Company networks in Tennessee now have prompt and affordable online technical support from Progent's qualified network security consultants to assist with critical security problems. The cost is affordable, charges are by the minute, sign-up is fast, and support is world class. Progent also provides help for long-term engagements that demand the knowledge of seasoned security consultants with high-level security certifications.

If your Tennessee office is situated away from more populated metropolitan areas including Memphis, Nashville, Knoxville, or Chattanooga, the availability of nearby qualified network security professionals may be limited when you have an emergency. This can cause lost productivity for your business, upset clients, idle employees, and distracted executives. By contacting Progent's online services, you can get in touch with a certified security consultant ready to offer assistance whenever you require it to keep your information system operating and salvage your information.

Progent can help you at any level in your efforts to protect your network with support services that can range from network security assessments to developing a comprehensive security plan. Progent provides economical service to help businesses of all sizes to set up and manage safe networks powered by Windows and Cisco technology and that can include computers running UNIX, Linux, Sun Solaris, or Mac OS X platforms as well as BYOD users with Apple iOS handhelds or Google Android or Windows Phone smart phones and tablets.

Progent can also show you how to outsource spam blocking and protection from email-borne assaults. Email Guard is Progent's email filtering and encryption solution that uses the services and infrastructure of leading information security vendors to deliver centralized control and comprehensive protection for your email traffic. The powerful structure of Email Guard managed service combines cloud-based filtering with an on-premises gateway appliance to offer complete protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-borne malware. The cloud filter serves as a first line of defense and blocks most threats from reaching your security perimeter. This reduces your vulnerability to inbound threats and saves network bandwidth and storage. ProSight Email Guard's on-premises security gateway appliance adds a deeper level of inspection for incoming email. For outbound email, the onsite security gateway provides AV and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The onsite security gateway can also enable Exchange Server to monitor and safeguard internal email traffic that stays within your corporate firewall.

Progent's security experts are accessible remotely or in person to offer a variety of emergency or project-based IT security services such as:

If your network has an urgent requirement for computer security support, refer to Progent's Urgent Remote Technical Support.

Progent's support professionals offer world-class support in key fields of network protection including analysis, firewall and VPN expertise, and high-level security planning.

System Security Assessment
Progent's certified security consultants can assess the strength of your existing computer protection systems through comprehensive remote automated testing via advanced utilities and tested techniques. Progent's skill in administering this service saves you money and assures a detailed portrayal of system vulnerability. The knowledge your company gains can be used as the foundation of a network protection plan that can permit your network to operate dependably and respond quickly to future threats.

Automated Network Security Evaluation
Progent provides expertise in the application of security auditing packages including MBSA and GFI LANguard NSS for affordably running a set of automatic network testing checks to uncover potential security vulnerabilities. Progent has extensive experience with other network analysis tools including NMAP Port Scanner, AMAP Application Scanner, eEye, as well as tools like SolarWinds, Netcat, Socat, and Nikto. Progent can show you how to make sense of audit reports and react effectively.

Progent can help you build protection into your business processes, install auditing tools, plan and implement a protected network environment, and recommend procedures to maximize the safety of your IT system. Progent's security engineers are able to help you set up a firewall, design secure remote access to email and data, and install VPN. Find out more on Progent's network security audits.

Security Inventory Packages for Small Businesses
Progent offers two low-cost security inventory packages designed to allow small businesses to receive an impartial security assessment from an accredited security consultant. With Progent's External Security Inventory Checkup, a security engineer administers a comprehensive examination of your network from beyond your firewalled perimeter to determine possible risks in the security posture you expose to the outside world. With Progent's Internal Security Inventory Checkup, a security expert executes a network scan from a secure computer inside your firewall to uncover vulnerabilities to inside assaults. Both security inventory packages are configured and executed from a secured external location. The process is managed by an engineer who has earned top security credentials and who produces a report that details and analyzes the data collected by the scan and proposes practical remediation if appropriate.

Network Security Penetration Analysis Support Services
Stealth intrusion checking is an important part of any comprehensive network security strategy. Progentís security experts can perform extensive penetration checks without the knowledge of your organization's internal network support resources. Stealth penetration testing uncovers whether current security monitoring systems such as intrusion incident alerts and event log analysis are correctly set up and actively monitored. Find out more about Progent's stealth security penetration analysis consulting.

