Business computer networks in Tennessee can depend on quick and economical online access to Progent's accredited network security professionals to fix critical security problems. The cost is affordable, billing is by the minute, engagement is quick, and support is world class. Progent also provides assistance for complex engagements that requires the services of senior security consultants with high-level industry certifications.
If your Tennessee small business is outside of more populated urban areas such as Memphis, Nashville, Knoxville, or Chattanooga, the availability of nearby accredited security support specialists may be limited when there's an urgent situation. This could mean a drop in revenue for your company, angry customers, unproductive employees, and distracted executives. By utilizing Progent's online services, you have access to a Premier security engineer ready to offer expertise when you have to have it to get your computer network on line and salvage your information.
Progent can help you in a variety of ways in your initiatives to protect your information system with support services that can range from network security assessments to developing a company-wide security strategy. Progent provides affordable support to help companies of any size to configure and maintain secure IT environments based on Microsoft Windows and Cisco products and that may include servers and desktops running UNIX, Linux, Solaris, or Apple Mac OS X platforms as well as mobile users with Apple iPhones and iPads or Android or Windows Phone smart phones and tablets.
Progent can also show you how to outsource spam blocking and defense against email-borne attacks. Email Guard is Progent's email filtering and encryption solution that incorporates the technology of top data security companies to provide centralized management and world-class security for your inbound and outbound email. The hybrid structure of Email Guard combines cloud-based filtering with a local gateway appliance to offer complete defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. ProSight Email Guard's Cloud Protection Layer acts as a preliminary barricade and keeps most unwanted email from making it to your security perimeter. This decreases your exposure to external threats and conserves system bandwidth and storage. ProSight Email Guard's on-premises security gateway device adds a further layer of analysis for inbound email. For outgoing email, the onsite gateway provides AV and anti-spam filtering, protection against data leaks, and encryption. The onsite gateway can also help Microsoft Exchange Server to track and protect internal email that stays inside your security perimeter.
Progent's security engineers are accessible online or on site to offer a range of emergency or project-based computer security services including:
If your company has an urgent requirement for computer security support, refer to Progent's Urgent Online Network Help.
- Perform comprehensive network security evaluations
- Recuperate quickly after virus and worm attacks
- Configure firewalls from multiple vendors
- Configure secure methods for remote and mobile access
- Install effective software for automatic defense against viruses, spam and directory harvest attacks
- Help create a comprehensive security strategy with proactive security monitoring
- Offer comprehensive Call Center Support
- Create a practical network backup and restore solution centered on Data Protection Manager (DPM) backup technology
Progent's engineers offer advanced services in vital areas of network protection that include security assessment, firewalls and VPN, and high-level security consulting.
System Security Assessment
Progent's certified security consultants can assess the strength of your current computer protection implementation through exhaustive remote automated testing via advanced software tools and proven procedures. Progent's experience in administering this testing saves your company time and money and offers a detailed picture of system vulnerability. The information your IT organization gains can be used as the foundation of a security strategy that will allow your information system to operate safely and react rapidly to future risks.
Automated Network Vulnerability Evaluation
Progent provides consulting in the application of security testing software including MBSA and GFI LANguard for affordably performing a variety of programmed network auditing scans to uncover possible security weaknesses. Progent has extensive knowledge of other security analysis utilities such as NMAP Port Scanner, AMAP, eEye, plus tools such as Metasploit, Netcat, and Nikto. Progent can show you how to understand audit reports and respond effectively.
Progent can show you how to build protection into your business operations, configure scanning tools, plan and implement a protected network architecture, and recommend policies to optimize the safety of your IT system. Progent's security engineers are able to show you how to configure a firewall, implement secure remote connectivity to email and business applications, and integrate VPN. Learn more on Progent's automated security analysis.
