Company information networks in the state of Georgia can have fast and economical online technical support from Progent's accredited security professionals to fix urgent security issues. Rates are reasonable, charges are per minute, engagement is fast, and support is unbeatable. Progent also offers assistance for complex engagements that requires the services of senior security consultants with high-level industry credentials.

In case your Georgia business is located far from larger metropolitan neighborhoods such as Atlanta, Augusta, Columbus, Savannah, or Athens, contact with nearby accredited network security experts could be problematic when there's an emergency. This could mean lost income for your company, upset customers, unproductive employees, and distracted executives. By calling Progent's remote support, you can get in touch with a Certified security consultant who can deliver help whenever you have to have it to get your information system operating and restore your data.

Progent can assist you in your initiatives to defend your network with support ranging from security checks to creating a company-wide security plan. Progent provides affordable service to help companies of any size to configure and maintain safe IT environments based on Microsoft Windows and Cisco products and that can include computers running UNIX, Linux, Sun Solaris, or Mac OS X operating systems as well as BYOD users with Apple handhelds or Android or Windows Phone devices.

Progent can also help you outsource spam filtering and protection from e-mail-based assaults. Email Guard is Progent's email filtering and encryption platform that uses the services and infrastructure of top data security vendors to deliver web-based control and world-class protection for all your inbound and outbound email. The powerful structure of Email Guard combines a Cloud Protection Layer with a local security gateway appliance to offer complete protection against spam, viruses, Denial of Service Attacks, DHAs, and other email-based malware. The Cloud Protection Layer serves as a first line of defense and blocks most unwanted email from making it to your security perimeter. This decreases your vulnerability to external attacks and saves system bandwidth and storage space. ProSight Email Guard's onsite gateway appliance provides a further layer of inspection for inbound email. For outgoing email, the onsite security gateway provides AV and anti-spam protection, protection against data leaks, and encryption. The onsite security gateway can also help Exchange Server to monitor and safeguard internal email that originates and ends inside your corporate firewall.

Progent's security professionals are accessible online or on site to provide a range of urgent or project-based IT security services including:

If your network has an urgent requirement for computer security support, refer to Progent's Urgent Online Network Support.

Progent's engineers can deliver advanced support in key areas of computer security that include security evaluation, firewall and VPN expertise, and advanced security planning.

Security Audits
Progent's expert security consultants can evaluate the effectiveness of your current computer security implementation through comprehensive remote automated testing based on sophisticated software tools and proven techniques. Progent's experience in administering this testing saves your company time and money and offers an accurate portrayal of security holes. The information your business gains can make up the basis of a security strategy that can allow your information system to run safely and respond quickly to new risks.

Automated Security Audits
Progent provides expertise in the use of security evaluation software including Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard for economically performing a set of programmed network auditing scans to identify possible security gaps. Progent has extensive knowledge of additional security auditing tools such as NMAP, AMAP Application Scanner, eEye, plus tools like SolarWinds, Netcat, Socat, and Nikto. Progent can help you to understand testing reports and react appropriately.

Progent can help you build security into your business processes, configure auditing tools, plan and implement a protected system architecture, and recommend procedures to maximize the security of your IT system. Progent's security engineers are able to help you set up a firewall, design secure remote access to email and business applications, and integrate virtual private network. Learn additional information about Progent's network security evaluation.

Security Inventory Bundles for Small Companies
Progent has put together two low-cost security inventory and evaluation bundles intended to enable small businesses to get an objective security evaluation from a certified security specialist. With Progent's External Network Security Inventory Scan, a security expert runs an extensive test of your network from beyond your company firewall to uncover possible risks in the security profile you present to the outside world. With Progent's Internal Security Inventory Checkup, a security engineer runs a network scan from a secure machine inside your company firewall to determine vulnerabilities to inside threats. The two security inventory packages are configured and executed from a protected external location. The process is overseen by an engineer with top security accreditations and who generates a report that summarizes and analyzes the information collected by the scan and suggests cost-effective remediation if appropriate.

