Business computer networks in Tennessee can have quick and affordable remote technical support from Progent's accredited security experts to fix urgent security issues. Rates are affordable, billing is by the minute, engagement is quick, and support is world class. Progent also provides assistance for complex projects that demand the expertise of senior security consultants with high-level security certifications.

If your Tennessee small business is situated far from larger metropolitan neighborhoods such as Memphis, Nashville, Knoxville, or Chattanooga, help from nearby qualified network security experts could be limited during an emergency. This could mean lost income for your business, angry customers, idle employees, and defocused executives. By utilizing Progent, you have access to a qualified security engineer ready to offer help whenever you require it to keep your computer network operating and recover your information.

Progent can help you in your efforts to guard your network with support services ranging from security audits to developing a comprehensive security plan. Progent provides affordable service to help small and midsize companies to set up and manage safe IT environments based on Microsoft Windows and Cisco products and that may include computers based on UNIX or Linux platforms plus BYOD clients with Apple iOS iPhones and iPads or Android or Windows Phone handsets.

Progent can also assist you to outsource spam blocking and defense against email-borne security threats. Email Guard is Progent's email filtering and encryption solution that incorporates the technology of top information security companies to deliver centralized management and world-class security for your inbound and outbound email. The hybrid architecture of Email Guard combines cloud-based filtering with an on-premises gateway appliance to provide complete protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. ProSight Email Guard's cloud filter acts as a preliminary barricade and blocks the vast majority of threats from making it to your security perimeter. This reduces your vulnerability to external attacks and conserves network bandwidth and storage space. ProSight Email Guard's onsite gateway appliance provides a further level of inspection for incoming email. For outgoing email, the onsite gateway offers AV and anti-spam filtering, DLP, and encryption. The local security gateway can also help Microsoft Exchange Server to monitor and safeguard internal email traffic that originates and ends inside your corporate firewall.

Progent's security consultants are accessible remotely or on premises to offer a range of emergency or project-based computer security services such as:

If your network has an urgent need for computer security support, refer to Progent's Urgent Online Network Help.

Progent's security experts can deliver advanced support in key facets of computer protection that include security assessment, firewall and VPN solutions, and high-level security planning.

Security Audits
Progent's expert security consultants can assess the effectiveness of your existing computer security implementation through exhaustive remote automated testing based on advanced utilities and proven techniques. Progent's skill in this service saves your company consulting fees and assures an objective picture of system vulnerability. The knowledge your company gains can be used as the foundation of a security strategy that can permit your network to run safely and respond rapidly to new threats.

Automated Network Vulnerability Assessment
Progent offers expertise in the use of security testing utilities including MBSA and GFI LANguard for economically running a set of automatic network testing checks to uncover possible security weaknesses. Progent has extensive knowledge of additional network auditing products such as NMAP, AMAP, eEye, plus utilities such as Metasploit Framework, Netcat, Hydra, and Nikto. Progent can show you how to make sense of audit reports and react effectively.

Progent can show you how to design security into your business operations, configure scanning software, define and implement a secure network architecture, and recommend policies to maximize the safety of your network. Progent's security consultants are available to help you set up a firewall, design secure remote connectivity to email and business applications, and integrate VPN. Find out more on Progent's network security evaluation.

Security Inventory Service Packages for Small Companies
Progent offers two low-cost security inventory scanning bundles designed to enable small companies to receive an independent security evaluation from an accredited security engineer. With Progent's External Security Inventory Checkup, a security expert runs an extensive test of your network from outside your firewall to determine potential weaknesses in the security profile you expose to the public. With Progent's Internal Network Security Inventory Scan, a security expert runs a network scan from a secure computer within your firewall to evaluate your exposure to internal assaults. Both security inventory services are configured and executed from a protected external location. The project is managed by a consultant with high-level security credentials and who generates a document that details and analyzes the information collected by the scan and suggests practical remediation if appropriate.

Network Security Penetration Testing Support Services
Stealth intrusion checking is a key part of any comprehensive IT system security plan. Progentís security professionals can run thorough penetration tests without the knowledge of your organization's internal network support staff. Stealth penetration testing shows whether existing security monitoring tools such as intrusion incident alerts and event history monitoring are correctly configured and consistently monitored. Learn additional information about Progent's stealth security penetration analysis consulting.

