To get fast online assistance with data security problems, companies in Atlanta Georgia have access to world-class expertise from Progent's certified security engineers. Progent's online service staff is available to offer efficient and economical assistance with security emergencies that threaten the viability of your IT network. Progent's accredited engineers are premier to provide help for environments powered by Microsoft, Linux, macOS and OS X, and popular derivatives of UNIX. Progent can deliver world-class guidance for key security and recovery technologies like AI-based EDR (End Point Protection and Response), MDR (Managed Detection and Response), complete system restore validation and testing, immutable backup, and off-site backup. Progent's wide range of services addresses firewall configuration, email security, protected network infrastructure, and business continuity planning. Progent's technical support staff has earned the industry's most advanced security accreditations including CISM and Certified Information Systems Security Professional (CISSP).
Progent offers online security expertise on a by-the-minute basis without minimum call duration and without extra fees for sign-up or after hours service. By charging by the minute and by delivering world-class support, Progent's billing model keeps costs under control and avoids scenarios where quick fixes turn into major bills.
Ransomware Hot Line: 800-462-8800
Ransomware requires time to work its way across a target network. For this reason, ransomware assaults are typically unleashed on weekends and at night, when support personnel may take longer to become aware of a penetration and are least able to mount a rapid and forceful defense. The more lateral movement ransomware is able to manage within a victim's network, the longer it will require to recover basic operations and scrambled files and the more data can be stolen and posted to the dark web. Progent's Ransomware Hot Line is intended to guide organizations to complete the time-critical first phase in responding to a ransomware assault by putting out the fire. Progent's remote ransomware experts can assist businesses to locate and quarantine infected servers and endpoints and protect clean assets from being penetrated. If your network has been penetrated by any version of ransomware, act fast. Get immediate help by calling Progent's Ransomware Hot Line at 800-462-8800.
Our System Has Been Hacked: What Do We Do?
In case your network is currently faced with a network security emergency other than ransomware, refer to Progent's Emergency Remote Network Help to find out how to receive fast aid. Progent has a team of veteran cybersecurity specialists who offer remote and onsite support that includes containment, mitigation, restoration, forensics, and enhancement of your cybersecurity profile to protect against future attacks.
For organizations who have prepared in advance for an attack, the step-by-step incident handling model outlined by GIAC (Global Information Assurance Certification) is Progent's approved method of handling a serious security incident.
Introduction to Progent's Security Services
Coordinating data security as well as preparedness for recovering vital information and functions after an attack demands a continual process involving a variety of tools and procedures. Progent's security engineers can support your business at all levels in your attempt to secure your IT network, ranging from security assessments to designing a comprehensive security strategy. Some technologies supported by Progent's security consultants include Planning and Prevention, Data Recovery and Security Forensics, and Outsourced Protection from Email-Borne Spam and Viruses.
Designing and Building Protected Networks
Any business should develop a thoroughly considered security plan that includes both preventive and reactive steps. The pre-attack plan is a collection of steps that helps to reduce vulnerabilities. The reactive plan specifies procedures to assist security staff to inventory the damage resulting from an attack, repair the damage, document the event, and restore network functions as soon as possible. Progent can advise you how to build security into your business operations. Progent can set up scanning software, define and execute a safe computer infrastructure, and recommend processes and policies that will enhance the protection of your network. Progent's security experts are available to assist you to set up a firewall, deploy protected remote connectivity to email and data, and configure an efficient VPN.
If you are looking for an affordable option for jobbing out your security administration, Progent's 24x7 Monitoring Options feature continual online server monitoring and quick resolution of emergencies.
Hybrid Cloud Solutions
Progent can assist your IT team you to design, implement, manage and troubleshoot enterprise hybrid cloud solutions that combine local and cloud-based infrastructure and that are compliant with government security standards. (Learn about Progent's Microsoft 365 Exchange Online integration solutions with on-premises Exchange, Microsoft Azure enterprise hybrid cloud integration, Amazon Web Services (AWS) enterprise hybrid cloud solutions, and Google Cloud planning and integration expertise.)
