Small business computer networks in Georgia can now get fast and affordable remote access to Progent's qualified network security professionals to resolve complex security issues. The cost is affordable, billing is by the minute, sign-up is quick, and support is world class. Progent also provides assistance for complex projects that demand the expertise of senior security engineers with top security credentials.
If your Georgia organization is situated outside of major urban areas including Atlanta, Augusta, Columbus, Savannah, or Athens, access to nearby accredited network security consultants could be problematic during an urgent situation. This could mean a loss of income for your company, upset clients, idle workers, and defocused executives. By contacting Progent, you can get in touch with a Certified security professional who can provide assistance when you have to have it to keep your network on line and restore your data.
Progent can assist you in all your initiatives to protect your IT environment with services that can range from security assessments to creating a comprehensive security strategy. Progent provides affordable support to assist small and midsize companies to configure and maintain secure IT environments based on Microsoft Windows and Cisco products and that may include servers and desktops running UNIX or Linux platforms as well as BYOD clients with Apple iOS handhelds or Google Android or Windows Phone smart phones and tablets.
Progent can also show you how to outsource spam blocking and protection from email-borne attacks. Email Guard is Progent's email security platform that uses the services and infrastructure of top data security vendors to provide centralized control and world-class security for your email traffic. The hybrid structure of Email Guard integrates a Cloud Protection Layer with an on-premises security gateway device to offer complete defense against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. ProSight Email Guard's Cloud Protection Layer serves as a first line of defense and blocks the vast majority of threats from making it to your security perimeter. This reduces your exposure to inbound attacks and conserves network bandwidth and storage space. ProSight Email Guard's on-premises security gateway appliance provides a deeper level of analysis for incoming email. For outbound email, the local security gateway offers anti-virus and anti-spam protection, protection against data leaks, and email encryption. The local gateway can also enable Exchange Server to monitor and safeguard internal email traffic that stays within your corporate firewall.
Progent's certified professionals are accessible online or on premises to provide a range of urgent or project-based network security services which include:
If your network has an immediate requirement for IT security help, refer to Progent's Emergency Online Network Support.
- Perform automated network security evaluations
- Recover quickly after virus and worm attacks
- Install effective firewalls
- Configure safe techniques for offsite and mobile access
- Install advanced solutions for automatic protection against viruses, spam and DHAs
- Help create a company-wide security plan with 24x7 monitoring
- Offer comprehensive Help Desk Services
- Develop an effective backup and restore plan built around Data Protection Manager (DPM) automated backup capability
Progent's support professionals offer advanced support in key facets of system protection that include security evaluation, firewalls and VPN, and high-level security consulting.
System Security Audits
Progent's certified security consultants can evaluate the strength of your current computer security environment by performing comprehensive remote automated testing based on advanced utilities and proven procedures. Progent's skill in administering this testing saves your company time and money and assures a detailed portrayal of security holes. The knowledge your IT organization gains can make up the basis of a security strategy that will allow your network to run safely and react rapidly to new threats.
Automated Security Assessment
Progent offers consulting in the application of security analysis utilities such as Microsoft Baseline Security Analyzer and GFI LANguard for affordably running a variety of automatic network auditing scans to identify possible security gaps. Progent has broad knowledge of additional security analysis utilities including NMAP, AMAP Application Scanner, eEye Vulnerability Scanner, plus tools like Metasploit Framework, Netcat, Hydra, and Nikto. Progent can show you how to understand testing reports and react appropriately.
Progent can show you how to build protection into your company processes, configure auditing software, define and deploy a protected network environment, and recommend policies to optimize the safety of your network. Progent's security professionals are available to show you how to set up a firewall, implement secure remote connectivity to email and data, and integrate virtual private network. Learn more about Progent's network security evaluation.
