Company computer networks in Tennessee can now get fast and affordable remote access to Progent's certified security support specialists to resolve complex security issues. The cost is affordable, billing is by the minute, sign-up is fast, and support is world class. Progent also offers help for long-term engagements that demand the services of senior security consultants with top security certifications.

In case your Tennessee network is situated away from major metropolitan areas including Memphis, Nashville, Knoxville, or Chattanooga, the availability of nearby certified network security professionals could be limited when there's an urgent situation. This could mean a loss of revenue for your business, upset customers, unproductive workers, and distracted executives. By calling Progent's online services, you have access to a Certified security consultant who can deliver assistance when you have to have it to get your computer network operating and recover your data.

Progent can help you in a variety of ways in your initiatives to protect your network with support services ranging from security audits to creating a company-wide security plan. Progent offers affordable service to help small and midsize companies to set up and manage protected networks based on Windows and Cisco products and that can include computers based on UNIX, Linux, Sun Solaris, or Mac OS X platforms as well as BYOD users with Apple iOS handhelds or Google Android or Windows Phone devices.

Progent can also show you how to outsource spam blocking and protection from email-borne attacks. Email Guard is Progent's email filtering and encryption platform that uses the technology of top information security companies to deliver web-based control and world-class security for all your email traffic. The hybrid architecture of Email Guard managed service combines a Cloud Protection Layer with a local gateway appliance to provide complete protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. The cloud filter serves as a preliminary barricade and keeps most threats from making it to your security perimeter. This decreases your exposure to inbound threats and conserves system bandwidth and storage. ProSight Email Guard's on-premises security gateway appliance adds a further level of analysis for incoming email. For outgoing email, the on-premises gateway provides anti-virus and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The on-premises gateway can also enable Microsoft Exchange Server to track and protect internal email that originates and ends within your corporate firewall.

Progent's security consultants are accessible remotely or in person to provide a range of urgent or project-based IT security services including:

If your company has an urgent need for IT security support, go to Progent's Urgent Online Technical Help.

Progent's security experts provide world-class services in key facets of network protection including security evaluation, firewall and VPN expertise, and advanced security consulting.

Security Assessment
Progent's certified security consultants can assess the strength of your current computer protection environment by performing exhaustive remote automated testing based on advanced utilities and proven procedures. Progent's skill in administering this service saves you consulting fees and assures a detailed picture of gaps. The knowledge your company is provided can form the foundation of a security plan that will permit your network to operate dependably and respond quickly to new threats.

Automated Security Analysis
Progent provides expertise in the application of security testing utilities including MBSA and GFI LANguard Network Security Scanner for economically performing a set of automatic system testing scans to identify possible security problems. Progent has broad knowledge of other network analysis products including NMAP Port Scanner, AMAP Application Scanner, eEye Vulnerability Scanner, plus tools such as Metasploit Framework, Netcat, and Nikto. Progent can show you how to make sense of audit reports and react appropriately.

Progent can show you how to build security into your company operations, configure scanning applications, define and implement a secure system architecture, and recommend policies to maximize the safety of your IT system. Progent's security consultants are ready to assist you to configure a firewall, implement secure remote connectivity to email and business applications, and integrate VPN. Find out additional information concerning Progent's network security evaluation.

Security Inventory and Evaluation Bundles for Small Businesses
Progent offers two ultra-affordable security inventory and evaluation packages intended to allow small businesses to get an independent network security assessment from a certified security consultant. With Progent's External Network Security Inventory Checkup, a security expert runs an extensive examination of your IT infrastructure from outside your firewall to uncover possible risks in the security posture you present to the outside world. With Progent's Internal Security Inventory Scan, a certified security professional runs a system scan from a secure computer inside your firewall to uncover vulnerabilities to inside threats. The two security inventory services are set up and executed from a protected external site. The project is managed by a consultant who has earned high-level security credentials and who produces a document that details and interprets the information collected by the scan and suggests practical improvements if called for.

