Company networks in the state of Georgia can have prompt and affordable remote help from Progent's accredited network security experts to assist with the toughest security issues. The cost is affordable, billing is by the minute, engagement is immediate, and support is unbeatable. Progent also provides help for complex engagements that demand the services of seasoned security engineers with high-level industry certifications.

In case your Georgia company is some distance from more populated metropolitan areas like Atlanta, Augusta, Columbus, Savannah, or Athens, contact with nearby certified security support specialists could be limited when you have an urgent situation. This can cause lost revenue for your company, angry customers, unproductive workers, and distracted management. By utilizing Progent, you can get in touch with a Premier security engineer who can offer assistance when you require it to get your network on line and recover your information.

Progent can assist you at any level in your initiatives to defend your information system with support services ranging from security checks to developing a comprehensive security strategy. Progent provides affordable service to assist companies of any size to design and maintain protected networks based on Microsoft Windows and Cisco technology and that can include computers running UNIX, Linux, Sun Solaris, or Mac OS X platforms plus BYOD users with Apple handhelds or Google Android or Windows Phone handsets.

Progent can also assist you to outsource spam filtering and defense against email-borne attacks. Email Guard is Progent's email security solution that incorporates the services and infrastructure of leading data security companies to provide centralized management and world-class security for all your inbound and outbound email. The powerful architecture of Progent's Email Guard managed service combines a Cloud Protection Layer with an on-premises security gateway device to offer complete protection against spam, viruses, Denial of Service Attacks, DHAs, and other email-based threats. ProSight Email Guard's Cloud Protection Layer serves as a first line of defense and keeps most unwanted email from making it to your security perimeter. This reduces your vulnerability to inbound attacks and saves network bandwidth and storage space. ProSight Email Guard's on-premises security gateway device adds a deeper layer of analysis for inbound email. For outgoing email, the onsite gateway offers AV and anti-spam protection, protection against data leaks, and email encryption. The on-premises gateway can also help Exchange Server to track and protect internal email that originates and ends inside your security perimeter.

Progent's certified consultants are accessible online or in person to offer a variety of urgent or project-based IT security services such as:

If your network has an urgent need for computer security support, go to Progent's Urgent Remote Technical Help.

Progent's consultants offer advanced services in vital facets of system security that include security evaluation, firewall and VPN expertise, and high-level security consulting.

System Assessment
Progent's certified security consultants can assess the strength of your existing network protection systems through exhaustive remote automated analysis based on advanced software tools and tested procedures. Progent's experience in this service saves your company money and offers a detailed picture of weaknesses. The knowledge your company gains can form the foundation of a security strategy that will permit your information system to operate dependably and adapt quickly to future risks.

Automated Security Audits
Progent provides expertise in the application of security auditing products such as MBSA and GFI LANguard for affordably running a set of automatic network auditing scans to identify possible security gaps. Progent has broad knowledge of additional security auditing tools such as NMAP Port Scanner, AMAP application mapper, eEye Vulnerability Scanner, as well as utilities like SolarWinds, Hydra, and Nikto. Progent can help you to understand audit reports and react effectively.

Progent can help you design security into your company operations, install scanning tools, plan and implement a secure network architecture, and suggest procedures to optimize the security of your network. Progent's security consultants are available to assist you to configure a firewall, implement secure remote access to email and business applications, and install VPN. Learn more on Progent's automated security analysis.

Security Inventory and Evaluation Bundles for Small Companies
Progent offers two low-cost security inventory service packages designed to enable small businesses to receive an independent network security assessment from an accredited security consultant. With Progent's External Security Inventory Checkup, an engineer runs a comprehensive test of your network from beyond your firewall to determine possible risks in the security profile you expose to the outside world. With Progent's Internal Security Inventory Checkup, a security expert runs a system scan from an authorized machine within your company firewall to determine your exposure to inside assaults. The two security inventory packages are set up and executed from a secured remote site. The process is overseen by a consultant who has earned high-level security accreditations and who generates a document that summarizes and interprets the information captured by the scan and proposes practical improvements where called for.