Firewall and Virtual Private Network Solutions
Progent's expertise in network security technology encompasses in-depth field work with leading firewalls and VPN products offered by a variety of vendors including Cisco, Microsoft, and CheckPoint. Progent can provide the support of engineers who have earned key industry accreditations including Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Security Appliances Configuration and Troubleshooting
The current ASA 5500-X Family Next-Generation Firewalls with Firepower Services offer significantly more bang for the buck than Cisco's previous PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 firewalls for all new installations. After Cisco's purchase of Sourcefire, the whole line of ASA 5500-X devices can be provisioned to enable Firepower Services, built on Sourcefire's Snort product, which is the world's most popular network intrusion protection system. Firepower services bring powerful new capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can assist your company to maintain your legacy PIX or Cisco ASA 5500 firewalls or upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist your organization to design, integrate, tune, manage and debug firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Read more information about ASA Firewalls with Firepower integration and debugging services.

Cisco Security and VPN Support Expertise
Cisco's security and remote access technology offer a comprehensive range of easy-to-administer security solutions to help safeguard your local and remote information system. Cisco's Virtual Private Network line features routers, firewalls, intrusion detection devices and VPN appliances. Progent's expert staff of consultants includes field-proven specialists with Cisco Certified Internetwork Expert and CCNP qualifications who can assist your business to select Cisco VPN, Cisco RADIUS Security, and additional Cisco security technologies that fit most closely with your company goals. Find out more details concerning Progent's Consulting Expertise for Cisco Security Technology and VPN Products.

Engineering Expertise for Additional Firewall and Virtual Private Network Solutions
Progent provides small and mid-size companies professional consulting for Intrusion Protection Systems and IPsec VPN products from leading firewall and Virtual Private Network security vendors including Check Point Software, Juniper Networks, and Symantec. Progent can help you design a detailed security strategy and select appropriate products from a variety of vendors to achieve your security objectives while sticking within your budget limits.

Progent's Fixed-price Managed Services for Information Assurance
Progent's low-cost ProSight portfolio of network monitoring and management services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance. Managed services offered by Progent include:
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering and email encryption service that uses the technology of top data security companies to deliver centralized management and world-class security for all your inbound and outbound email. The powerful structure of Email Guard integrates cloud-based filtering with a local security gateway device to provide advanced protection against spam, viruses, Denial of Service Attacks, DHAs, and other email-borne threats. The cloud filter acts as a first line of defense and blocks the vast majority of threats from reaching your security perimeter. This reduces your exposure to inbound threats and conserves system bandwidth and storage space. Email Guard's onsite gateway appliance provides a deeper layer of inspection for incoming email. For outgoing email, the onsite gateway offers anti-virus and anti-spam protection, DLP, and email encryption. The onsite security gateway can also help Microsoft Exchange Server to monitor and protect internal email traffic that originates and ends within your corporate firewall. For more information, visit Email Guard spam filtering and data leakage protection.

ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring is an endpoint protection (EPP) solution that utilizes next generation behavior-based machine learning tools to defend endpoints and physical and virtual servers against new malware attacks such as ransomware and file-less exploits, which routinely escape legacy signature-matching AV products. ProSight ASM safeguards on-premises and cloud resources and offers a unified platform to address the entire threat progression including protection, infiltration detection, mitigation, cleanup, and post-attack forensics. Key features include one-click rollback with Windows Volume Shadow Copy Service and real-time network-wide immunization against newly discovered threats. Read more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware defense.

ProSight Data Protection Services: Managed Backup and Recovery
ProSight Data Protection Services from Progent provide small and mid-sized businesses an affordable and fully managed solution for secure backup/disaster recovery. Available at a low monthly price, ProSight Data Protection Services automates and monitors your backup processes and enables fast restoration of critical data, apps and virtual machines that have become lost or damaged due to component failures, software bugs, natural disasters, human error, or malware attacks like ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, applications, system images, plus Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to a local storage device, or to both. Progent's cloud backup consultants can provide world-class support to set up ProSight Data Protection Services to to comply with regulatory requirements like HIPPA, FINRA, and PCI and, whenever needed, can help you to recover your business-critical data. Read more about ProSight DPS Managed Cloud Backup.

ProSight IT Asset Management: Infrastructure Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to create, maintain, find and protect data about your IT infrastructure, procedures, applications, and services. You can quickly locate passwords or serial numbers and be alerted automatically about impending expirations of SSL certificates ,domains or warranties. By cleaning up and managing your IT infrastructure documentation, you can save as much as half of time thrown away looking for vital information about your network. ProSight IT Asset Management includes a common location for holding and sharing all documents related to managing your network infrastructure such as standard operating procedures and How-To's. ProSight IT Asset Management also supports advanced automation for gathering and relating IT data. Whether youíre planning improvements, doing maintenance, or reacting to an emergency, ProSight IT Asset Management delivers the data you require as soon as you need it. Find out more details about Progent's ProSight IT Asset Management service.

Certified Security Consulting
Any company should develop a carefully thought out security strategy that includes both preventive procedures and response planning. The proactive strategy is a set of procedures that help to minimize security weaknesses. The post-attack plan helps your IT security engineers to evaluate the damage resulting from an attack, fix the damage, document the event, and get the IT network restored as rapidly as feasible.