Network Intrusion Testing Support Services
Stealth intrusion checking is an important part of any comprehensive IT system security plan. Progentís security experts can run extensive intrusion checks without the knowledge of your company's internal IT resources. Unannounced penetration checking uncovers whether current security monitoring tools such as intrusion detection alerts and event log analysis are correctly set up and actively checked. Find out additional information on Progent's network penetration analysis consulting.

Firewall and Virtual Private Network Solutions
Progent's background in network security technology includes extensive field work with major firewalls and Virtual Private Network (VPN) products offered by a variety of companies including Cisco, Microsoft, and Juniper. Progent can provide the support of consultants who have earned important networking certifications such as CCIE and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Configuration and Troubleshooting
The current Cisco ASA 5500-X Family Next-Generation Firewalls with Firepower Services provide substantially more value than Cisco's legacy PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX security appliances for new deployments. After Cisco's acquisition of Sourcefire, the whole family of ASA 5500-X devices can be provisioned to enable Firepower Services, based on Sourcefire's Snort product, which is the market's most deployed network intrusion protection system (IPS). Firepower services provide enhanced capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network experts can help your company to maintain your current PIX or Cisco ASA 5500 security appliances and upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and onsite help with ASA 5500-X firewalls with Firepower Services and can help your business to plan, deploy, optimize, administer and troubleshoot firewall environments based on Cisco ASA 5500-X firewalls with Firepower Services. Read additional information about Cisco ASA Firewalls with Firepower Services integration and debugging services.

Cisco Security and Virtual Private Network Engineering Expertise
Cisco's network security and remote access products offer a comprehensive line of easy-to-administer security solutions to help safeguard your wired and wireless information system. Cisco's Virtual Private Network line includes routers, firewalls, intrusion detection devices and Virtual Private Network concentrators. Progent's expert staff of consultants includes experienced specialists with Cisco's Certified Internetwork Expert and Cisco Certified Network Professional certifications who can help your company to evaluate Cisco VPN, Cisco RADIUS Security, and additional Cisco security solutions that fit best with your business goals. Read more information concerning Progent's Consulting Services for Cisco Security and Virtual Private Network Products.

Consulting Expertise for Additional Firewall and VPN Products
Progent provides small and mid-size businesses expert support for Intrusion Protection products and IPsec VPN solutions from major firewall and VPN security companies including WatchGuard, Juniper, and Symantec. Progent can show you how to design a comprehensive security strategy and select the right technologies from a variety of suppliers to support your security objectives while staying within your budget restraints.

Progent's Flat-rate Managed Services for Information Assurance
Progent's low-cost ProSight series of network monitoring and management services is designed to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all facets of information assurance and compliance. ProSight managed services offered by Progent include:

ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that incorporates cutting edge behavior-based analysis tools to defend endpoints as well as physical and virtual servers against modern malware attacks such as ransomware and email phishing, which routinely evade traditional signature-based anti-virus products. ProSight Active Security Monitoring safeguards local and cloud-based resources and offers a single platform to address the entire malware attack lifecycle including protection, infiltration detection, mitigation, remediation, and forensics. Top capabilities include one-click rollback using Windows Volume Shadow Copy Service (VSS) and automatic system-wide immunization against newly discovered attacks. Learn more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware defense.

ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Security
Progent's ProSight Enhanced Security Protection (ESP) managed services deliver ultra-affordable multi-layer protection for physical and virtual servers, workstations, smartphones, and Exchange Server. ProSight ESP uses adaptive security and modern behavior analysis for continuously monitoring and responding to cyber assaults from all attack vectors. ProSight ESP offers two-way firewall protection, penetration alarms, device management, and web filtering through cutting-edge tools incorporated within a single agent managed from a unified control. Progent's security and virtualization experts can assist your business to design and configure a ProSight ESP deployment that addresses your organization's specific needs and that allows you achieve and demonstrate compliance with legal and industry information security standards. Progent will help you define and configure policies that ProSight ESP will manage, and Progent will monitor your network and react to alarms that call for immediate action. Progent can also help your company to set up and test a backup and restore system such as ProSight Data Protection Services so you can get back in business quickly from a destructive security attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Microsoft Exchange filtering.