System Restoration and Failure Analysis
Progent has expertise in restoring networks and computers that have been hacked, are suspect, or have stopped working because of a security attack. Progent can help assess the damage resulting from the breach, return your company to normal functions, and retrieve information compromised as a result of the assault. Progent's certified engineers can also manage a comprehensive forensic evaluation by going over event logs and using other proven forensics tools. Progent's experience with security problems reduces your business disruption and allows Progent to suggest effective measures to prevent or contain new assaults.
Ransomware Removal and Restoration Consulting
Progent can provide the services of experienced ransomware recovery consultants with the knowledge to rebuild a network damaged by a ransomware cryptoworm like Ryuk, Dharma, Hermes, or Locky. For more information, visit ransomware cleanup and recovery expertise.
Work-from-Home (WFH) Security Consulting
Work-from-Home (WFH) workers commonly utilize their personal computing devices and often operate in a poorly secured physical environment. This increases their vulnerability to cyber attacks and requires careful deployment of firewalls, anti-malware tools, multi-factor authentication, remote endpoint monitoring, intensive end-user education, and the development of policies built on best practices. Progent's seasoned group of Work-from-home support consultants can assist your business to design, implement and manage an effective security solution that guards critical IT resources in environments that include remote workers as well as hybrid workers.
Software/Firmware Update Management Services
Progent's support services for patch management offer businesses of any size a flexible and cost-effective solution for assessing, testing, scheduling, applying, and documenting software and firmware updates to your dynamic information network. In addition to maximizing the protection and functionality of your IT environment, Progent's software/firmware update management services permit your IT team to focus on line-of-business projects and tasks that derive the highest business value from your network. Find out more about Progent's software/firmware update management support services.
Extended Detection and Response Powered by SentinelOne
SentinelOne's Singularity product family is a subscription-based, cloud-centered threat management platform that features AI algorithms and advanced services to provide comprehensive endpoint detection and response (Singularity EDR) and extended detection and response (Singularity XDR). SentinelOne's small-footprint software agents can be loaded in minutes to defend endpoints against modern cyberthreats such as ransomware, familiar and new malware, trojan viruses, hacking toolkits, memory exploits, script misuse, invasive macros, and living-off-the-land abuse. Progent is a certified SentinelOne Partner and dealer and manages thousands of endpoints secured by SentinelOne Singularity technology. SentinelOne Singularity is invariably the first endpoint response software activated by Progent to provide control and visibility of a customer's system at the outset of a ransomware emergency. For more information, refer to Progent's SentinelOne-based Extended Detection and Response (XDR) services.
Consulting Services for Horizon3.ai's NodeZero PEN Testing Platform
NodeZero from Horizon3.ai is a leading-edge penetration test (pentest) platform that can deliver repeated, simultaneous, automated assessment of your internal and perimeter network so you can uncover, prioritize, remediate, and verify security weaknesses before threat actors can exploit them. NodeZero pentests can deploy decoys called tripwires such as fake files or credentials to find out whether your system is actively being probed along proven attack vectors. Tripwires provide sufficient information to make it possible to react promptly with your incident response workflows before an assailant can compromise your environment. Progent offers the skills of a NodeZero Certified Operator (NCO) who can assist you to deploy NodeZero to carry out comprehensive penetration tests of your perimeter and your internal IT infrastructure so you can determine your current security posture. Progent can also help you to strengthen your network security and can assist you to design and implement a cohesive cybersecurity ecosystem that simplifies management and delivers maximum cyber defense for on-premises, cloud-based, and perimeter IT resources. To find out additional information about Progent's vulnerability assessment solutions powered by on NodeZero's pentest products, see Consulting Services for NodeZero's Pentest Platform.
Stealth Penetration Security Evaluation Services
Stealth intrusion checking is an important part of any overall IT system security plan. Progent's security experts can perform extensive penetration tests without the knowledge of your organization's internal IT resources. Unannounced penetration testing shows whether existing security monitoring tools such as intrusion detection alerts and event history analysis are properly configured and actively observed. Progent can implement continuous automatic PEN testing to map your internal and external attack surface and to identify ways that exploitable vulnerabilities, improper configurations, stolen credentials, skipped patches, and ill-advised IT product defaults can be combined by threat actors into the multi-front attacks typical of modern versions of ransomware. Get additional information about Progent's Stealth PEN Assessment Services.