Network Security Penetration Testing Support Services
Stealth penetration checking is a key component of any serious IT system security plan. Progentís security experts can perform extensive penetration checks without the awareness of your organization's in-house IT staff. Unannounced penetration checking shows whether current security monitoring tools such as intrusion detection alerts and event history analysis are correctly configured and consistently monitored. Learn additional information about Progent's network security penetration analysis support services.

Firewall and Virtual Private Network Expertise
Progent's background in security solutions includes in-depth familiarity with leading firewalls and VPN products from a variety of companies such as Cisco, Microsoft, and Symantec. Progent offers the services of consultants who have earned important networking certifications such as Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Integration and Troubleshooting
The latest generation of Cisco ASA 5500-X Series of firewalls with Firepower Services provide significantly more bang for the buck than Cisco's earlier firewalls and have replaced the ASA 5500 and PIX firewalls for all new deployments. Since Cisco's purchase of Sourcefire, the entire family of ASA 5500-X devices can be configured to enable Firepower Services, built on Sourcefire's Snort product, which is the world's most popular network intrusion protection system. Firepower services bring enhanced capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-premier CCIE network consultants can help your company to maintain your existing PIX or ASA 5500 firewalls or upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite support for ASA 5500-X firewalls with Firepower Services and can help you to design, integrate, tune, administer and debug firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. Find out additional information about Cisco ASA 5500-X Firewalls with Firepower configuration and troubleshooting services.

Cisco Security and VPN Engineering Expertise
Cisco's security and offsite connection products provide a full line of easy-to-administer security solutions to help protect your wired and wireless information system. Cisco's Virtual Private Network product family features routers, firewalls, intrusion detection systems and VPN concentrators. Progent's professional consulting staff includes experienced engineers with Cisco CCIE and Cisco Certified Network Professional certifications who are able to assist your organization to evaluate Cisco VPN, Cisco RADIUS Security, and other Cisco security solutions that fit most closely with your business objectives. Learn more details concerning Progent's Engineering Expertise for Cisco Security and VPN Appliances.

Engineering Expertise for Additional Firewall and Virtual Private Network Products
Progent provides small and mid-size businesses professional support for Intrusion Protection Systems and IPsec VPN products from leading firewall and VPN security vendors such as Check Point Software, Juniper Networks, and SonicWall. Progent can help you create a detailed security plan and choose the right products from multiple suppliers to achieve your security objectives while sticking within your budget restraints.

Progent's Fixed-price Managed Services for Information Assurance
Progent's value-priced ProSight series of outsourced network management services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. Managed services offered by Progent include:

ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring is an endpoint protection service that utilizes next generation behavior machine learning tools to defend endpoints and servers and VMs against modern malware attacks such as ransomware and email phishing, which easily get by legacy signature-matching AV tools. ProSight Active Security Monitoring safeguards local and cloud-based resources and offers a unified platform to automate the complete threat lifecycle including protection, identification, mitigation, remediation, and forensics. Key features include one-click rollback with Windows Volume Shadow Copy Service and real-time system-wide immunization against new attacks. Learn more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware defense.

ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Protection
ProSight Enhanced Security Protection services offer ultra-affordable in-depth protection for physical servers and VMs, workstations, smartphones, and Exchange Server. ProSight ESP uses adaptive security and advanced heuristics for continuously monitoring and reacting to security threats from all attack vectors. ProSight ESP offers firewall protection, intrusion alarms, device management, and web filtering via cutting-edge tools incorporated within a single agent managed from a unified console. Progent's security and virtualization experts can help your business to plan and implement a ProSight ESP environment that addresses your company's unique needs and that allows you achieve and demonstrate compliance with government and industry information protection regulations. Progent will assist you specify and configure security policies that ProSight ESP will manage, and Progent will monitor your network and react to alerts that require urgent attention. Progent's consultants can also help you to install and verify a backup and disaster recovery system like ProSight Data Protection Services (DPS) so you can recover rapidly from a potentially disastrous cyber attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Exchange email filtering.