Firewalls and VPN Expertise
Progent's expertise in security solutions includes extensive field work with leading firewalls and VPN products from multiple vendors including Cisco, Microsoft, and Symantec. Progent can provide the support of consultants with important networking accreditations such as Cisco Certified Internetwork Expert and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Security Appliances Integration and Debugging
The new ASA 5500-X Series Next-Generation Firewalls with Firepower Services offer substantially more value than Cisco's legacy firewalls and have replaced the ASA 5500 and PIX 500 security appliances for all new deployments. Since Cisco's acquisition of Sourcefire, the entire line of Cisco ASA 5500-X devices can be provisioned to support Firepower Services, built on Sourcefire's Snort technology, which is the market's most deployed intrusion protection system (IPS). Firepower services bring powerful new capabilities including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-certified CCIE network consultants can assist your company to manage your current PIX or Cisco ASA 5500 security appliances and migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist you to design, deploy, tune, manage and debug firewall solutions based on Cisco ASA 5500-X firewalls with Firepower Services. See additional information about Cisco ASA 5500-X Firewalls with Firepower integration and troubleshooting services.

Cisco Network Security and Virtual Private Network Support Expertise
Cisco's network security and offsite access technology offer a complete range of manageable security solutions to help safeguard your wired and wireless network infrastructure. Cisco's Virtual Private Network line features switches, firewalls, intrusion detection systems and Virtual Private Network concentrators. Progent's expert consulting staff includes experienced engineers with Cisco CCIE and CCNP certifications who are able to help your company to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security technologies that fit best with your business objectives. Find out additional information about Progent's Engineering Services for Cisco Security and Virtual Private Network Appliances.

Engineering Expertise for Other Firewall and VPN Technology
Progent offers small and mid-size businesses professional consulting for Intrusion Protection Systems and IPsec VPN solutions from leading firewall and VPN security vendors including WatchGuard, Juniper, and SonicWALL. Progent can show you how to design a detailed security plan and choose appropriate technologies from multiple suppliers to support your security goals while staying within your spending limits.

Progent's Low-Cost Managed Services for Information Assurance
Progent's low-cost ProSight series of managed services is designed to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. Managed services offered by Progent include:
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's email security platform that incorporates the technology of leading information security vendors to deliver centralized control and world-class security for all your email traffic. The powerful architecture of Progent's Email Guard integrates a Cloud Protection Layer with a local security gateway device to offer advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-based malware. The cloud filter acts as a first line of defense and blocks most unwanted email from reaching your network firewall. This reduces your vulnerability to external threats and saves network bandwidth and storage space. ProSight Email Guard's on-premises gateway appliance adds a further level of analysis for incoming email. For outbound email, the local gateway offers anti-virus and anti-spam filtering, DLP, and email encryption. The local gateway can also assist Microsoft Exchange Server to track and protect internal email that originates and ends inside your security perimeter. Find out more about Progent's ProSight Email Guard Spam Filtering, Virus Blocking, Email Content Filtering and Data Loss Protection.

ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that utilizes cutting edge behavior-based machine learning technology to defend endpoints and servers and VMs against new malware attacks like ransomware and file-less exploits, which routinely get by traditional signature-matching anti-virus tools. ProSight Active Security Monitoring safeguards on-premises and cloud resources and offers a single platform to manage the complete threat progression including blocking, infiltration detection, containment, remediation, and post-attack forensics. Key capabilities include single-click rollback with Windows VSS and real-time system-wide immunization against newly discovered attacks. Learn more about Progent's ProSight Active Security Monitoring (ASM) Endpoint Protection and Ransomware Recovery.

ProSight DPS: Managed Cloud Backup and Recovery
ProSight Data Protection Services offer small and mid-sized businesses a low cost and fully managed solution for reliable backup/disaster recovery. For a fixed monthly rate, ProSight Data Protection Services automates and monitors your backup processes and allows rapid restoration of critical data, applications and virtual machines that have become unavailable or damaged as a result of component breakdowns, software glitches, natural disasters, human mistakes, or malicious attacks like ransomware. ProSight DPS can help you back up, recover and restore files, folders, applications, system images, plus Microsoft Hyper-V and VMware images. Critical data can be backed up on the cloud, to a local storage device, or to both. Progent's cloud backup consultants can deliver world-class support to set up ProSight Data Protection Services to be compliant with government and industry regulatory requirements like HIPPA, FIRPA, PCI and Safe Harbor and, whenever needed, can assist you to restore your business-critical data. Find out more about ProSight DPS Managed Backup and Recovery.

Expert Security Design
Any business should develop a carefully considered security program that incorporates both preventive processes and response plans. The proactive strategy is a collection of mechanisms that help to minimize security weaknesses. The post-attack strategy assists your company's security engineers to assess the damage resulting from an attack, repair the damage, document the event, and get the IT network restored as soon as possible.