Security Inventory Service Packages for Small Businesses
Progent offers two low-cost security inventory service bundles intended to enable small companies to get a professional network security assessment from a qualified security engineer. With Progent's External Network Security Inventory Scan, an engineer administers a comprehensive test of your IT infrastructure from beyond your company firewall to uncover possible weaknesses in the security profile you expose to the outside world. With Progent's Internal Network Security Inventory Scan, a security expert executes a network scan from an authorized machine inside your company firewall to determine vulnerabilities to internal assaults. The two security inventory services are configured and run from a secured external location. The project is directed by an engineer who has earned high-level security credentials and who generates a document that summarizes and interprets the information captured by the security scan and suggests cost-effective remediation where called for.
Network Penetration Testing Consulting
Stealth penetration testing is a key part of any serious network security plan. Progentís security professionals can perform extensive intrusion tests without the knowledge of your organization's internal network support staff. Unannounced penetration checking uncovers whether current security defense tools such as intrusion incident alerts and event history analysis are properly configured and actively monitored. Find out more concerning Progent's stealth security penetration analysis support services.
Firewall And Virtual Private Network (VPN) Expertise
Progent's expertise in network security technology encompasses extensive field work with major firewalls and Virtual Private Network products from multiple companies including Cisco, Microsoft, and Symantec. Progent can provide the support of consultants with important industry certifications including CCIE and Microsoft Certified Systems Engineer.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Firewalls Configuration and Debugging
The current Cisco ASA 5500-X Family of firewalls with Firepower Services offer significantly more value than Cisco's legacy firewalls and have superseded the ASA 5500 and PIX 500 security appliances for all new deployments. After Cisco's acquisition of Sourcefire, the entire line of ASA 5500-X firewalls can be provisioned to enable Firepower Services, based on Sourcefire's Snort product, which is the world's most deployed network intrusion protection system (IPS). Firepower services bring enhanced capabilities including advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-certified CCIE network experts can assist your company to maintain your legacy PIX or ASA 5500 firewalls and upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite help with ASA 5500-X firewalls with Firepower Services and can assist your business to plan, configure, tune, manage and debug firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Learn additional information about Cisco ASA 5500-X Firewalls with Firepower Services configuration and troubleshooting services.
Cisco Network Security and Virtual Private Network Engineering Services
Cisco's security and offsite access products offer a comprehensive range of easy-to-administer security products to help protect your wired and wireless information system. Cisco's Virtual Private Network line includes switches, firewalls, intrusion detection devices and VPN appliances. Progent's expert staff of consultants includes experienced engineers with Cisco's CCIE and Cisco Certified Network Professional qualifications who are able to assist your business to select Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security solutions that align most closely with your company objectives. Learn additional information about Progent's Consulting Services for Cisco Security and Virtual Private Network Appliances.
Consulting Expertise for Additional Firewall and VPN Products
Progent offers small and medium size companies expert support for Intrusion Protection Systems and IPsec VPN technology from leading firewall and VPN security vendors including WatchGuard, Juniper Networks, and Symantec. Progent can help you create a comprehensive security plan and select appropriate technologies from a variety of vendors to achieve your security goals while staying within your spending limits.
Progent's Fixed-price Managed Services for Information Assurance
Progent's affordable ProSight family of outsourced network management services is designed to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all facets of information assurance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection solution that utilizes cutting edge behavior-based machine learning technology to defend endpoint devices and servers and VMs against new malware assaults like ransomware and file-less exploits, which routinely evade legacy signature-based anti-virus tools. ProSight Active Security Monitoring safeguards on-premises and cloud-based resources and offers a unified platform to automate the entire threat lifecycle including blocking, detection, mitigation, cleanup, and forensics. Key features include single-click rollback using Windows Volume Shadow Copy Service (VSS) and automatic system-wide immunization against new attacks. Learn more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Security
ProSight Enhanced Security Protection services deliver economical in-depth security for physical and virtual servers, desktops, smartphones, and Exchange Server. ProSight ESP utilizes adaptive security and advanced machine learning for round-the-clock monitoring and responding to cyber assaults from all attack vectors. ProSight ESP offers two-way firewall protection, intrusion alerts, device control, and web filtering via cutting-edge tools incorporated within a single agent managed from a unified console. Progent's security and virtualization consultants can help you to plan and configure a ProSight ESP environment that meets your company's unique needs and that helps you demonstrate compliance with government and industry data protection regulations. Progent will help you define and implement policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alarms that call for urgent attention. Progent can also help you to set up and verify a backup and restore system such as ProSight Data Protection Services so you can recover rapidly from a destructive security attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint protection and Exchange filtering.
