Company networks in Tennessee can depend on prompt and affordable online technical support from Progent's accredited security engineers to help with complex security issues. Rates are competitive, billing is by the minute, sign-up is fast, and service is world class. Progent also offers assistance for complex engagements that demand the services of senior security engineers with top industry credentials.

If your Tennessee network is some distance from more populated metropolitan areas including Memphis, Nashville, Knoxville, or Chattanooga, the availability of nearby accredited network security consultants may be limited when there's a security disaster. This can cause a drop in revenue for your business, upset customers, idle workers, and distracted executives. By calling Progent's online services, you have access to a certified security consultant ready to deliver help when you require it to keep your computer network running and salvage your data.

Progent can assist you in your efforts to defend your information system with support that ranges from network security checks to creating a comprehensive security plan. Progent offers economical support to assist small and midsize companies to design and manage safe IT environments based on Windows and Cisco products and that can include computers running UNIX, Linux, Sun Solaris, or Mac OS X platforms as well as mobile clients with Apple iOS handhelds or Google Android or Windows Phone devices.

Progent can also help you outsource spam filtering and defense against e-mail-based security threats. Email Guard is Progent's email security solution that uses the services and infrastructure of leading data security vendors to provide centralized control and world-class protection for your email traffic. The powerful structure of Email Guard integrates cloud-based filtering with a local security gateway appliance to provide complete defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. ProSight Email Guard's cloud filter serves as a first line of defense and blocks most threats from making it to your network firewall. This reduces your exposure to external attacks and saves network bandwidth and storage. ProSight Email Guard's on-premises gateway appliance provides a deeper level of analysis for inbound email. For outgoing email, the onsite security gateway offers anti-virus and anti-spam protection, DLP, and encryption. The onsite security gateway can also help Microsoft Exchange Server to track and safeguard internal email traffic that originates and ends within your security perimeter.

Progent's security professionals are accessible online or on premises to offer a variety of emergency or longer-term computer security services which include:

  • Run automated security audits
  • Clean up rapidly after virus and worm attacks
  • Configure and troubleshoot firewalls
  • Implement secure techniques for offsite and mobile access
  • Install advanced software for defense against spam and directory harvest attacks
  • Help create a company-wide security strategy with proactive monitoring
  • Provide comprehensive Call Center Support
  • Develop a practical data backup and recovery solution based on Data Protection Manager (DPM) backup/restore capability
If your company has an immediate requirement for IT security help, go to Progent's Urgent Remote Network Support.

Progent's consultants offer world-class services in key facets of network security that include auditing, firewall and VPN solutions, and advanced security consulting.

System Security Evaluation
Progent's expert security engineers can assess the strength of your current computer security systems by performing comprehensive remote automated analysis based on sophisticated software tools and proven techniques. Progent's skill in administering this testing saves your company money and offers a detailed portrayal of security holes. The knowledge your company is provided can make up the foundation of a security strategy that will permit your network to run safely and adapt rapidly to new threats.

Automated Network Security Evaluation
Progent offers consulting in the application of security testing software including Microsoft Baseline Security Analyzer (MBSA) and LANguard from GFI for economically running a variety of programmed system testing scans to identify potential security weaknesses. Progent has broad experience with other network auditing tools including NMAP Port Scanner, AMAP Application Scanner, eEye, as well as utilities such as Metasploit, Netcat, Hydra, and Nikto. Progent can help you to understand testing reports and react effectively.

Progent can help you design protection into your company operations, configure scanning applications, plan and deploy a secure system architecture, and recommend policies to optimize the security of your IT system. Progent's security consultants are able to show you how to configure a firewall, implement safe remote connectivity to email and data, and install virtual private network. Learn more concerning Progent's automated security analysis.