ProSight Data Protection Services: Managed Cloud Backup and Recovery
ProSight Data Protection Services from Progent offer small and medium-sized businesses a low cost end-to-end service for secure backup/disaster recovery (BDR). For a low monthly price, ProSight DPS automates and monitors your backup activities and enables fast restoration of critical files, applications and VMs that have become lost or corrupted as a result of component breakdowns, software glitches, disasters, human error, or malicious attacks such as ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, applications, system images, plus Microsoft Hyper-V and VMware images/. Important data can be backed up on the cloud, to a local device, or mirrored to both. Progent's cloud backup consultants can deliver advanced expertise to set up ProSight Data Protection Services to be compliant with regulatory standards like HIPPA, FIRPA, PCI and Safe Harbor and, when necessary, can help you to recover your critical information. Read more about ProSight Data Protection Services Managed Backup.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering service that uses the technology of leading information security companies to deliver web-based management and world-class security for your inbound and outbound email. The powerful architecture of Email Guard integrates cloud-based filtering with a local security gateway device to offer advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-based malware. The cloud filter acts as a preliminary barricade and blocks the vast majority of threats from reaching your network firewall. This reduces your exposure to external attacks and conserves network bandwidth and storage. Email Guard's onsite gateway appliance adds a deeper level of inspection for incoming email. For outgoing email, the onsite gateway provides anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The on-premises gateway can also help Microsoft Exchange Server to monitor and safeguard internal email that stays inside your security perimeter. For more details, visit Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small organization can have its critical servers and apps hosted in a secure fault tolerant data center on a high-performance virtual machine host configured and maintained by Progent's IT support professionals. Under Progent's ProSight Virtual Hosting model, the client retains ownership of the data, the OS software, and the apps. Since the environment is virtualized, it can be ported easily to an alternate hardware solution without a time-consuming and difficult reinstallation process. With ProSight Virtual Hosting, you are not locked into a single hosting service. Learn more about ProSight Virtual Hosting services.

ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, update, find and safeguard information about your IT infrastructure, processes, business apps, and services. You can instantly find passwords or serial numbers and be warned automatically about upcoming expirations of SSLs ,domains or warranties. By updating and organizing your IT infrastructure documentation, you can eliminate as much as half of time wasted trying to find vital information about your network. ProSight IT Asset Management includes a common location for storing and sharing all documents related to managing your network infrastructure such as standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also supports advanced automation for gathering and relating IT information. Whether youíre planning improvements, doing regular maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the knowledge you need as soon as you need it. Learn more details about ProSight IT Asset Management service.

Expert Security Consulting
Any business ought to develop a carefully considered security program that incorporates both proactive procedures and response plans. The pre-attack plan is a collection of mechanisms designed to minimize vulnerabilities. The post-attack plan helps your IT security personnel to evaluate the impact resulting from a security penetration, fix the system, record the event, and get business functions operational as soon as feasible.

Progent's certified IT security engineers can to help your company to perform a complete vulnerability evaluation and create a computer security plan to establish security processes and mechanisms to reduce ongoing attacks and threats.

CISM Certified Security Consulting Assistance
The Certified Information Security Manager (CISM) organization defines the core competencies and international standards of performance that information security professionals are expected to learn. It gives executive management the confidence that consultants who have earned their CISM credential have the experience and knowledge to provide efficient security administration and support services. Progent can provide the expertise of CISM Certified security professionals to help companies with:

  • Information Security Governance
  • Risk Analysis
  • Network Security Program Management
  • IS Security Administration
  • Response Management
Read more details about Progent's CISM Qualified Information Security Consulting Expertise.