ProSight Data Protection Services: Managed Cloud Backup
ProSight Data Protection Services offer small and mid-sized businesses an affordable end-to-end service for reliable backup/disaster recovery. For a fixed monthly price, ProSight DPS automates and monitors your backup processes and enables rapid restoration of vital files, applications and VMs that have become lost or damaged due to hardware failures, software bugs, disasters, human mistakes, or malicious attacks like ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, applications, system images, as well as Microsoft Hyper-V and VMware images/. Critical data can be backed up on the cloud, to a local storage device, or mirrored to both. Progent's cloud backup consultants can deliver world-class support to configure ProSight DPS to to comply with government and industry regulatory requirements such as HIPPA, FIRPA, PCI and Safe Harbor and, when needed, can help you to recover your business-critical information. Find out more about ProSight Data Protection Services Managed Backup.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that uses the technology of leading data security vendors to deliver web-based management and world-class protection for all your email traffic. The powerful structure of Email Guard managed service integrates cloud-based filtering with a local gateway appliance to offer advanced defense against spam, viruses, Dos Attacks, DHAs, and other email-based malware. The cloud filter acts as a preliminary barricade and keeps the vast majority of threats from making it to your network firewall. This reduces your vulnerability to external threats and conserves network bandwidth and storage space. Email Guard's onsite security gateway device adds a further level of analysis for inbound email. For outgoing email, the onsite gateway offers AV and anti-spam protection, DLP, and email encryption. The local gateway can also help Exchange Server to monitor and safeguard internal email that stays inside your corporate firewall. For more information, visit ProSight Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size organization can have its key servers and apps hosted in a secure fault tolerant data center on a high-performance virtual host configured and managed by Progent's network support experts. Under Progent's ProSight Virtual Hosting service model, the customer retains ownership of the data, the OS software, and the apps. Since the system is virtualized, it can be ported easily to a different hosting environment without a time-consuming and difficult reinstallation process. With ProSight Virtual Hosting, you are not tied a single hosting service. Learn more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to capture, update, retrieve and protect information related to your IT infrastructure, processes, business apps, and services. You can instantly locate passwords or IP addresses and be warned automatically about impending expirations of SSL certificates ,domains or warranties. By updating and managing your IT documentation, you can save as much as 50% of time spent trying to find critical information about your IT network. ProSight IT Asset Management includes a centralized repository for holding and collaborating on all documents required for managing your network infrastructure like standard operating procedures and self-service instructions. ProSight IT Asset Management also offers a high level of automation for collecting and relating IT information. Whether youíre planning enhancements, doing maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the knowledge you need as soon as you need it. Find out more about Progent's ProSight IT Asset Management service.
Expert Security Design
Any company should have a carefully thought out security strategy that incorporates both proactive procedures and response planning. The proactive plan is a collection of mechanisms designed to minimize security weaknesses. The reactive plan helps your company's security personnel to evaluate the impact caused by a security penetration, repair the damage, record the event, and get the IT network operational as rapidly as possible.
Progent's expert IT security consultants can to assist your business to perform a full risk evaluation and define a computer security strategy to implement security policies and mechanisms to reduce future assaults and threats.
CISM Accredited System Security Support Assistance
The Certified Information Security Manager (CISM) committee describes the basic capabilities and international standards of performance that IT security managers are expected to learn. CISM provides executive management the assurance that consultants who have earned their CISM credential have the experience and capability to provide efficient security management and support consulting. Progent offers the expertise of CISM Certified security consultants to assist businesses with:
Find out additional information about Progent's CISM Information Security Engineering Professionals.