Security Inventory and Evaluation Bundles for Small Companies
Progent has put together two low-cost security inventory packages intended to allow small companies to receive an impartial security assessment from an accredited security consultant. With Progent's External Security Inventory Scan, a security engineer administers an extensive test of your network from beyond your firewall to determine potential risks in the security posture you expose to the outside world. With Progent's Internal Security Inventory Checkup, a security expert runs a system scan from an authorized computer within your firewall to determine the risk to internal threats. The two security inventory services are configured and executed from a protected external location. The project is managed by a consultant with high-level security accreditations and who produces a report that details and interprets the information captured by the scan and proposes cost-effective remediation where called for.

Stealth Intrusion Testing Support Services
Stealth intrusion checking is an important part of any comprehensive network security plan. Progent’s security experts can run extensive penetration checks without the knowledge of your organization's in-house network support staff. Unannounced penetration checking shows whether existing security monitoring systems such as intrusion incident warnings and event history analysis are properly configured and actively checked. Find out additional information on Progent's network security penetration analysis consulting.

Firewall/VPN Support
Progent's background in security solutions includes in-depth familiarity with major firewalls and VPN products offered by a variety of vendors including Cisco, Microsoft, and Juniper. Progent offers the support of consultants with important industry certifications such as Cisco Certified Internetwork Expert and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Integration and Debugging
The latest generation of Cisco ASA 5500-X Series of firewalls with Firepower Services provide substantially more bang for the buck than Cisco's earlier PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 security appliances for new deployments. Following Cisco's purchase of Sourcefire, the entire line of ASA 5500-X firewalls can be provisioned to enable Firepower Services, built on Sourcefire's Snort technology, which is the world's most popular network intrusion protection system (IPS). Firepower services bring enhanced capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-certified CCIE network experts can assist you to maintain your existing PIX or Cisco ASA 5500 firewalls or migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist you to design, deploy, tune, manage and troubleshoot firewall solutions based on Cisco ASA 5500-X firewalls with Firepower Services. Read additional information about Cisco ASA Firewalls with Firepower integration and debugging support.

Cisco Security and VPN Support Expertise
Cisco's network security and remote access products provide a comprehensive line of manageable security products to help protect your local and remote information system. Cisco's VPN product family features switches, firewalls, intrusion detection systems and VPN concentrators. Progent's professional consulting staff includes experienced engineers with Cisco's CCIE and Cisco Certified Network Professional qualifications who are able to help your business to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security solutions that align best with your company objectives. Find out additional details about Progent's Engineering Services for Cisco Security and VPN Appliances.

Support Expertise for Other Firewall and Virtual Private Network Solutions
Progent offers small and mid-size businesses expert support for Intrusion Protection Systems and IPsec VPN technology from leading firewall and VPN security companies such as Check Point Software, Juniper, and Symantec. Progent can show you how to design a comprehensive security plan and choose appropriate technologies from a variety of vendors to achieve your security objectives while sticking within your spending limits.

Progent's Flat-rate Managed Services for Information Assurance
Progent's low-cost ProSight portfolio of managed services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance. Managed services available from Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring is an endpoint protection service that utilizes next generation behavior-based analysis tools to guard endpoints as well as servers and VMs against new malware attacks like ransomware and file-less exploits, which easily evade traditional signature-based AV tools. ProSight ASM safeguards local and cloud-based resources and offers a unified platform to manage the complete threat lifecycle including blocking, detection, containment, cleanup, and post-attack forensics. Top capabilities include one-click rollback with Windows Volume Shadow Copy Service and automatic system-wide immunization against new threats. Learn more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware defense.

ProSight Enhanced Security Protection (ESP): Unified Endpoint Protection
ProSight Enhanced Security Protection managed services deliver affordable in-depth security for physical and virtual servers, workstations, mobile devices, and Exchange email. ProSight ESP utilizes adaptive security and advanced heuristics for continuously monitoring and responding to security threats from all attack vectors. ProSight ESP provides two-way firewall protection, penetration alarms, endpoint control, and web filtering through cutting-edge tools incorporated within one agent managed from a single console. Progent's data protection and virtualization experts can help you to plan and configure a ProSight ESP environment that addresses your company's specific needs and that allows you achieve and demonstrate compliance with legal and industry information protection regulations. Progent will help you define and implement policies that ProSight ESP will manage, and Progent will monitor your network and respond to alerts that call for immediate action. Progent's consultants can also assist you to set up and test a backup and restore solution such as ProSight Data Protection Services (DPS) so you can recover quickly from a destructive security attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified endpoint protection and Exchange email filtering.