Progent's certified IS security engineers are available to help your business to perform a complete risk evaluation and define a network security plan to establish security policies and controls to reduce ongoing assaults and threats.

CISM Qualified Information Security Consulting Services
The CISM organization defines the core capabilities and international standards of performance that information security professionals are required to learn. It gives executive management the assurance that consultants who have qualified for their CISM credential have the background and knowledge to deliver effective security management and support consulting. Progent can provide the services of CISM certified security professionals to help companies with:

  • Network Security Processes
  • Vulnerability Analysis
  • Information Security Program Management
  • IS Security Management
  • Response Planning
Find out more details concerning Progent's CISM Certified IS Security Support Expertise.

CISSP Qualified Security Consulting Support
CISSP certification recognizes expertise with a global standard for information security. The American National Standards Institute has granted certification recognition in the area of information security defined by ISO/IEC 17024. Progent offers the services of security consultants who have qualified for CISSP accreditation. Progent can provide a CISSP-certified professional to help your enterprise in a variety security fields such as:

  • Security Management Practices
  • Security Infrastructure and Paradigms
  • Access Management Solutions and Processes
  • Software Development Security
  • Secure Operations
  • Physical Security
  • Data Encryption Technology
  • Telecom, Network and WAN Security
  • Business Continuity Planning
Find out more details concerning Progent's CISSP Accredited IS Security Support Professionals.

ISSAP Qualified Secure Information System Architecture Consulting Support
Progent's ISSAP certified system architecture professionals are consultants who have been awarded ISSAP Certification as a result of thorough testing and significant work with information security design. The ISSAP certification indicates proven mastery in the most challenging demands of information security architecture bounded by the wider scope of IS security knowledge required for CISSP accreditation. Progent's ISSAP-qualified security consultants can assist your business with all aspects of secure network architecture such as.

  • Access Management Systems and Methodologies
  • Telecommunications and Network Infrastructure Protection
  • Data Encryption Options
  • Needs Evaluation and Security Guidelines
  • Business Continuity Planning and Disaster Recovery Planning
  • Physical Security
Learn additional information about Progent's ISSAP Qualified Secure Network Architecture Engineering Professionals.

CISA Qualified Network Security Auditing Engineering Support
The CISA credential is a recognized achievement that signifies expertise in IS security auditing. Certified by the American National Standards Institute, the CISA accreditation requires that consultants undergo a comprehensive test given by the ISACA international professional group. Progent's CISA-certified network security audit experts can help your company in the areas of:

  • IS Audit Process
  • Information Technology Enforcement
  • Systems and Infrastructure Lifecycle Planning
  • IT Service Delivery
  • Safeguarding Data Assets
  • Business Continuity Planning
Get the details concerning Progent's CISA Qualified Network Security Auditing Consulting Assistance.

CRISC Experts
The Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA in 2010 to verify a consultant's skills to plan, implement, and support information system controls to reduce risk. Progent offers the services of a CRISC-certified consultant to help your company to create and carry out a workplace continuity or disaster recovery plan based on leading practices promoted by CRISC and geared to match your company's risk appetite, business objectives, and budgetary guidelines. Progent's CRISC-qualified IT risk mitigation experts can provide a variety of risk identification services such as:

  • Collect information and study documentation to identify major risk scenarios
  • Inventory statutory, regulatory, and business requirements and organizational standards related to your network to determine their possible impact on your strategic objectives
  • Point out potential vulnerabilities for your operational workflows to assist in analyzing your corporate risk
  • Create a risk awareness program and provide seminars to make sure your stakeholders appreciate information system risk so they can assist with your risk management process
  • Connect identified risk scenarios to related business procedures to help determine risk responsibility
  • Validate risk appetite with your senior management and major stakeholders to make sure they match
Read additional details about Progent's Certified in Risk and Information Systems Control (CRISC) Experts.

GIAC Accredited Information System Security Consulting Assistance
GIAC (Global Information Assurance Certification) was established in 1999 to certify the knowledge of IT security engineers. GIAC's goal is to assure that a certified security consultant possesses the knowledge needed to provide support in key areas of network, data, and application security. GIAC accreditations are acknowledged by businesses and institutions around the world including and the U.S. NSA. Progent's GIAC network security audit consultants are available to assist your company in the areas of:

Read additional information concerning Progent's GIAC Information Assurance Expertise.

Get in Touch with a Progent Security Expert
To find out how you can contact a certified security engineer for online or onsite expertise in Tennessee, call 1-800-993-9400 or go to Online Network Help.














© 2002- 2018 Progent Corporation. All rights reserved.