- IS Security Strategies
- Risk Management
- Information Security Program Management
- Information Security Administration
- Response Management
CISSP Qualified Security Consulting Services
The CISSP credential recognizes expertise with an international standard for information security. The American National Standards Institute has granted certification accreditation in the area of information protection stipulated by ISO/IEC 17024. Progent can provide access to of security professionals who have qualified for CISSP certification. Progent can provide a CISSP-certified consultant to help your enterprise in a broad range of security fields such as:
Read additional details about Progent's CISSP Security Consulting Expertise.
- Security Administration Practices
- Security Infrastructure and Paradigms
- Access Control Systems and Methodology
- Software Development Security
- Operations Security
- Site Security
- Cryptography Technology
- Telecommunications, Network and Internet Security
- Disaster Recovery Preparedness
CISSP-ISSAP Accredited Secure System Architecture Consulting Assistance
Progent's CISSP-ISSAP Premier IT architecture professionals are experts who have been awarded ISSAP Certification through thorough examination and extensive work with network security design. The Information System Security Architecture Professional (ISSAP) certification indicates proven mastery in the more challenging demands of IS security architecture bounded by the wider field of information system security knowledge required for CISSP accreditation. Progent's ISSAP-premier security experts can help your business with all aspects of architecture security including.
Learn more information concerning Progent's ISSAP Qualified Secure System Architecture Support Professionals.
- Access Control Mechanisms and Methodologies
- Phone System and Network Protection
- Cryptography Options
- Needs Analysis and Security Criteria
- BCP and DRP
- Site Security
CISA Certified Network Security Auditing Consulting Services
The Certified Information Systems Auditor accreditation is a globally recognized achievement that signifies mastery in IS security audit and control. Certified by ANSI, the CISA accreditation has consultants undergo a comprehensive test administered by the ISACA professional association. Progent's CISA-certified security audit consultants are available to help your business with:
Learn more details concerning Progent's CISA Certified IS Security Auditing Engineering Services.
- Information Systems Audit Process
- Information Technology Governance
- Network Assets and Infrastructure Lifecycle
- IT Service Delivery
- Safeguarding Data Assets
- Business Continuity Preparedness
The Certified in Risk and Information Systems Control (CRISC) program was established by ISACA to verify a consultant's skills to plan, implement, and support information system controls to reduce risk. Progent can provide the services of a CRISC-certified engineer to assist you to create and carry out a workplace continuity strategy based on leading practices identified by CRISC and crafted to match your company's risk tolerance, business objectives, and budgetary guidelines. Progent's CRISC network risk management specialists offer a range of risk assessment services such as:
Read more details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.
- Gather information and study documentation to identify major vulnerabilities
- Inventory legal, industry, and business requirements and company standards associated with your network to assess their potential influence on your strategic objectives
- Point out possible threats for your operational workflows to help in analyzing your enterprise risk
- Create a risk awareness program and conduct seminars to make sure your organization understand IT risk so they can contribute to your risk control process
- Match key risk scenarios to related operational processes to help assign risk responsibility
- Determine risk tolerance with executive leadership and major stakeholders to ensure they match
GIAC Certified Security Engineering Expertise
GIAC (Global Information Assurance Certification) was founded in 1999 to validate the skill of IT security experts. GIAC's goal is to assure that an accredited security consultant possesses the skills needed to provide support in vital categories of system, data, and application software security. GIAC certifications are recognized by businesses and government organizations around the world including and the U.S. National Security Agency. Progent's GIAC IS security audit consultants are available to help your business with:
Read additional details about Progent's GIAC Information Assurance Services.
- Auditing Networks
- Security Incident Handling
- Intrusion Detection
- Web Application Security
- SIEM solutions
Contact a Security Specialist
To see how you can access a certified security engineer for online or on-premises help in Tennessee, phone 1-800-993-9400 or go to Online Computer Help.