Network Security Penetration Analysis Support Services
Stealth penetration checking is an important component of any serious IT system security strategy. Progentís security professionals can perform thorough intrusion tests without the knowledge of your company's internal network support resources. Unannounced penetration testing shows whether existing security defense tools such as intrusion incident warnings and event history analysis are correctly configured and consistently monitored. Find out more concerning Progent's network penetration testing support services.

Firewall and Virtual Private Network Expertise
Progent's background in network security technology includes extensive field work with major firewalls and Virtual Private Network products from a variety of companies including Cisco, Microsoft, and CheckPoint. Progent offers the services of consultants who have earned important industry accreditations such as CCIE and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Integration and Debugging
The new ASA 5500-X Family Next-Generation Firewalls with Firepower Services offer substantially more bang for the buck than Cisco's previous PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 security appliances for all new installations. Following Cisco's purchase of Sourcefire, the entire line of ASA 5500-X devices can be provisioned to enable Firepower Services, built on Sourcefire's Snort technology, which is the market's most deployed network intrusion protection system. Firepower services bring enhanced features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-premier CCIE network experts can help you to maintain your existing PIX or ASA 5500 security appliances or migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite help with ASA 5500-X firewalls with Firepower Services and can assist your business to design, deploy, optimize, manage and troubleshoot firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. Read more details about ASA 5500-X Firewalls with Firepower Services integration and troubleshooting support.

Cisco Security and Virtual Private Network Engineering Expertise
Cisco's network security and offsite access technology provide a complete line of manageable security products to help safeguard your wired and wireless network infrastructure. Cisco's VPN product family includes routers, firewalls, intrusion detection devices and VPN appliances. Progent's expert consulting staff includes experienced engineers with Cisco Certified Internetwork Expert and Cisco Certified Network Professional certifications who are able to help your business to select Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security solutions that fit most closely with your company goals. Find out additional details about Progent's Support Expertise for Cisco Security Technology and Virtual Private Network Products.

Consulting Expertise for Other Firewall and Virtual Private Network Products
Progent provides small and mid-size organizations professional support for Intrusion Protection products and IPsec VPN solutions from major firewall and Virtual Private Network security companies including WatchGuard, Juniper Networks, and Symantec. Progent can show you how to create a detailed security strategy and choose the right technologies from a variety of vendors to achieve your security goals while sticking within your spending limits.

Progent's Fixed-price Managed Services for Information Security
Progent's affordable ProSight portfolio of managed services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. Managed services available from Progent include:

ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection service that incorporates next generation behavior-based analysis technology to guard endpoint devices as well as physical and virtual servers against modern malware assaults such as ransomware and file-less exploits, which routinely get by traditional signature-matching anti-virus tools. ProSight Active Security Monitoring safeguards local and cloud-based resources and offers a unified platform to manage the entire malware attack progression including protection, detection, containment, remediation, and post-attack forensics. Key features include one-click rollback with Windows VSS and automatic network-wide immunization against new attacks. Learn more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware defense.

ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Protection
ProSight Enhanced Security Protection (ESP) managed services offer economical multi-layer protection for physical and virtual servers, desktops, smartphones, and Exchange email. ProSight ESP uses contextual security and advanced machine learning for round-the-clock monitoring and responding to security threats from all attack vectors. ProSight ESP provides firewall protection, penetration alarms, endpoint control, and web filtering via cutting-edge technologies packaged within a single agent accessible from a unified console. Progent's data protection and virtualization experts can help your business to plan and implement a ProSight ESP environment that addresses your company's specific needs and that helps you demonstrate compliance with government and industry data protection regulations. Progent will help you define and configure security policies that ProSight ESP will manage, and Progent will monitor your network and respond to alerts that call for immediate action. Progent's consultants can also help you to install and test a backup and disaster recovery solution like ProSight Data Protection Services so you can get back in business quickly from a destructive security attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint security and Exchange filtering.

