Company computer networks in the state of Louisiana now have prompt and economical online technical support from Progent's certified security consultants to fix the toughest security problems. Rates are affordable, billing is per minute, sign-up is immediate, and support is unbeatable. Progent also offers help for complex projects that demand the knowledge of seasoned security engineers with high-level security credentials.

If your Louisiana network is far from more populated metropolitan areas like New Orleans, Baton Rouge, Shreveport, Metairie, or Lafayette, help from nearby accredited security engineers may be problematic when you have an urgent situation. This could mean a loss of revenue for your business, angry customers, idle workers, and distracted executives. By utilizing Progent's online services, you have access to a qualified security engineer who can offer assistance when you need it to keep your information system operating and salvage your information.

Progent can help you in a variety of ways in your initiatives to protect your network with services ranging from security audits to creating a company-wide security strategy. Progent offers economical service to help small and midsize companies to design and maintain secure IT environments based on Microsoft Windows and Cisco technology and that can include computers running UNIX or Linux platforms as well as BYOD users with Apple handhelds or Android or Windows Phone handsets.

Progent can also show you how to outsource spam filtering and defense against e-mail-based attacks. Email Guard is Progent's email filtering and encryption platform that incorporates the technology of top data security vendors to provide web-based management and comprehensive protection for your email traffic. The powerful structure of Progent's Email Guard integrates cloud-based filtering with a local security gateway appliance to provide advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-based malware. ProSight Email Guard's cloud filter serves as a first line of defense and blocks most threats from making it to your network firewall. This reduces your vulnerability to external threats and conserves system bandwidth and storage space. ProSight Email Guard's onsite security gateway appliance provides a deeper level of analysis for incoming email. For outgoing email, the on-premises gateway provides AV and anti-spam filtering, protection against data leaks, and email encryption. The on-premises security gateway can also help Exchange Server to monitor and protect internal email that originates and ends inside your corporate firewall.

Progent's certified professionals are available remotely or on site to offer a range of urgent or longer-term IT security services which include:

  • Run thorough network security audits
  • Recover rapidly after attacks
  • Install hardware and software firewalls
  • Configure safe methods for remote and mobile access
  • Deploy advanced applications for protection against spam and directory harvest attacks
  • Develop a company-wide security strategy with proactive network monitoring
  • Offer comprehensive Call Center Support
  • Help Develop a practical data backup and business continuity solution based on Microsoft DPM backup capability
If your company has an immediate need for IT security help, go to Progent's Emergency Online Network Help.

Progent's support professionals offer world-class services in vital facets of network protection including security evaluation, firewalls and VPN, and high-level security consulting.

System Assessment
Progent's certified security consultants can evaluate the vulnerability of your existing computer security implementation by performing exhaustive remote automated analysis based on sophisticated utilities and tested procedures. Progent's skill in administering this service saves you money and assures an objective picture of gaps. The information your company is provided can make up the basis of a network protection plan that can permit your network to run dependably and adapt quickly to new risks.

Automated Vulnerability Evaluation
Progent provides expertise in the application of security analysis software including Microsoft's MBSA and GFI LANguard Network Security Scanner for affordably performing a set of programmed network auditing checks to identify possible security weaknesses. Progent has extensive knowledge of other network auditing utilities including NMAP Port Scanner, AMAP Application Scanner, eEye Vulnerability Scanner, as well as utilities like Metasploit, Hydra, and Nikto. Progent can show you how to understand audit reports and respond effectively.

Progent can show you how to build protection into your company operations, configure scanning applications, define and implement a secure network environment, and recommend policies to maximize the safety of your IT system. Progent's security engineers are able to help you configure a firewall, design secure remote access to email and business applications, and integrate virtual private network. Find out additional information concerning Progent's automated security audits.

Security Inventory Scanning Packages for Small Businesses
Progent has put together two ultra-affordable security inventory and evaluation packages designed to enable small companies to get an impartial network security assessment from a certified security expert. With Progent's External Security Inventory Checkup, an engineer administers a comprehensive examination of your network from beyond your firewall to uncover potential risks in the security posture you expose to the outside world. With Progent's Internal Network Security Inventory Scan, a security expert executes a network scan from an authorized computer inside your company firewall to evaluate vulnerabilities to internal attacks. The two security inventory services are set up and run from a protected remote site. The process is overseen by an engineer who has earned top security credentials and who generates a document that summarizes and interprets the information collected by the security scan and proposes practical remediation where called for.

Network Security Penetration Testing Consulting
Stealth penetration checking is an important part of any comprehensive IT system security plan. Progentís security experts can perform extensive penetration tests without the awareness of your organization's internal IT resources. Stealth penetration checking uncovers whether current security defense tools such as intrusion incident warnings and event log analysis are correctly set up and actively monitored. Learn more concerning Progent's network penetration analysis consulting.

