Business IT networks in the state of Georgia can now get fast and affordable remote technical support from Progent's certified network security engineers to help with the toughest security issues. Rates are affordable, charges are by the minute, sign-up is immediate, and service is world class. Progent also provides assistance for complex projects that demand the knowledge of senior security engineers with top industry credentials.
In case your Georgia business is based away from major urban neighborhoods like Atlanta, Augusta, Columbus, Savannah, or Athens, access to nearby certified security engineers is often limited when you have a crisis. This can cause a loss of productivity for your business, angry customers, idle employees, and defocused management. By utilizing Progent's remote support, you can get in touch with a Premier security engineer who can deliver expertise when you require it to keep your information system running and restore your data.
Progent can help you at any level in your efforts to protect your network with services ranging from security assessments to creating a company-wide security strategy. Progent offers economical support to assist businesses of all sizes to set up and manage protected IT environments based on Windows and Cisco technology and that may include servers and desktops based on UNIX, Linux, Sun Solaris, or Mac OS X platforms plus mobile users with Apple iOS iPhones and iPads or Android or Windows Phone handsets.
Progent can also show you how to outsource spam filtering and defense against email-borne assaults. Email Guard is Progent's email filtering and encryption platform that incorporates the technology of leading information security vendors to deliver web-based control and comprehensive security for your email traffic. The powerful structure of Progent's Email Guard managed service integrates cloud-based filtering with an on-premises security gateway device to offer advanced protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-based threats. ProSight Email Guard's cloud filter serves as a first line of defense and keeps the vast majority of threats from making it to your security perimeter. This decreases your exposure to inbound threats and saves system bandwidth and storage space. ProSight Email Guard's on-premises security gateway device adds a further level of inspection for incoming email. For outbound email, the onsite gateway provides AV and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The local security gateway can also enable Exchange Server to track and protect internal email that stays within your corporate firewall.
Progent's security professionals are available remotely or on premises to offer a variety of emergency or longer-term computer security services including:
If your company has an urgent requirement for computer security support, refer to Progent's Emergency Online Network Support.
Progent's engineers offer advanced support in vital facets of system protection including security assessment, firewall and VPN expertise, and high-level security consulting.
System Security Assessment
Progent's expert security consultants can evaluate the effectiveness of your current computer protection systems by performing comprehensive remote automated analysis via advanced utilities and proven procedures. Progent's skill in administering this testing saves your company consulting fees and assures an objective portrayal of weaknesses. The information your company gains can make up the basis of a security strategy that will allow your network to run dependably and adapt rapidly to new risks.
Automated Vulnerability Analysis
Progent offers consulting in the application of security analysis products including Microsoft's MBSA and LANguard from GFI for economically running a set of programmed system testing scans to uncover potential security holes. Progent has broad experience with other network analysis utilities including NMAP Port Scanner, AMAP application mapper, eEye, plus utilities like Metasploit Framework, Netcat, Hydra, and Nikto. Progent can show you how to understand testing reports and respond effectively.
Progent can help you design security into your business processes, install scanning tools, plan and deploy a protected system architecture, and recommend policies to maximize the security of your network. Progent's security consultants are able to show you how to set up a firewall, design safe remote access to email and business applications, and integrate virtual private network. Find out additional information about Progent's network security audits.
Security Inventory Service Bundles for Small Businesses
Progent offers two low-cost security inventory bundles intended to enable small companies to get a professional network security evaluation from a certified security expert. With Progent's External Security Inventory Scan, a security engineer administers an extensive examination of your network from outside your company firewall to uncover potential weaknesses in the security profile you expose to the public. With Progent's Internal Network Security Inventory Scan, a security engineer runs a network scan from an authorized machine inside your firewall to uncover the risk to inside assaults. The two security inventory services are configured and run from a secured remote location. The project is managed by an engineer with top security credentials and who generates a report that details and analyzes the information captured by the security scan and suggests practical remediation if appropriate.
Stealth Penetration Testing Consulting
Stealth intrusion testing is an important part of any serious IT system security strategy. Progentís security professionals can perform extensive penetration tests without the awareness of your organization's in-house network support staff. Stealth penetration testing shows whether current security defense tools such as intrusion incident warnings and event history analysis are properly configured and actively checked. Learn additional information about Progent's stealth penetration testing consulting.
Firewall and Virtual Private Network Expertise
Progent's background in security solutions encompasses in-depth field work with major firewalls and Virtual Private Network (VPN) products from a variety of companies including Cisco, Microsoft, and Symantec. Progent can provide the services of consultants who have earned key networking accreditations such as Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer (MCSE).
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Configuration and Troubleshooting
The current Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services deliver significantly more bang for the buck than Cisco's previous PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 firewalls for all new deployments. Following Cisco's purchase of Sourcefire, the entire line of ASA 5500-X firewalls can be provisioned to support Firepower Services, based on Sourcefire's Snort technology, which is the market's most popular network intrusion protection system (IPS). Firepower services provide powerful new features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-premier CCIE network experts can assist you to maintain your legacy PIX or ASA 5500 security appliances and migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises help with ASA 5500-X firewalls with Firepower Services and can help your business to design, integrate, optimize, administer and troubleshoot firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services. Learn more details about ASA Firewalls with Firepower configuration and debugging support.