Security Inventory Bundles for Small Businesses
Progent offers two low-cost security inventory bundles designed to allow small businesses to get a professional network security evaluation from an accredited security consultant. With Progent's External Network Security Inventory Checkup, a security engineer runs an extensive examination of your IT infrastructure from outside your firewalled perimeter to uncover potential weaknesses in the security profile you present to the public. With Progent's Internal Network Security Inventory Scan, a security engineer runs a network scan from a secure computer within your company firewall to uncover your exposure to inside attacks. The two security inventory packages are set up and executed from a secured external site. The project is managed by an engineer with high-level security accreditations and who generates a report that details and analyzes the information collected by the scan and suggests cost-effective improvements if called for.
Network Penetration Analysis Support Services
Stealth intrusion testing is an important component of any successful IT system security strategy. Progentís security experts can run extensive penetration checks without the awareness of your organization's in-house network support resources. Unannounced penetration checking shows whether existing security monitoring systems such as intrusion detection alerts and event log monitoring are properly set up and consistently monitored. Find out more on Progent's stealth penetration analysis consulting.
Firewall And Virtual Private Network (VPN) Solutions
Progent's expertise in security technology encompasses in-depth familiarity with leading firewalls and VPN technology from a variety of companies such as Cisco, Microsoft, and Juniper. Progent offers the support of engineers who have earned important industry accreditations including CCIE and Microsoft Certified Systems Engineer.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Integration and Debugging
The new ASA 5500-X Family of firewalls with Firepower Services offer significantly more performance than Cisco's legacy PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX firewalls for new installations. Since Cisco's acquisition of Sourcefire, the entire family of Cisco ASA 5500-X firewalls can be provisioned to support Firepower Services, built on Sourcefire's Snort technology, which is the world's most deployed network intrusion protection system (IPS). Firepower services bring enhanced capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network experts can assist your company to maintain your current PIX or Cisco ASA 5500 firewalls or migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist your company to plan, integrate, optimize, administer and debug firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. Find out additional information about Cisco ASA Firewalls with Firepower Services configuration and debugging support.
Cisco Network Security and Virtual Private Network Support Expertise
Cisco's security and offsite access technology represent a complete range of manageable security products to help protect your wired and wireless information system. Cisco's VPN product family features routers, firewalls, intrusion detection devices and VPN appliances. Progent's expert staff of consultants includes field-proven specialists with Cisco's CCIE and CCNP certifications who are able to assist your organization to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security technologies that align best with your company goals. Find out more details about Progent's Engineering Services for Cisco Security and VPN Appliances.
Support Services for Other Firewall and Virtual Private Network Products
Progent provides small and medium size companies professional support for Intrusion Protection products and IPsec VPN solutions from leading firewall and VPN security vendors such as WatchGuard, Juniper, and Symantec. Progent can help you design a detailed security strategy and choose appropriate technologies from multiple vendors to achieve your security objectives while staying within your spending limits.
Progent's Fixed-price Managed Services for Information Security
Progent's value-priced ProSight line of managed services is designed to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. ProSight managed services offered by Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring is an endpoint protection service that incorporates next generation behavior-based analysis technology to defend endpoint devices and physical and virtual servers against modern malware assaults such as ransomware and email phishing, which easily escape legacy signature-based AV products. ProSight ASM protects on-premises and cloud-based resources and provides a unified platform to automate the complete threat progression including filtering, detection, mitigation, cleanup, and forensics. Key capabilities include single-click rollback with Windows Volume Shadow Copy Service and real-time system-wide immunization against new attacks. Learn more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection (ESP): Unified Endpoint Protection
ProSight Enhanced Security Protection managed services offer ultra-affordable in-depth security for physical servers and virtual machines, workstations, mobile devices, and Exchange Server. ProSight ESP utilizes adaptive security and modern behavior analysis for continuously monitoring and responding to security threats from all attack vectors. ProSight ESP delivers two-way firewall protection, penetration alarms, device control, and web filtering via leading-edge technologies incorporated within one agent managed from a unified console. Progent's data protection and virtualization experts can assist you to plan and implement a ProSight ESP environment that meets your organization's specific needs and that allows you prove compliance with legal and industry information protection regulations. Progent will help you define and implement policies that ProSight ESP will enforce, and Progent will monitor your network and react to alerts that call for urgent action. Progent can also assist your company to install and verify a backup and disaster recovery system like ProSight Data Protection Services so you can get back in business rapidly from a potentially disastrous cyber attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified endpoint protection and Microsoft Exchange email filtering.