Firewalls and VPN Support
Progent's background in network security solutions includes in-depth field work with major firewalls and Virtual Private Network products from multiple companies including Cisco, Microsoft, and CheckPoint. Progent offers the support of consultants who have earned key industry certifications such as CCIE and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Integration and Debugging
The new Cisco ASA 5500-X Family Next-Generation Firewalls with Firepower Services provide significantly more performance than Cisco's previous firewalls and have replaced the ASA 5500 and PIX 500 security appliances for new installations. Since Cisco's purchase of Sourcefire, the whole family of ASA 5500-X devices can be provisioned to support Firepower Services, built on Sourcefire's Snort product, which is the market's most deployed intrusion protection system. Firepower services bring enhanced capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-qualified CCIE network experts can assist you to manage your current PIX or Cisco ASA 5500 security appliances and upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite support for ASA 5500-X firewalls with Firepower Services and can help your company to plan, integrate, tune, administer and debug firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services. Read additional information about Cisco ASA 5500-X Firewalls with Firepower integration and troubleshooting support.

Cisco Network Security and Virtual Private Network Engineering Services
Cisco's security and offsite access products provide a full range of easy-to-administer security products to help protect your wired and wireless network infrastructure. Cisco's VPN line includes switches, firewalls, intrusion detection systems and VPN appliances. Progent's professional consulting staff includes field-proven engineers with Cisco's CCIE and Cisco Certified Network Professional qualifications who can help your organization to select Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security technologies that fit best with your company goals. Learn more information about Progent's Engineering Services for Cisco Security Technology and Virtual Private Network Products.

Consulting Expertise for Other Firewall and Virtual Private Network Technology
Progent offers small and mid-size organizations expert support for Intrusion Protection products and IPsec VPN solutions from major firewall and Virtual Private Network security vendors such as Check Point Software, Juniper, and SonicWALL. Progent can show you how to create a comprehensive security plan and choose the right products from multiple suppliers to support your security objectives while sticking within your spending limits.

Progent's Low-Cost Managed Services for Information Security
Progent's value-priced ProSight portfolio of network monitoring and management services is designed to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance. ProSight managed services offered by Progent include:
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's email security platform that uses the services and infrastructure of leading data security companies to provide web-based control and world-class protection for all your inbound and outbound email. The hybrid architecture of Progent's Email Guard integrates a Cloud Protection Layer with a local gateway appliance to offer advanced defense against spam, viruses, Dos Attacks, DHAs, and other email-based malware. The Cloud Protection Layer acts as a preliminary barricade and keeps most threats from making it to your network firewall. This decreases your exposure to external attacks and saves network bandwidth and storage space. ProSight Email Guard's onsite security gateway device adds a deeper level of inspection for inbound email. For outgoing email, the on-premises gateway provides anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The onsite security gateway can also help Microsoft Exchange Server to track and protect internal email that originates and ends within your security perimeter. Learn more about Progent's ProSight Email Guard Spam Filtering, Virus Blocking, Email Content Filtering and Data Leakage Prevention.

ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection service that utilizes cutting edge behavior-based analysis tools to defend endpoint devices as well as servers and VMs against new malware attacks like ransomware and email phishing, which routinely escape traditional signature-based anti-virus products. ProSight ASM protects local and cloud-based resources and provides a single platform to address the complete threat progression including blocking, infiltration detection, containment, remediation, and forensics. Top features include one-click rollback with Windows Volume Shadow Copy Service and automatic network-wide immunization against newly discovered attacks. Find out more about Progent's ProSight Active Security Monitoring (ASM) Endpoint Protection and Ransomware Defense.

ProSight Data Protection Services: Managed Cloud Backup and Recovery
ProSight Data Protection Services offer small and mid-sized businesses a low cost and fully managed solution for secure backup/disaster recovery. Available at a fixed monthly cost, ProSight DPS automates and monitors your backup processes and allows rapid recovery of critical files, applications and VMs that have become lost or damaged as a result of component failures, software glitches, natural disasters, human mistakes, or malicious attacks such as ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, apps, system images, plus Microsoft Hyper-V and VMware virtual machine images. Critical data can be protected on the cloud, to an on-promises device, or mirrored to both. Progent's backup and recovery consultants can deliver advanced support to set up ProSight Data Protection Services to to comply with regulatory requirements such as HIPPA, FIRPA, and PCI and, when needed, can assist you to recover your business-critical data. Learn more about ProSight Data Protection Services Managed Backup.

Certified Network Security Planning
Any business should develop a thoroughly thought out security program that includes both preventive processes and response planning. The pre-attack plan is a set of steps intended to reduce security weaknesses. The reactive plan helps your network security engineers to assess the impact caused by a security penetration, fix the network, document the experience, and get the IT network running as quickly as feasible.

