISSP-certified expert to help your organization in a variety security areas including:

  • Security Administration Practices
  • Security Infrastructure and Models
  • Access Control Systems and Methodology
  • Applications Development Security
  • Operations Security
  • Site Security
  • Encryption/Decryption Mechanisms
  • Telecom, Network and WAN Security
  • Business Continuity Planning
Learn more information about Progent's CISSP Accredited IS Security Support Services.

ISSAP Accredited Secure IT Architecture Engineering Expertise
Progent's ISSAP qualified system architecture engineers are experts who have earned ISSAP Certification as a result of thorough examination and extensive work with network security design. The ISSAP credential represents demonstrated competence in the more complex demands of information security architecture within the broader scope of IS security expertise required for CISSP accreditation. Progent's ISSAP-certified security consultants can assist your business with all phases of architecture security such as.

  • Access Control Systems and Techniques
  • Phone System and Network Infrastructure Protection
  • Encryption/Decryption Solutions
  • Needs Analysis and Security Criteria
  • BCP and DRP
  • Physical Security
Learn more information concerning Progent's ISSAP Qualified Secure IT Architecture Support Expertise.

CISA Accredited Security Auditing Consulting Services
The Certified Information Systems Auditor credential is a globally recognized achievement that indicates mastery in IS security audit and control. Certified by ANSI, the CISA accreditation has candidates undergo an extensive test administered by the ISACA international professional association. Progent's CISA IS security audit engineers are available to assist your business in the areas of:

  • Information Systems Audit Services
  • Information Technology Administration
  • Network Assets and Infrastructure Planned Useful Life
  • IT Support
  • Safeguarding Data Assets
  • Disaster Recovery Preparedness
Learn the details about Progent's CISA Accredited Information System Security Auditing Engineering Support.

CRISC Consultants
The CRISC certification program was established by ISACA to verify a consultant's ability to design, deploy, and support information system control mechanisms to reduce network risk. Progent offers the expertise of a CRISC-certified engineer to help you to create and carry out a workplace continuity plan based on leading practices promoted by CRISC and geared to match your organization's risk appetite, business objectives, and budgetary guidelines. Progent's CRISC network risk management consultants offer a range of risk evaluation services such as:

  • Gather data and review documentation to identify significant risk scenarios
  • Inventory legal, regulatory, and contractual requirements and organizational policies related to your network to determine their potential impact on your strategic goals
  • Point out potential vulnerabilities for your operational processes to assist in analyzing your corporate risk
  • Develop a risk awareness initiative and conduct training to make sure your organization appreciate IS risk so they can assist with your risk control program
  • Connect key risk scenarios to related operational procedures to help assign risk responsibility
  • Determine risk tolerance with executive management and major stakeholders to ensure they align
Read additional information about Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Certified Security Consulting Support
Global Information Assurance Certification was established in 1999 to validate the skill of computer security experts. GIAC's mission is to verify that a certified security consultant possesses the knowledge necessary to provide support in critical categories of system, information, and application program security. GIAC accreditations are acknowledged by companies and institutions throughout the world including and the United States National Security Agency. Progent's GIAC-qualified IS security audit experts can assist your company in the areas of:

  • Auditing IT Infrastructure
  • Incident Handling
  • Intrusion Detection
  • Web-based Application Security
  • SIEM solutions
Learn more information about Progent's GIAC Information Assurance Expertise.

Contact a Progent Security Engineer
To find out how to contact a Progent security consultant for remote or onsite help in Georgia, call 1-800-993-9400 or visit Remote Network Support.














© 2002- 2018 Progent Corporation. All rights reserved.