ProSight DPS: Managed Cloud Backup and Recovery
ProSight Data Protection Services provide small and medium-sized organizations an affordable end-to-end service for reliable backup/disaster recovery. For a fixed monthly rate, ProSight DPS automates and monitors your backup processes and enables fast recovery of critical data, apps and virtual machines that have become lost or corrupted due to component breakdowns, software glitches, natural disasters, human mistakes, or malicious attacks like ransomware. ProSight DPS can help you back up, recover and restore files, folders, apps, system images, plus Microsoft Hyper-V and VMware images. Important data can be backed up on the cloud, to a local device, or to both. Progent's cloud backup consultants can deliver world-class support to set up ProSight Data Protection Services to to comply with government and industry regulatory standards like HIPPA, FINRA, PCI and Safe Harbor and, whenever necessary, can assist you to restore your critical information. Read more about ProSight DPS Managed Cloud Backup and Recovery.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering and email encryption service that uses the technology of top information security companies to deliver centralized management and comprehensive security for your email traffic. The hybrid structure of Progent's Email Guard combines cloud-based filtering with a local gateway device to provide advanced defense against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-borne threats. The Cloud Protection Layer acts as a first line of defense and blocks the vast majority of unwanted email from making it to your network firewall. This reduces your exposure to inbound threats and saves system bandwidth and storage space. Email Guard's on-premises gateway appliance adds a deeper layer of inspection for inbound email. For outbound email, the local security gateway offers AV and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The on-premises security gateway can also help Microsoft Exchange Server to track and safeguard internal email that originates and ends inside your corporate firewall. For more details, visit ProSight Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small business can have its key servers and applications hosted in a secure Tier III data center on a fast virtual machine host configured and maintained by Progent's IT support professionals. Under the ProSight Virtual Hosting service model, the customer retains ownership of the data, the OS platforms, and the apps. Because the environment is virtualized, it can be ported easily to an alternate hosting solution without requiring a lengthy and technically risky reinstallation process. With ProSight Virtual Hosting, you are not tied one hosting service. Learn more about ProSight Virtual Hosting services.

ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to create, update, find and safeguard data about your network infrastructure, processes, applications, and services. You can instantly locate passwords or serial numbers and be alerted automatically about upcoming expirations of SSLs or warranties. By cleaning up and organizing your IT infrastructure documentation, you can eliminate as much as half of time wasted trying to find vital information about your IT network. ProSight IT Asset Management features a common repository for storing and sharing all documents related to managing your network infrastructure such as standard operating procedures and self-service instructions. ProSight IT Asset Management also supports a high level of automation for gathering and relating IT data. Whether you’re planning enhancements, doing regular maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the knowledge you require as soon as you need it. Find out more details about ProSight IT Asset Management service.

Certified Security Consulting
Every business should have a thoroughly thought out security strategy that includes both preventive procedures and response plans. The proactive strategy is a collection of procedures intended to minimize security weaknesses. The reactive strategy helps your network security engineers to evaluate the damage caused by a security penetration, repair the damage, record the experience, and get the IT network operational as soon as feasible.

Progent's certified information security consultants can to help your company to run a comprehensive risk assessment and create a network security strategy to implement security processes and controls to mitigate future attacks and dangers.

CISM Certified Security Engineering Assistance
The Certified Information Security Manager (CISM) committee defines the basic competencies and international standards of performance that IT security professionals are expected to master. It gives executive management the assurance that those who have qualified for their CISM credential have the experience and knowledge to deliver effective security management and consulting services. Progent can provide the services of CISM qualified security consultants to help businesses with:

  • Information Security Governance
  • Vulnerability Analysis
  • Information Security Implementation Management
  • Network Security Management
  • Response Management
Learn more information concerning Progent's CISM Accredited IS Security Engineering Services.