ProSight DPS: Managed Backup and Recovery
ProSight Data Protection Services provide small and medium-sized businesses a low cost end-to-end solution for reliable backup/disaster recovery (BDR). Available at a fixed monthly price, ProSight Data Protection Services automates your backup processes and allows rapid restoration of vital data, applications and virtual machines that have become unavailable or corrupted due to component failures, software glitches, natural disasters, human mistakes, or malicious attacks like ransomware. ProSight DPS can help you protect, recover and restore files, folders, apps, system images, as well as Microsoft Hyper-V and VMware images/. Critical data can be backed up on the cloud, to an on-promises storage device, or to both. Progent's cloud backup consultants can deliver world-class expertise to set up ProSight DPS to to comply with regulatory requirements like HIPPA, FIRPA, and PCI and, when necessary, can help you to recover your business-critical information. Find out more about ProSight DPS Managed Backup.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that incorporates the infrastructure of leading information security companies to deliver centralized control and comprehensive protection for all your inbound and outbound email. The hybrid structure of Email Guard managed service integrates cloud-based filtering with a local gateway device to provide complete protection against spam, viruses, Denial of Service Attacks, DHAs, and other email-based malware. The Cloud Protection Layer acts as a preliminary barricade and blocks most unwanted email from reaching your network firewall. This decreases your exposure to external threats and saves network bandwidth and storage space. Email Guard's onsite security gateway device provides a further level of analysis for inbound email. For outbound email, the onsite security gateway provides AV and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The on-premises security gateway can also help Microsoft Exchange Server to track and protect internal email that originates and ends within your corporate firewall. For more details, see ProSight Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small or mid-size business can have its key servers and applications hosted in a protected Tier III data center on a fast virtual host configured and managed by Progent's network support professionals. Under Progent's ProSight Virtual Hosting model, the client retains ownership of the data, the OS software, and the apps. Because the environment is virtualized, it can be moved easily to a different hardware environment without requiring a time-consuming and technically risky reinstallation process. With ProSight Virtual Hosting, you are not locked into one hosting service. Learn more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to create, maintain, find and protect data related to your network infrastructure, processes, applications, and services. You can quickly locate passwords or serial numbers and be warned about upcoming expirations of SSL certificates ,domains or warranties. By updating and organizing your IT documentation, you can eliminate as much as 50% of time wasted looking for critical information about your network. ProSight IT Asset Management includes a centralized repository for holding and collaborating on all documents required for managing your network infrastructure such as recommended procedures and self-service instructions. ProSight IT Asset Management also offers a high level of automation for collecting and relating IT information. Whether youíre planning enhancements, doing maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the knowledge you require the instant you need it. Learn more about ProSight IT Asset Management service.
Expert Network Security Consulting
Every business ought to develop a carefully thought out security strategy that incorporates both pre-attack processes and response plans. The pre-attack plan is a set of steps that help to reduce vulnerabilities. The post-attack plan helps your security personnel to assess the impact resulting from a security penetration, fix the damage, document the experience, and get business functions restored as soon as feasible.
Progent's expert IT security consultants can to help your business to perform a full risk assessment and define a network security plan to establish security processes and controls to minimize ongoing assaults and threats.
CISM Accredited System Security Engineering Services
The CISM committee defines the basic capabilities and global standards of skill that IT security professionals are expected to learn. It provides executive management the assurance that consultants who have earned their CISM certification possess the experience and knowledge to provide effective security management and consulting services. Progent offers the services of CISM Premier security consultants to assist businesses with:
Learn more information concerning Progent's CISM Accredited IS Security Consulting Expertise.