Progent's certified IT security engineers are available to assist your company to run a comprehensive vulnerability assessment and create a computer security plan to implement security processes and mechanisms to mitigate future attacks and dangers.

CISM Accredited Network Security Support Services
The Certified Information Security Manager (CISM) organization defines the basic capabilities and global standards of performance that information security managers are required to master. CISM gives executive management the confidence that those who have qualified for their CISM credential possess the background and knowledge to deliver effective security administration and support services. Progent can provide the support of CISM certified security consultants to help companies with:

  • IS Security Strategies
  • Vulnerability Management
  • IS Security Implementation Management
  • Network Security Administration
  • Response Management
Read additional details about Progent's CISM Certified IS Security Support Expertise.

CISSP Qualified Security Engineering Expertise
CISSP certification recognizes mastery of a global standard for data security. The American National Standards Institute has granted certification recognition in the field of data security stipulated by ISO/IEC 17024. Progent offers access to of security experts who have earned CISSP certification. Progent can give you access to a CISSP-certified expert to help your organization in a broad range of security fields including:

  • Security Management Procedures
  • Security Architecture and Models
  • Access Control Systems and Processes
  • Applications Development Security
  • Secure Operations
  • Site Security
  • Cryptography Technology
  • Telecom, LAN and WAN Security
  • Business Continuity Preparedness
Read additional information concerning Progent's CISSP-certified Information Security Consulting Professionals.

ISSAP Accredited Secure Network Architecture Engineering Assistance
Progent's ISSAP qualified system architecture professionals are experts who have been awarded ISSAP Certification through thorough testing and significant work with information security architecture. The ISSAP credential represents proven competence in the more challenging requirements of information system security architecture within the broader field of information security knowledge required for CISSP accreditation. Progent's ISSAP-certified security experts can help your business with all aspects of architecture security including.

  • Access Management Mechanisms and Techniques
  • Telecommunications and System Infrastructure Security
  • Cryptography Options
  • Needs Evaluation and Security Guidelines
  • BCP and DRP
  • Physical Security
Read more information about Progent's ISSAP Qualified Secure IT Architecture Support Professionals.

CISA Certified IS Security Auditing Consulting Services
The Certified Information Systems Auditor (CISA) credential is a recognized qualification that represents expertise in information system security audit and control. Certified by ANSI, the CISA accreditation requires that consultants pass an extensive test administered by the ISACA professional group. Progent's CISA-qualified information security audit consultants are available to assist your company with:

  • Information Systems Audit Services
  • Information Technology Governance
  • Network Assets and Architecture Planned Useful Life
  • IT Service Delivery
  • Protecting Data Assets
  • Disaster Recovery Preparedness
Get the details concerning Progent's CISA Qualified IS Security Auditing Consulting Expertise.

Certified in Risk and Information Systems Control (CRISC) Experts
The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA to verify a consultant's skills to design, implement, and support information system control mechanisms to mitigate risk. Progent can provide the services of a CRISC-certified consultant to help you to create and carry out a business continuity or disaster recovery strategy that follows industry best practices promoted by CRISC and crafted to align with your organization's risk appetite, business objectives, and budgetary guidelines. Progent's CRISC-certified network risk management specialists offer a range of risk evaluation services including:

  • Gather information and study documentation to evaluate major vulnerabilities
  • Identify statutory, regulatory, and contractual mandates and organizational standards related to your information system to assess their possible influence on your strategic objectives
  • Point out possible threats for your operational processes to assist in evaluating your enterprise risk
  • Develop a risk awareness initiative and provide training to ensure your stakeholders understand IT risk so they can assist with your risk control process
  • Connect key risk vectors to related business processes to help determine risk ownership
  • Determine risk appetite with your senior management and major stakeholders to ensure they are in agreement
Find out more information concerning Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Accredited IS Security Engineering Assistance
GIAC (Global Information Assurance Certification) was established in 1999 to validate the knowledge of IT security engineers. GIAC's goal is to verify that an accredited professional has the knowledge necessary to provide support in vital areas of system, data, and application program security. GIAC accreditations are acknowledged by companies and institutions all over the world including and the United States National Security Agency. Progent's GIAC IS security audit engineers can help your business with:

Find out additional details about Progent's GIAC Information Assurance Support.

Get in Touch with a Security Engineer
To learn how to contact a Progent security consultant for remote or on-premises support in Tennessee, phone 1-800-993-9400 or visit Online Computer Help.














© 2002- 2018 Progent Corporation. All rights reserved.