Progent's expert IT security consultants are available to help you to run a full vulnerability evaluation and create a company-wide security plan to implement security processes and controls to minimize future assaults and dangers.

CISM Qualified Information Security Engineering Assistance
The CISM organization defines the basic capabilities and international standards of skill that IT security professionals are expected to master. CISM provides executive management the confidence that consultants who have earned their CISM credential have the experience and capability to deliver efficient security management and consulting services. Progent offers the support of CISM certified security consultants to help companies with:

  • IS Security Strategies
  • Risk Analysis
  • Network Security Program Management
  • Information Security Administration
  • Recovery Management
Learn additional information about Progent's CISM Certified Information Security Support Professionals.

CISSP Qualified Security Consulting Support
The CISSP credential recognizes mastery of a global standard for data security. The American National Standards Institute has granted the CISSP credential recognition in the field of data security defined by ISO 17024. Progent can provide the services of security professionals who have earned CISSP certification. Progent can give you access to a CISSP-certified expert to help your business in a variety security fields including:

  • Security Administration Practices
  • Security Infrastructure and Models
  • Access Management Solutions and Methodology
  • Applications Development Security
  • Secure Operations
  • Physical Security
  • Cryptography Technology
  • Telecommunications, Network and Internet Security
  • Disaster Recovery Planning
Learn additional details concerning Progent's CISSP-certified Information Security Support Expertise.

ISSAP Certified Secure Network Architecture Engineering Services
Progent's ISSAP qualified network architecture engineers are experts who have been awarded ISSAP status through rigorous examination and extensive experience with network security design. The ISSAP certification represents proven competence in the more challenging requirements of information security architecture bounded by the broader scope of information security knowledge needed for CISSP certification. Progent's ISSAP-certified security specialists can help your business with all phases of secure network architecture including.

  • Access Management Mechanisms and Methodologies
  • Telecommunications and Network Security
  • Data Encryption Solutions
  • Requirements Evaluation and Security Standards
  • BCP and Disaster Recovery Planning (DRP)
  • Physical Security
Read additional information about Progent's ISSAP Certified Secure System Architecture Consulting Services.

CISA Certified Security Auditing Consulting Services
The Certified Information Systems Auditor (CISA) accreditation is a recognized qualification that indicates expertise in IS security audit and control. Certified by the American National Standards Institute (ANSI), the CISA accreditation has consultants undergo an extensive test administered by the ISACA professional association. Progent's CISA-certified IS security audit consultants can help your IT organization in the areas of:

  • Information Systems Audit Services
  • Information Technology Administration
  • Systems and Architecture Lifecycle
  • IT Service Delivery
  • Safeguarding Data Resources
  • Disaster Recovery Preparedness
Find out more information concerning Progent's CISA Certified Network Security Auditing Engineering Support.

CRISC Consultants
The Certified in Risk and Information Systems Control (CRISC) certification program was established by ISACA in 2010 to validate an IT professional's ability to design, deploy, and support information system control mechanisms to mitigate network risk. Progent offers the services of a CRISC-certified engineer to help your company to create and execute a workplace continuity plan based on leading practices identified by CRISC and geared to match your organization's risk tolerance, business objectives, and budgetary guidelines. Progent's CRISC-certified IT risk mitigation experts offer a variety of risk identification services such as:

  • Collect data and study documentation to identify significant risk scenarios
  • Inventory legal, regulatory, and business requirements and company policies associated with your information system to assess their possible impact on your business objectives
  • Point out possible vulnerabilities for your business processes to assist in evaluating your enterprise risk
  • Create a risk awareness initiative and provide seminars to make sure your stakeholders appreciate IT risk so they can assist with your risk management program
  • Connect key risk scenarios to related operational processes to help assign risk responsibility
  • Validate risk appetite with your senior leadership and key stakeholders to make sure they match
Get the details about Progent's Certified in Risk and Information Systems Control (CRISC) Experts.

GIAC Accredited Information System Security Engineering Expertise
GIAC (Global Information Assurance Certification) was established in 1999 to certify the skill of network security engineers. GIAC's goal is to make sure that a certified professional possesses the skills necessary to deliver services in key categories of system, information, and application program security. GIAC certifications are acknowledged by businesses and institutions around the world including and the United States National Security Agency (NSA). Progent's GIAC-certified network security audit experts are available to help your IT organization with:

  • Auditing Security Systems
  • Security Incident Handling
  • Traffic Analysis
  • Web Services Security
  • SIEM solutions
Read additional details concerning Progent's GIAC Information Assurance Expertise.

Talk to a Certified Security Specialist
To see how you can get in touch with a Progent security consultant for remote or onsite help in Louisiana, call 1-800-993-9400 or go to Online Network Support.

© 2002- 2018 Progent Corporation. All rights reserved.