ProSight Data Protection Services: Managed Backup
ProSight Data Protection Services from Progent provide small and medium-sized businesses an affordable and fully managed service for secure backup/disaster recovery (BDR). For a fixed monthly cost, ProSight DPS automates your backup activities and allows rapid restoration of critical data, applications and VMs that have become lost or damaged as a result of hardware breakdowns, software bugs, natural disasters, human mistakes, or malware attacks like ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, apps, system images, as well as Microsoft Hyper-V and VMware virtual machine images. Critical data can be protected on the cloud, to an on-promises device, or to both. Progent's BDR specialists can deliver advanced expertise to configure ProSight Data Protection Services to be compliant with regulatory standards such as HIPPA, FINRA, and PCI and, whenever needed, can help you to recover your business-critical information. Find out more about ProSight Data Protection Services Managed Cloud Backup.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that incorporates the infrastructure of leading information security vendors to provide web-based control and comprehensive security for your inbound and outbound email. The hybrid structure of Progent's Email Guard integrates a Cloud Protection Layer with a local gateway device to provide complete defense against spam, viruses, Denial of Service Attacks, DHAs, and other email-based threats. Email Guard's cloud filter serves as a preliminary barricade and keeps the vast majority of unwanted email from reaching your security perimeter. This decreases your exposure to inbound threats and saves system bandwidth and storage space. Email Guard's onsite gateway device adds a deeper layer of inspection for incoming email. For outbound email, the local gateway provides anti-virus and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The onsite security gateway can also assist Exchange Server to track and protect internal email that originates and ends inside your corporate firewall. For more details, see ProSight Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small or mid-size organization can have its critical servers and apps hosted in a protected Tier III data center on a fast virtual host set up and maintained by Progent's network support professionals. With Progent's ProSight Virtual Hosting model, the customer owns the data, the OS platforms, and the applications. Since the environment is virtualized, it can be moved easily to an alternate hosting solution without a lengthy and difficult reinstallation process. With ProSight Virtual Hosting, you are not locked into a single hosting service. Find out more about ProSight Virtual Hosting services.

ProSight IT Asset Management: IT Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to capture, maintain, retrieve and safeguard data related to your network infrastructure, procedures, applications, and services. You can instantly find passwords or IP addresses and be warned about impending expirations of SSL certificates ,domains or warranties. By updating and managing your IT documentation, you can save as much as half of time wasted trying to find critical information about your IT network. ProSight IT Asset Management features a centralized location for storing and collaborating on all documents required for managing your network infrastructure like recommended procedures and self-service instructions. ProSight IT Asset Management also supports advanced automation for gathering and relating IT data. Whether youíre making enhancements, doing regular maintenance, or responding to a crisis, ProSight IT Asset Management gets you the data you require as soon as you need it. Find out more about Progent's ProSight IT Asset Management service.

Certified Network Security Consulting
Every business ought to develop a thoroughly thought out security program that includes both pre-attack processes and response planning. The pre-attack strategy is a set of mechanisms that help to reduce security weaknesses. The reactive strategy helps your security personnel to assess the damage caused by an attack, repair the damage, record the experience, and get the IT network restored as soon as possible.

Progent's expert IT security engineers can to help you to perform a complete risk evaluation and create a computer security strategy to implement security policies and mechanisms to mitigate ongoing assaults and threats.

CISM Qualified Network Security Consulting Services
The CISM committee describes the basic capabilities and global standards of skill that information security professionals are required to master. It gives business management the confidence that consultants who have qualified for their CISM certification have the experience and knowledge to provide effective security management and support consulting. Progent can provide the services of CISM Premier security consultants to help companies with:

  • Network Security Strategies
  • Vulnerability Management
  • Information Security Program Management
  • IS Security Management
  • Response Management
Learn more information concerning Progent's CISM Certified Information Security Consulting Professionals.