ProSight DPS: Managed Cloud Backup and Recovery
ProSight Data Protection Services from Progent offer small and medium-sized businesses an affordable and fully managed solution for reliable backup/disaster recovery. For a fixed monthly cost, ProSight Data Protection Services automates and monitors your backup activities and allows rapid recovery of vital files, apps and VMs that have become unavailable or corrupted as a result of hardware breakdowns, software glitches, disasters, human mistakes, or malicious attacks such as ransomware. ProSight DPS can help you back up, retrieve and restore files, folders, applications, system images, plus Microsoft Hyper-V and VMware virtual machine images. Important data can be protected on the cloud, to an on-promises storage device, or mirrored to both. Progent's backup and recovery specialists can deliver world-class expertise to configure ProSight DPS to to comply with regulatory standards such as HIPPA, FINRA, PCI and Safe Harbor and, whenever needed, can help you to recover your business-critical information. Learn more about ProSight DPS Managed Backup.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering service that incorporates the technology of leading information security companies to deliver centralized management and world-class security for your inbound and outbound email. The powerful architecture of Email Guard combines a Cloud Protection Layer with an on-premises gateway device to offer complete protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-borne threats. The Cloud Protection Layer serves as a first line of defense and blocks the vast majority of unwanted email from reaching your security perimeter. This decreases your vulnerability to inbound threats and conserves system bandwidth and storage. Email Guard's on-premises security gateway device provides a deeper layer of inspection for incoming email. For outbound email, the local security gateway offers anti-virus and anti-spam protection, DLP, and email encryption. The local security gateway can also help Exchange Server to monitor and protect internal email that stays inside your corporate firewall. For more details, see Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size organization can have its key servers and apps hosted in a secure fault tolerant data center on a high-performance virtual host configured and managed by Progent's IT support professionals. With Progent's ProSight Virtual Hosting model, the customer owns the data, the OS platforms, and the applications. Because the environment is virtualized, it can be moved easily to a different hosting solution without requiring a lengthy and technically risky configuration process. With ProSight Virtual Hosting, your business is not tied one hosting service. Find out more details about ProSight Virtual Hosting services.

ProSight IT Asset Management: IT Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to create, maintain, retrieve and protect information related to your IT infrastructure, procedures, business apps, and services. You can instantly find passwords or serial numbers and be alerted about upcoming expirations of SSLs ,domains or warranties. By updating and organizing your network documentation, you can eliminate as much as half of time thrown away searching for critical information about your IT network. ProSight IT Asset Management features a centralized location for storing and sharing all documents required for managing your business network like standard operating procedures and self-service instructions. ProSight IT Asset Management also supports a high level of automation for gathering and associating IT information. Whether youíre planning improvements, performing regular maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the data you need the instant you need it. Find out more details about ProSight IT Asset Management service.

Certified Network Security Consulting
Any business ought to develop a thoroughly thought out security program that includes both pre-attack processes and response planning. The proactive strategy is a set of procedures that help to minimize security weaknesses. The reactive plan assists your network security personnel to assess the impact resulting from an attack, fix the system, record the experience, and get the IT network restored as rapidly as feasible.

Progent's certified IS security engineers can to help your company to run a complete vulnerability assessment and create a computer security plan to implement security processes and controls to reduce future assaults and threats.

CISM Accredited System Security Support Assistance
The Certified Information Security Manager (CISM) committee describes the core competencies and global standards of performance that information security professionals are expected to master. It provides business management the assurance that those who have earned their CISM credential have the experience and capability to provide effective security administration and consulting consulting. Progent offers the services of CISM Premier security consultants to assist companies with:

  • Network Security Processes
  • Vulnerability Management
  • Information Security Program Management
  • IS Security Administration
  • Recovery Planning
Learn additional details about Progent's CISM Accredited Security Support Services.