CISSP Accredited Security Engineering Expertise
The CISSP credential denotes mastery of an international standard for information security. ANSI (American National Standards Institute) has granted certification accreditation in the area of data security stipulated by ISO 17024. Progent can provide access to of security professionals who have earned CISSP accreditation. Progent can provide a CISSP-certified consultant to help your organization in a variety security fields such as:

  • Security Administration Procedures
  • Security Architecture and Models
  • Access Control Solutions and Methodology
  • Software Development Security
  • Secure Operations
  • Physical Security
  • Cryptography Mechanisms
  • Telecom, LAN and Internet Security
  • Business Continuity Planning
Read additional details about Progent's CISSP Information Security Consulting Professionals.

CISSP-ISSAP Qualified Secure System Architecture Consulting Assistance
Progent's CISSP-ISSAP qualified system architecture engineers are consultants who have earned ISSAP Certification through thorough testing and extensive experience with information security design. The ISSAP certification represents proven competence in the most in-depth demands of information security architecture bounded by the wider field of information system security expertise needed for CISSP certification. Progent's ISSAP-certified security consultants can assist your business with all phases of secure network architecture including.

  • Access Management Systems and Methodologies
  • Telecom and Network Infrastructure Protection
  • Data Encryption Options
  • Needs Analysis and Security Criteria
  • Business Continuity Planning (BCP) and DRP
  • Site Security
Read additional information about Progent's ISSAP Qualified Secure System Architecture Engineering Professionals.

CISA Accredited Network Security Auditing Consulting Assistance
The CISA credential is a globally recognized qualification that signifies mastery in information system security auditing. Accredited by the American National Standards Institute, the CISA credential requires that candidates pass an extensive examination administered by the ISACA professional group. Progent's CISA information security audit specialists can help your business with:

  • Information Systems Audit Process
  • Information Technology Administration
  • Systems and Infrastructure Lifecycle
  • IT Support
  • Safeguarding Data Resources
  • Disaster Recovery Planning
Get more information about Progent's CISA Accredited Information System Security Auditing Engineering Expertise.

Certified in Risk and Information Systems Control (CRISC) Consultants
The CRISC certification program was initiated by ISACA in 2010 to verify a consultant's ability to plan, implement, and maintain IS control mechanisms to reduce network risk. Progent offers the expertise of a CRISC-certified engineer to assist you to develop and carry out a business continuity plan that follows leading practices promoted by CRISC and geared to match your company's risk appetite, business objectives, and IT budget. Progent's CRISC network risk management experts offer a range of risk evaluation services such as:

  • Collect data and review documentation to help identify significant vulnerabilities
  • Identify legal, industry, and contractual mandates and organizational standards associated with your network to determine their potential influence on your business goals
  • Identify possible vulnerabilities for your operational processes to assist in evaluating your corporate risk
  • Develop a risk awareness initiative and provide seminars to make sure your organization appreciate IS risk so they can assist with your risk control process
  • Connect identified risk scenarios to your associated business procedures to help assign risk ownership
  • Determine risk appetite with executive management and key stakeholders to make sure they are in agreement
Get more information concerning Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Certified IS Security Consulting Expertise
GIAC (Global Information Assurance Certification) was established in 1999 to certify the knowledge of IT security professionals. GIAC's goal is to assure that a certified security consultant possesses the knowledge needed to provide support in key areas of system, information, and application software security. GIAC accreditations are recognized by companies and institutions throughout the world including and the United States NSA. Progent's GIAC-certified security audit experts are available to help your IT organization with:

Read more information concerning Progent's GIAC Information Assurance Support.

Contact a Certified Security Specialist
To find out how to contact a Progent security engineer for remote or on-premises support in Tennessee, phone 1-800-993-9400 or go to Remote Network Help.














© 2002- 2019 Progent Corporation. All rights reserved.