Progent's Low-Cost Managed Services for Information Assurance
Progent's low-cost ProSight series of network monitoring and management services is intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance. ProSight managed services offered by Progent include:
ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection service that utilizes SentinelOne's cutting edge behavior-based machine learning technology to defend endpoint devices as well as physical and virtual servers against modern malware assaults such as ransomware and file-less exploits, which easily evade traditional signature-matching anti-virus tools. ProSight Active Security Monitoring safeguards on-premises and cloud resources and offers a unified platform to manage the complete malware attack progression including protection, infiltration detection, mitigation, remediation, and forensics. Top features include one-click rollback with Windows VSS and automatic network-wide immunization against new attacks. Progent is a SentinelOne Partner. Read more about Progent's
ProSight Enhanced Security Protection (ESP): Unified Endpoint Protection
Progent's ProSight Enhanced Security Protection (ESP) services offer economical multi-layer security for physical and virtual servers, workstations, smartphones, and Exchange email. ProSight ESP uses adaptive security and advanced machine learning for continuously monitoring and responding to security assaults from all vectors. ProSight ESP provides two-way firewall protection, penetration alerts, device control, and web filtering via cutting-edge tools packaged within a single agent accessible from a unified control. Progent's data protection and virtualization consultants can help your business to design and configure a ProSight ESP environment that meets your organization's specific needs and that helps you demonstrate compliance with government and industry data protection regulations. Progent will assist you specify and implement policies that ProSight ESP will manage, and Progent will monitor your network and respond to alerts that call for urgent attention. Progent's consultants can also help you to install and verify a backup and restore system like ProSight Data Protection Services (DPS) so you can recover rapidly from a potentially disastrous cyber attack like ransomware. Read more about Progent's
ProSight DPS: Managed Backup
Progent has partnered with leading backup/restore technology vendors to produce ProSight Data Protection Services (DPS), a family of subscription-based management offerings that provide backup-as-a-service (BaaS). All ProSight DPS services automate and monitor your data backup processes and enable non-disruptive backup and fast restoration of critical files/folders, apps, images, and virtual machines. ProSight DPS helps you recover from data loss caused by hardware failures, natural calamities, fire, malware such as ransomware, human mistakes, malicious insiders, or application bugs. Managed backup services available in the ProSight Data Protection portfolio include ProSight DPS Altaro VM Backup with immutable cloud storage, ProSight 365 Backup (formerly Altaro Office 365 Backup), ProSight DPS ECHO Backup using Barracuda dedicated storage, and ProSight MSP360 Hybrid Backup. Your Progent expert can help you to determine which of these fully managed backup services are best suited for your IT environment.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering and email encryption service that incorporates the infrastructure of leading data security vendors to deliver web-based management and comprehensive security for all your email traffic. The powerful structure of Progent's Email Guard combines cloud-based filtering with a local gateway appliance to provide advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. Email Guard's cloud filter acts as a first line of defense and keeps most unwanted email from making it to your network firewall. This reduces your exposure to inbound attacks and conserves system bandwidth and storage. Email Guard's onsite gateway appliance adds a deeper layer of analysis for incoming email. For outbound email, the local security gateway provides AV and anti-spam filtering, DLP, and email encryption. The onsite gateway can also assist Microsoft Exchange Server to track and protect internal email that stays inside your corporate firewall. For more details, see Email Guard spam and content filtering.
ProSight Duo MFA: Two-factor Authentication (2FA) Solutions
Progent's Duo authentication services incorporate Cisco's Duo technology to defend against stolen passwords by using two-factor authentication (2FA). Duo supports one-tap identity verification with Apple iOS, Android, and other personal devices. With Duo 2FA, whenever you log into a protected application and give your password you are requested to verify your identity on a unit that only you have and that is accessed using a different ("out-of-band") network channel. A wide range of devices can be used as this added form of ID validation such as a smartphone or watch, a hardware/software token, a landline telephone, etc. You may register several verification devices. To find out more about ProSight Duo two-factor identity validation services, visit Duo MFA two-factor authentication (2FA) services for teleworkers.
ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size business can have its critical servers and applications hosted in a secure fault tolerant data center on a fast virtual machine host configured and managed by Progent's IT support experts. Under Progent's ProSight Virtual Hosting model, the client retains ownership of the data, the OS platforms, and the applications. Because the system is virtualized, it can be ported easily to an alternate hardware environment without a lengthy and technically risky reinstallation process. With ProSight Virtual Hosting, you are not locked into one hosting service. Learn more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: IT Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to create, update, find and safeguard information about your IT infrastructure, processes, business apps, and services. You can quickly locate passwords or IP addresses and be warned about impending expirations of SSL certificates or warranties. By updating and organizing your IT infrastructure documentation, you can eliminate up to half of time spent looking for vital information about your IT network. ProSight IT Asset Management features a centralized repository for storing and sharing all documents related to managing your business network such as standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also offers advanced automation for collecting and relating IT information. Whether you're making improvements, doing regular maintenance, or responding to an emergency, ProSight IT Asset Management gets you the information you need the instant you need it. Find out more about Progent's ProSight IT Asset Management service.
Special Security Services Offered by Progent
Progent's veteran consultants can provide unique expertise in key facets of network protection such as:
Vulnerability Audits and Compliance Assessment
Progent provides expertise with information risk auditing utilities such as Microsoft Baseline Security Analyzer and LANguard from GFI for conducting a variety of automatic system scans to uncover potential security gaps. Progent has extensive skills with these tools and can assist you to understand audit results and react appropriately. Progent's certified security engineers also offer web application testing and can perform thorough evaluation of corporate-wide security to determine your company's compliance with important worldwide security standards including FISMA, PCI, and ISO. Also, Progent can assess the strength of your wireless protection covering in-place wireless appliances plus portable devices. Get additional details about Progent's Vulnerability Evaluation and Compliance Testing.
Cisco Security, PIX and ASA Firewall, Virtual Private Network (VPN), Aironet and Meraki Wi-Fi Consulting
Progent's Cisco CCIE engineers and Cisco CCNP experts can deliver in-depth consulting expertise for Cisco's entire family of security and Virtual Private Network (VPN) solutions such as PIX 500 Firewalls and ASA 5500 Firewalls, Catalyst FWSM, protected high-speed and IS routers, wireless access points, Cisco Meraki cloud-managed access points, and Catalyst switches. Learn additional details about Cisco Security, Virtual Private Network (VPN) and Aironet Wireless Expertise.
Other Firewall and VPN Solutions
In addition to supporting a wide range of network security technologies from Microsoft and Cisco, Progent can provide businesses of any size top-level engineering services for solutions from other popular firewall and Virtual Private Network (VPN) vendors. Progent's consultants can provide:
CISM identifies the fundamental competencies and worldwide benchmarks of service that information security professionals are required to master. CISM provides business management the confidence that those who have been awarded their CISM have the experience and skill to offer effective security administration and consulting services. Progent can offer a CISM-certified expert to help your organization in vital security disciplines such as information protection governance, risk management, data protection program control, and incident handling management.
Get the details about Progent's CISM Security Consulting Services.
Certified Information Systems Security Professionals (CISSP) Security Support Expertise
Progent's CISSP consultants are cybersecurity engineers who have earned CISSP certification through demonstrated professional work, extensive study, and exhaustive testing. CISSP qualification recognizes expertise in a worldwide standard for IT security. ANSI has granted the CISSP credential official recognition in the area of IT security under ISO/IEC 17024. Fields of knowledge included under CISSP include cybersecurity management procedures, security design and test systems, access permission systems, applications development security, operations security, hardware security, encryption, communications, Internet security, and business continuity planning.
Get more details concerning Progent's Certified Information Systems Security Professionals (CISSP) Consulting Services.