CISSP Certified Security Engineering Assistance
The CISSP credential recognizes expertise with a global standard for data security. The American National Standards Institute has granted the CISSP credential accreditation in the area of data security under ISO/IEC 17024. Progent offers access to of security consultants who have earned CISSP accreditation. Progent can give you access to a CISSP-certified professional to help your organization in a variety security fields such as:

  • Security Management Procedures
  • Security Architecture and Paradigms
  • Access Management Systems and Processes
  • Software Development Security
  • Operations Security
  • Site Security
  • Cryptography Technology
  • Telecom, LAN and WAN Security
  • Disaster Recovery Planning
Find out more information about Progent's CISSP Qualified Information Security Support Professionals.

CISSP-ISSAP Certified Secure IT Architecture Engineering Assistance
Progent's CISSP-ISSAP Premier system architecture professionals are experts who have earned ISSAP Certification through thorough testing and significant work with information security design. The ISSAP credential indicates demonstrated competence in the most challenging demands of information system security architecture within the broader field of information security knowledge required for CISSP certification. Progent's ISSAP-certified security specialists can help your company with all phases of secure network architecture such as.

  • Access Management Systems and Methodologies
  • Telecommunications and Network Infrastructure Protection
  • Cryptography Options
  • Needs Analysis and Security Standards
  • Business Continuity Planning and Disaster Recovery Planning (DRP)
  • Physical Security
Find out more information concerning Progent's ISSAP Accredited Secure Information System Architecture Engineering Expertise.

CISA Certified Information System Security Auditing Engineering Services
The Certified Information Systems Auditor credential is a prestigious achievement that indicates expertise in information system security audit and control. Accredited by the American National Standards Institute, the CISA credential has consultants undergo an extensive test given by the ISACA international professional group. Progent's CISA-qualified network security audit specialists are available to help your company in the areas of:

  • Information Systems Audit Process
  • Information Technology Enforcement
  • Network Assets and Infrastructure Lifecycle Planning
  • IT Service Delivery
  • Protecting Data Assets
  • Disaster Recovery Planning
Read more information about Progent's CISA Accredited IS Security Auditing Consulting Services.

Certified in Risk and Information Systems Control (CRISC) Experts
The Certified in Risk and Information Systems Control (CRISC) program was established by ISACA to validate a consultant's skills to design, implement, and support information system control mechanisms to reduce network risk. Progent offers the expertise of a CRISC-certified consultant to help your company to create and execute a business continuity plan that follows leading practices identified by CRISC and crafted to align with your company's risk appetite, business objectives, and budgetary guidelines. Progent's CRISC-certified IT risk mitigation experts can provide a variety of risk identification services including:

  • Gather information and study documentation to help identify major risk scenarios
  • Inventory statutory, industry, and business mandates and organizational standards related to your network to determine their potential influence on your strategic goals
  • Point out possible vulnerabilities for your operational processes to assist in analyzing your corporate risk
  • Create a risk awareness program and conduct training to make sure your organization appreciate IT risk so they can contribute to your risk control program
  • Connect key risk scenarios to related business processes to help assign risk ownership
  • Validate risk tolerance with executive management and key stakeholders to ensure they align
Get additional details about Progent's CRISC Risk Management Experts.

GIAC Accredited Information System Security Consulting Assistance
GIAC (Global Information Assurance Certification) was founded in 1999 to validate the knowledge of computer security experts. GIAC's goal is to ensure that a certified professional possesses the skills appropriate to deliver services in critical areas of network, data, and application program security. GIAC accreditations are recognized by businesses and institutions around the world including and the United States National Security Agency. Progent's GIAC network security audit specialists can assist your company in the areas of:

  • Auditing Security Systems
  • Security Incident Handling
  • Intrusion Detection
  • Web-based Application Security
  • SIEM solutions
Find out more details concerning Progent's GIAC Information Assurance Services.

Get in Touch with a Certified Progent Security Engineer
To find out how you can get in touch with a certified security engineer for remote or on-premises assistance in Tennessee, call 1-800-993-9400 or visit Remote Computer Help.