CISSP Qualified Security Engineering Assistance
The CISSP credential recognizes expertise with a worldwide standard for information security. ANSI (American National Standards Institute) has awarded the CISSP credential recognition in the area of information security under ISO 17024. Progent offers access to of security professionals who have qualified for CISSP certification. Progent can provide a CISSP-certified professional to help your organization in a broad range of security fields such as:

  • Security Administration Practices
  • Security Infrastructure and Models
  • Access Control Systems and Methodology
  • Software Development Security
  • Operations Security
  • Physical Security
  • Data Encryption Mechanisms
  • Telecommunications, LAN and Internet Security
  • Disaster Recovery Planning
Find out more details concerning Progent's CISSP Qualified Security Support Professionals.

CISSP-ISSAP Accredited Secure System Architecture Engineering Services
Progent's CISSP-ISSAP Premier information system architecture professionals are consultants who have earned ISSAP Certification as a result of rigorous testing and extensive experience with network security design. The Information System Security Architecture Professional (ISSAP) certification represents demonstrated skill in the most challenging demands of information security architecture within the wider field of information security knowledge needed for CISSP certification. Progent's ISSAP-premier security consultants can help your business with all phases of secure network architecture including.

  • Access Management Systems and Methodologies
  • Telecommunications and Network Infrastructure Protection
  • Data Encryption Solutions
  • Needs Evaluation and Security Standards
  • Business Continuity Planning and DRP
  • Hardware Security
Find out more information concerning Progent's ISSAP Accredited Secure Information System Architecture Engineering Professionals.

CISA Qualified Network Security Auditing Engineering Support
The Certified Information Systems Auditor credential is a recognized achievement that represents mastery in network security audit and control. Accredited by the American National Standards Institute, the CISA accreditation has consultants pass an extensive test given by the ISACA international professional group. Progent's CISA-certified network security audit engineers are available to help your company in the areas of:

  • IS Audit Services
  • Information Technology Governance
  • Network Assets and Infrastructure Lifecycle Planning
  • Information Technology Support
  • Protecting Data Resources
  • Business Continuity Planning
Read more information concerning Progent's CISA Certified Security Auditing Engineering Services.

CRISC Consultants
The Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA in 2010 to validate a consultant's ability to design, implement, and maintain information system control mechanisms to mitigate network risk. Progent offers the expertise of a CRISC-certified engineer to help your company to develop and execute a workplace continuity strategy that follows industry best practices promoted by CRISC and crafted to align with your company's risk tolerance, business objectives, and IT budget. Progent's CRISC-qualified network risk management consultants offer a range of risk identification services such as:

  • Gather data and review documentation to identify major vulnerabilities
  • Identify statutory, regulatory, and contractual requirements and company standards associated with your information system to determine their potential impact on your business goals
  • Point out possible threats for your operational workflows to assist in evaluating your enterprise risk
  • Create a risk awareness initiative and conduct training to ensure your stakeholders understand IT risk so they can assist with your risk management program
  • Connect identified risk vectors to your associated business processes to help determine risk responsibility
  • Determine risk appetite with executive leadership and key stakeholders to ensure they are in agreement
Learn more details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Qualified Information System Security Consulting Services
GIAC (Global Information Assurance Certification) was established in 1999 to certify the knowledge of network security engineers. GIAC's mission is to verify that a certified security consultant possesses the skills necessary to deliver services in critical areas of system, information, and application security. GIAC accreditations are recognized by businesses and institutions all over the world including and the United States NSA. Progent's GIAC-certified IS security audit consultants are available to assist your IT organization with:

Learn more details concerning Progent's GIAC Information Assurance Expertise.

Get in Touch with a Security Expert
To see how to get in touch with a Progent security engineer for remote or on-premises expertise in Georgia, phone 1-800-993-9400 or go to Online Computer Help.