Cisco Security and VPN Consulting Expertise
Cisco's security and offsite access products represent a comprehensive line of easy-to-administer security products to help protect your local and remote network infrastructure. Cisco's VPN product family includes routers, firewalls, intrusion detection devices and Virtual Private Network concentrators. Progent's professional consulting staff includes experienced specialists with Cisco Certified Internetwork Expert and CCNP qualifications who are able to help your business to select Cisco VPN, Cisco RADIUS Security, and other Cisco security solutions that fit most closely with your business goals. Learn additional details about Progent's Engineering Services for Cisco Security Solutions and Virtual Private Network Products.
Engineering Expertise for Additional Firewall and VPN Products
Progent offers small and mid-size companies expert consulting for Intrusion Protection Systems and IPsec VPN technology from leading firewall and Virtual Private Network security vendors such as Check Point Software, Juniper Networks, and SonicWall. Progent can show you how to create a comprehensive security plan and select the right products from multiple vendors to support your security goals while sticking within your spending limits.
Progent's Fixed-price Managed Services for Information Security
Progent's low-cost ProSight portfolio of managed services is intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all facets of information assurance and compliance. ProSight managed services offered by Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that utilizes next generation behavior-based machine learning technology to guard endpoints as well as physical and virtual servers against modern malware attacks like ransomware and email phishing, which routinely get by legacy signature-based AV products. ProSight ASM safeguards on-premises and cloud-based resources and offers a unified platform to address the entire malware attack lifecycle including protection, detection, mitigation, cleanup, and forensics. Key capabilities include single-click rollback using Windows Volume Shadow Copy Service and automatic system-wide immunization against new attacks. Learn more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Protection
ProSight Enhanced Security Protection (ESP) services deliver affordable multi-layer security for physical and virtual servers, desktops, smartphones, and Exchange Server. ProSight ESP uses adaptive security and modern behavior analysis for round-the-clock monitoring and responding to security assaults from all vectors. ProSight ESP delivers firewall protection, penetration alerts, endpoint management, and web filtering via leading-edge technologies packaged within one agent accessible from a unified console. Progent's data protection and virtualization consultants can help you to design and configure a ProSight ESP environment that addresses your company's unique needs and that allows you prove compliance with government and industry information protection regulations. Progent will assist you specify and configure policies that ProSight ESP will enforce, and Progent will monitor your network and respond to alarms that require urgent attention. Progent can also assist your company to set up and test a backup and disaster recovery solution like ProSight Data Protection Services (DPS) so you can recover rapidly from a potentially disastrous cyber attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified endpoint security and Microsoft Exchange filtering.
ProSight Data Protection Services: Managed Cloud Backup and Recovery
ProSight Data Protection Services provide small and medium-sized organizations a low cost end-to-end service for reliable backup/disaster recovery (BDR). For a fixed monthly rate, ProSight Data Protection Services automates your backup activities and allows fast restoration of critical files, apps and VMs that have become unavailable or damaged as a result of component breakdowns, software glitches, natural disasters, human error, or malware attacks such as ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, applications, system images, plus Microsoft Hyper-V and VMware images/. Critical data can be backed up on the cloud, to a local storage device, or to both. Progent's cloud backup specialists can deliver world-class support to set up ProSight DPS to be compliant with regulatory requirements like HIPPA, FINRA, and PCI and, whenever necessary, can assist you to restore your critical data. Learn more about ProSight DPS Managed Backup.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering and email encryption service that incorporates the technology of leading data security companies to provide centralized management and world-class protection for your email traffic. The hybrid structure of Email Guard combines cloud-based filtering with an on-premises gateway appliance to provide advanced defense against spam, viruses, Dos Attacks, DHAs, and other email-based malware. Email Guard's Cloud Protection Layer serves as a first line of defense and keeps most threats from reaching your network firewall. This reduces your vulnerability to inbound threats and conserves network bandwidth and storage space. Email Guard's onsite security gateway device adds a further level of inspection for incoming email. For outgoing email, the onsite gateway offers anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The on-premises gateway can also help Microsoft Exchange Server to monitor and safeguard internal email that originates and ends within your security perimeter. For more details, see Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size organization can have its critical servers and apps hosted in a secure fault tolerant data center on a fast virtual host set up and maintained by Progent's network support experts. With the ProSight Virtual Hosting service model, the customer retains ownership of the data, the operating system platforms, and the applications. Because the environment is virtualized, it can be moved easily to a different hardware environment without requiring a lengthy and difficult configuration procedure. With ProSight Virtual Hosting, your business is not tied a single hosting service. Learn more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: IT Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to create, update, find and protect data about your network infrastructure, processes, business apps, and services. You can instantly find passwords or serial numbers and be warned about upcoming expirations of SSL certificates or warranties. By cleaning up and organizing your network documentation, you can save as much as half of time spent trying to find vital information about your IT network. ProSight IT Asset Management features a centralized repository for storing and sharing all documents required for managing your business network such as recommended procedures and self-service instructions. ProSight IT Asset Management also offers a high level of automation for gathering and relating IT data. Whether youíre making enhancements, performing regular maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the information you need the instant you need it. Find out more about Progent's ProSight IT Asset Management service.