CISSP-ISSAP Certified Experts for Secure Network Infrastructure
Progent's ISSAP Certified cybersecurity consultants have earned ISSAP certification after rigorous testing and extensive experience. field experience with network security design. ISSAP consultants possess comprehensive understanding of access management mechanisms and methodologies, telecommunications and network protection, cryptography, requirements analysis, business continuity and disaster recovery planning (DRP), and physical security. Progent's ISSAP-certified security experts can assist your company with all phases of secure network architecture.
Find out additional details concerning Progent's ISSAP Certified Protected IT Architecture Consulting Support.
CISSP-ISSEP Premier Cybersecurity Engineering Experts
Network Security consultants who have earned CISSP-ISSEP (Information Systems Security Engineering Professional) certification have shown their ability to provide large organizations with the expertise expected of a senior systems engineer, information assurance systems engineer, information assurance officer, information assurance analyst, or senior cybersecurity analyst. Progent offers the support of a certified CISSP-ISSEP network security expert to assist your enterprise to utilize current system security engineering theory and processes in system development, evaluate system security designs based on cybersecurity engineering leading practices, produce viable system designs that incorporate compliant security mechanisms for all critical system functions, define effective design strategies to deliver protection for operations, perform in-depth risk analysis, and recommend practical cybersecurity models that balance your operational requirements with your organization's risk tolerance.
Find out the details about Progent's CISSP-ISSEP Cybersecurity Engineering Consulting Services.
CISA Security Auditor Consulting Services
The Certified Information Systems Auditor credential is an important achievement that represents expertise in network security audit and control. Certified by the American National Standards Institute (ANSI), the CISA accreditation has consultants pass an extensive test administered by the ISACA professional association. Progent offers the expertise of a CISA-Premier security engineer able to help companies in the areas of IS audit process, IT administration, systems and infrastructure lifecycle, IT service delivery, protecting data resources, and disaster recovery planning.
Find out the details about Progent's Certified Information Systems Auditor (CISA) Professional Services.
CRISC Network Risk Management Experts
The Certified in Risk and Information Systems Control (CRISC) certification program was established by ISACA to verify an IT professional's ability to plan, implement, and support information system control mechanisms to mitigate network risk. Progent can provide the services of a CRISC-certified engineer to assist you to create and execute a workplace continuity strategy that follows leading practices promoted by CRISC and geared to match your organization's risk appetite, business goals, and budgetary guidelines. Progent's network risk management services are a good fit the services available from Progent's CISA-Premier consultants for impartially assessing your IS control design and also with the expertise of Progent's CISM consultants for designing company-wide security policies.
Find out the details concerning Progent's CRISC-certified Risk Management Support.
GIAC Support Services
GIAC (Global Information Assurance Certification) was established in 1999 to certify the skill of IT security experts. GIAC's mission is to assure that an accredited security consultant has the skills appropriate to deliver services in critical areas of system, data, and application security. GIAC accreditations are recognized by businesses and government organizations throughout the world including U.S. National Security Agency (NSA). Progent offers the support of GIAC certified security engineers for any of the network security services addressed within GIAC accreditation topics such as assessing networks, incident response, intrusion detection, web-based application security, and security information and event management (SIEM) solutions.
Find out additional details about Progent's GIAC Information Assurance Services.
Contact Progent for Computer Security Expertise
If your business is situated in Atlanta Georgia and you need network security consulting expertise, telephone Progent at
Atlanta Metro Area Contact Information:
Progent offers consulting services and onsite technical support throughout the Atlanta Metro Area.
| City | Address | Phone | Link |
| Alpharetta | 11175 Cicero Drive, Suite 100 Alpharetta, GA 30022 United States |
(678) 436-8815 | Alpharetta Network Support Services |
| Atlanta | 235 Peachtree Street NE, Suite 400 Atlanta, GA 30303 United States |
(404) 537-1318 | Atlanta Network Support Services |
| Sandy Springs | One Glenlake Parkway, Suite 650 Sandy Springs, GA 30328 United States |
(678) 899-6420 | Sandy Springs Network Support Services |