- Information Security Processes
- Vulnerability Management
- IS Security Program Management
- Network Security Management
- Response Planning
CISSP Certified Security Engineering Expertise
CISSP recognizes mastery of a global standard for data security. ANSI (American National Standards Institute) has granted the CISSP credential accreditation in the area of information protection stipulated by ISO/IEC 17024. Progent can provide the services of security professionals who have earned CISSP accreditation. Progent can give you access to a CISSP-certified consultant to help your organization in a broad range of security areas such as:
Read more information concerning Progent's CISSP-certified Network Security Consulting Professionals.
- Security Administration Procedures
- Security Architecture and Models
- Access Management Solutions and Methodology
- Software Development Security
- Operations Security
- Physical Security
- Data Encryption Technology
- Telecom, Network and WAN Security
- Business Continuity Planning
CISSP-ISSAP Accredited Secure IT Architecture Engineering Support
Progent's CISSP-ISSAP Certified information system architecture engineers are experts who have earned ISSAP status through thorough examination and significant work with network security design. The Information System Security Architecture Professional (ISSAP) credential represents demonstrated competence in the more complex requirements of information system security architecture bounded by the broader field of IS security knowledge needed for CISSP accreditation. Progent's ISSAP-premier security specialists can help your business with all phases of architecture security including.
Learn additional information concerning Progent's ISSAP Qualified Secure Information System Architecture Engineering Services.
- Access Control Systems and Methodologies
- Telecommunications and Network Infrastructure Protection
- Cryptography Options
- Requirements Evaluation and Security Guidelines
- Business Continuity Planning (BCP) and Disaster Recovery Planning
- Hardware Security
CISA Qualified IS Security Auditing Consulting Assistance
The Certified Information Systems Auditor (CISA) credential is a recognized achievement that signifies expertise in IS security auditing. Accredited by ANSI, the CISA accreditation has candidates undergo a comprehensive test administered by the ISACA professional association. Progent's CISA-qualified security audit experts are available to assist your business in the areas of:
Get more information about Progent's CISA Certified Security Auditing Consulting Expertise.
- Information Systems Audit Services
- IT Administration
- Systems and Infrastructure Planned Useful Life
- Information Technology Support
- Protecting Information Assets
- Disaster Recovery Preparedness
The Certified in Risk and Information Systems Control (CRISC) program was established by ISACA in 2010 to verify an IT professional's skills to plan, deploy, and support IS controls to reduce risk. Progent can provide the expertise of a CRISC-certified consultant to help you to develop and execute a business continuity plan based on industry best practices identified by CRISC and geared to match your company's risk tolerance, business goals, and budgetary guidelines. Progent's CRISC-certified IT risk management engineers offer a range of risk identification services such as:
Find out the details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Experts.
- Gather information and review documentation to identify major vulnerabilities
- Inventory legal, regulatory, and business requirements and organizational policies associated with your network to determine their potential influence on your strategic objectives
- Point out possible threats for your operational processes to help in evaluating your corporate risk
- Create a risk awareness program and conduct training to ensure your stakeholders appreciate IT risk so they can contribute to your risk management program
- Connect identified risk vectors to related business processes to help assign risk ownership
- Validate risk tolerance with executive leadership and key stakeholders to make sure they match
GIAC Qualified Security Consulting Services
Global Information Assurance Certification was founded in 1999 to validate the knowledge of computer security experts. GIAC's mission is to make sure that an accredited security consultant has the skills necessary to provide services in important areas of system, information, and application software security. GIAC accreditations are acknowledged by companies and institutions throughout the world including and the United States National Security Agency (NSA). Progent's GIAC security audit experts are available to assist your company with:
Learn more information about Progent's GIAC Information Assurance Support.
- Auditing Networks
- Incident Response
- Traffic Analysis
- Web-based Application Security
- SIEM solutions
Get in Touch with a Progent Security Expert
To learn how you can access a Progent security engineer for remote or on-premises assistance in Georgia, phone 1-800-993-9400 or visit Online Computer Support.