CISSP Accredited Security Engineering Services
CISSP certification recognizes expertise with a global standard for network security. ANSI (American National Standards Institute) has granted certification accreditation in the field of data protection defined by ISO/IEC 17024. Progent can provide access to of security experts who have qualified for CISSP accreditation. Progent can provide a CISSP-certified expert to help your company in a broad range of security fields including:

  • Security Administration Procedures
  • Security Architecture and Models
  • Access Control Solutions and Processes
  • Software Development Security
  • Secure Operations
  • Physical Security
  • Data Encryption Mechanisms
  • Telecom, LAN and WAN Security
  • Business Continuity Planning
Learn additional information concerning Progent's CISSP Network Security Support Services.

CISSP-ISSAP Certified Secure System Architecture Engineering Expertise
Progent's CISSP-ISSAP Premier information system architecture engineers are experts who have been awarded ISSAP status through rigorous examination and extensive experience with network security design. The ISSAP credential indicates demonstrated competence in the most in-depth demands of IS security architecture within the wider field of information system security expertise needed for CISSP certification. Progent's ISSAP-certified security consultants can assist your business with all aspects of architecture security including.

  • Access Management Mechanisms and Methodologies
  • Phone System and System Infrastructure Protection
  • Encryption/Decryption Solutions
  • Requirements Evaluation and Security Standards
  • BCP and Disaster Recovery Planning
  • Site Security
Read more information concerning Progent's ISSAP Accredited Secure Network Architecture Support Professionals.

CISA Certified IS Security Auditing Engineering Services
The Certified Information Systems Auditor (CISA) credential is a recognized achievement that represents mastery in network security auditing. Accredited by the American National Standards Institute, the CISA accreditation has consultants undergo a comprehensive test administered by the ISACA professional association. Progent's CISA-qualified IS security audit engineers can help your IT organization with:

  • IS Audit Services
  • IT Governance
  • Network Assets and Architecture Lifecycle
  • Information Technology Service Delivery
  • Protecting Information Resources
  • Business Continuity Planning
Find out the details about Progent's CISA Qualified Information System Security Auditing Consulting Support.

Certified in Risk and Information Systems Control (CRISC) Experts
The Certified in Risk and Information Systems Control (CRISC) certification program was established by ISACA to validate a consultant's skills to design, deploy, and support information system controls to mitigate network risk. Progent can provide the expertise of a CRISC-certified consultant to assist your company to create and execute a workplace continuity or disaster recovery strategy that follows leading practices promoted by CRISC and crafted to match your company's risk appetite, business goals, and IT budget. Progent's CRISC-certified IT risk management experts offer a variety of risk identification services including:

  • Collect information and review documentation to help identify significant vulnerabilities
  • Identify legal, regulatory, and contractual requirements and company standards associated with your network to determine their potential influence on your business goals
  • Point out possible vulnerabilities for your business processes to help in evaluating your enterprise risk
  • Create a risk awareness initiative and provide seminars to ensure your stakeholders appreciate information system risk so they can contribute to your risk management program
  • Match key risk scenarios to related business procedures to help assign risk responsibility
  • Determine risk tolerance with executive management and major stakeholders to make sure they are in agreement
Learn additional details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Experts.

GIAC Certified Network Security Consulting Support
Global Information Assurance Certification was founded in 1999 to certify the knowledge of IT security experts. GIAC's goal is to verify that an accredited professional possesses the knowledge necessary to provide services in key categories of system, data, and application program security. GIAC certifications are acknowledged by companies and government organizations throughout the world including and the United States NSA. Progent's GIAC-certified network security audit engineers can assist your IT organization with:

  • Auditing IT Infrastructure
  • Security Incident Response
  • Traffic Analysis
  • Web-based Services Security
  • SIEM solutions
Read additional details about Progent's GIAC Information Assurance Services.

Talk to a Progent Security Expert
To see how to get in touch with a Progent security engineer for online or on-premises assistance in Georgia, call 1-800-993-9400 or visit Online Network Support.