Certified Network Security Consulting
Every business ought to develop a carefully thought out security strategy that includes both preventive procedures and reaction planning. The pre-attack strategy is a set of steps designed to reduce security weaknesses. The post-attack strategy assists your company's security engineers to assess the impact resulting from an attack, repair the network, record the experience, and get business functions running as soon as feasible.
Progent's certified IT security consultants can to assist you to perform a comprehensive risk evaluation and create a network security strategy to implement security processes and mechanisms to reduce future assaults and threats.
CISM Certified Information Security Engineering Expertise
The CISM committee defines the basic capabilities and global standards of skill that IT security professionals are required to learn. It gives business management the assurance that those who have qualified for their CISM credential have the background and knowledge to provide effective security management and support consulting. Progent offers the services of CISM Premier security consultants to assist businesses with:
Find out more details concerning Progent's CISM Accredited Information Security Consulting Expertise.
- Network Security Processes
- Risk Analysis
- Information Security Program Management
- Network Security Administration
- Response Planning
CISSP Certified Security Engineering Services
CISSP certification recognizes expertise with a global standard for data security. ANSI has awarded the CISSP credential recognition in the field of data security under ISO/IEC 17024. Progent offers access to of security consultants who have earned CISSP accreditation. Progent can give you access to a CISSP-certified consultant to help your business in a variety security areas including:
Learn additional information about Progent's CISSP-certified Cybersecurity Support Professionals.
- Security Management Practices
- Security Architecture and Models
- Access Management Solutions and Processes
- Applications Development Security
- Secure Operations
- Physical Security
- Data Encryption Technology
- Telecommunications, Network and Internet Security
- Disaster Recovery Preparedness
CISSP-ISSAP Certified Secure IT Architecture Engineering Services
Progent's CISSP-ISSAP Certified network architecture professionals are consultants who have been awarded ISSAP status as a result of thorough examination and significant experience with network security design. The ISSAP credential indicates proven mastery in the most challenging requirements of information system security architecture within the broader scope of IS security knowledge required for CISSP accreditation. Progent's ISSAP-certified security specialists can assist your company with all phases of secure network architecture including.
Find out more information concerning Progent's ISSAP Certified Secure Information System Architecture Support Expertise.
- Access Control Systems and Techniques
- Phone System and System Infrastructure Security
- Cryptography Solutions
- Needs Evaluation and Security Guidelines
- Business Continuity Planning and Disaster Recovery Planning (DRP)
- Hardware Security
CISA Certified Network Security Auditing Consulting Services
The Certified Information Systems Auditor (CISA) accreditation is a globally recognized achievement that indicates expertise in information system security auditing. Accredited by the American National Standards Institute, the CISA accreditation has candidates pass an extensive test given by the ISACA professional association. Progent's CISA-qualified information security audit specialists are available to assist your IT organization with:
Get more details about Progent's CISA Certified Information System Security Auditing Engineering Services.
- Information Systems Audit Process
- IT Enforcement
- Network Assets and Architecture Lifecycle Planning
- Information Technology Support
- Safeguarding Information Resources
- Disaster Recovery Planning
The Certified in Risk and Information Systems Control (CRISC) certification program was established by ISACA to verify an IT professional's skills to design, deploy, and support IS control mechanisms to reduce network risk. Progent offers the expertise of a CRISC-certified engineer to help you to develop and carry out a business continuity plan that follows industry best practices identified by CRISC and geared to align with your organization's risk appetite, business goals, and IT budget. Progent's CRISC-certified network risk management consultants can provide a variety of risk evaluation services including:
Find out the details about Progent's CRISC Risk Management Experts.
- Collect data and review documentation to identify major risk scenarios
- Identify legal, regulatory, and contractual mandates and organizational standards associated with your network to assess their potential impact on your business goals
- Point out potential vulnerabilities for your business workflows to assist in analyzing your corporate risk
- Develop a risk awareness program and conduct seminars to ensure your stakeholders understand information system risk so they can assist with your risk control program
- Match identified risk vectors to related operational processes to help determine risk ownership
- Determine risk appetite with your senior management and major stakeholders to ensure they align
GIAC Accredited IS Security Engineering Support
GIAC was established in 1999 to validate the knowledge of network security experts. GIAC's goal is to verify that a certified security consultant possesses the knowledge appropriate to deliver services in critical areas of network, data, and program security. GIAC certifications are acknowledged by companies and government organizations all over the world including and the U.S. NSA. Progent's GIAC IS security audit engineers can assist your IT organization with:
Read additional details concerning Progent's GIAC Information Assurance Expertise.
- Auditing Security Systems
- Security Incident Handling
- Intrusion Detection
- Web Application Security
- SIEM solutions
Talk to a Progent Security Specialist
To learn how you can get in touch with a certified security engineer for online or onsite assistance in Georgia, phone 1-800-993-9400 or go to Remote Network Help.