Small business IT networks in the state of Louisiana can depend on quick and affordable online technical support from Progent's certified network security professionals to help with urgent security issues. The cost is reasonable, charges are per minute, sign-up is fast, and service is unbeatable. Progent also provides help for long-term projects that demand the services of senior security consultants with high-level industry certifications.

If your Louisiana business is situated away from larger metropolitan neighborhoods like New Orleans, Baton Rouge, Shreveport, Metairie, or Lafayette, contact with nearby certified security experts is often problematic during an urgent situation. This can result in a loss of revenue for your company, angry clients, idle employees, and distracted executives. By utilizing Progent's online services, you can get in touch with a qualified security consultant ready to provide help whenever you need it to get your information system operating and restore your information.

Progent can assist you in your initiatives to defend your IT environment with support services that can range from network security assessments to creating a comprehensive security plan. Progent provides affordable service to assist companies of any size to set up and maintain secure networks based on Microsoft Windows and Cisco products and that may include computers based on UNIX, Linux, Sun Solaris, or Mac OS X operating systems as well as mobile clients with Apple iPhones and iPads or Android or Windows Phone smart phones and tablets.

Progent can also show you how to outsource spam filtering and protection from email-borne attacks. Email Guard is Progent's email filtering and encryption solution that uses the services and infrastructure of leading data security companies to provide web-based management and world-class security for your inbound and outbound email. The hybrid architecture of Email Guard managed service integrates a Cloud Protection Layer with a local security gateway appliance to offer advanced protection against spam, viruses, Denial of Service Attacks, DHAs, and other email-borne malware. The Cloud Protection Layer serves as a preliminary barricade and keeps the vast majority of threats from making it to your security perimeter. This decreases your vulnerability to inbound attacks and saves network bandwidth and storage space. ProSight Email Guard's onsite gateway device provides a further layer of inspection for inbound email. For outbound email, the onsite security gateway provides AV and anti-spam protection, policy-based Data Loss Prevention, and encryption. The local security gateway can also enable Exchange Server to monitor and safeguard internal email traffic that originates and ends within your security perimeter.

Progent's security engineers are available remotely or on premises to provide a range of urgent or project-based network security services which include:

  • Perform comprehensive network security audits
  • Recover quickly after serious security breaches
  • Install hardware and software firewalls
  • Implement safe methods for remote and mobile connectivity
  • Install advanced applications for automatic protection against spam and directory harvest attacks
  • Help create a comprehensive security plan with proactive security monitoring
  • Provide outsourced Help Desk Call Center Services
  • Develop an effective network backup and recovery strategy centered on Microsoft DPM automated backup technology
If your network has an immediate need for IT security support, refer to Progent's Urgent Remote Network Support.

Progent's support professionals offer world-class services in vital areas of network security that include analysis, firewalls and VPN, and high-level security consulting.

System Security Audits
Progent's expert security consultants can assess the strength of your existing computer protection implementation through exhaustive remote automated testing based on sophisticated utilities and tested procedures. Progent's skill in this service saves you money and assures an accurate picture of security holes. The knowledge your business gains can be used as the basis of a security strategy that will permit your network to operate dependably and adapt quickly to new risks.

Automated Network Vulnerability Assessment
Progent provides consulting in the application of security analysis utilities such as Microsoft Baseline Security Analyzer and GFI LANguard NSS for affordably performing a variety of programmed system auditing checks to uncover possible security vulnerabilities. Progent has extensive knowledge of other network analysis tools including NMAP, AMAP application mapper, eEye, as well as utilities like SolarWinds, Netcat, and Nikto. Progent can help you to make sense of testing reports and react appropriately.

Progent can show you how to design security into your company operations, install auditing software, plan and implement a protected network environment, and suggest policies to optimize the safety of your network. Progent's security consultants are available to assist you to set up a firewall, implement secure remote access to email and data, and install VPN. Find out additional information concerning Progent's automated security assessment.

Security Inventory Service Bundles for Small Companies
Progent has put together two low-cost security inventory and evaluation packages intended to allow small businesses to get an objective security evaluation from a qualified security consultant. With Progent's External Network Security Inventory Checkup, a security engineer administers a comprehensive examination of your network from outside your firewall to determine possible risks in the security profile you expose to the outside world. With Progent's Internal Security Inventory Scan, a certified security professional runs a network scan from an authorized computer within your company firewall to uncover vulnerabilities to internal threats. The two security inventory services are configured and executed from a protected remote location. The process is directed by an engineer who has earned high-level security credentials and who generates a report that details and interprets the information collected by the scan and proposes practical improvements if appropriate.

Stealth Intrusion Testing Support Services
Stealth penetration testing is an important part of any serious IT system security plan. Progentís security professionals can run thorough intrusion tests without the awareness of your organization's in-house network support resources. Unannounced penetration checking uncovers whether existing security monitoring tools such as intrusion incident warnings and event log monitoring are properly configured and actively monitored. Find out additional information on Progent's network penetration testing support services.

Firewall/VPN Solutions
Progent's expertise in security solutions includes extensive familiarity with leading firewalls and VPN products offered by a variety of vendors such as Cisco, Microsoft, and Juniper. Progent offers the services of engineers with key networking accreditations such as Cisco Certified Internetwork Expert (CCIE) and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Configuration and Debugging
The latest generation of Cisco ASA 5500-X Series of firewalls with Firepower Services provide significantly more bang for the buck than Cisco's earlier PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX security appliances for all new installations. Following Cisco's purchase of Sourcefire, the entire line of Cisco ASA 5500-X devices can be configured to support Firepower Services, based on Sourcefire's Snort technology, which is the market's most popular network intrusion protection system. Firepower services provide enhanced features such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can assist you to maintain your existing PIX or ASA 5500 security appliances or upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and onsite support for ASA 5500-X firewalls with Firepower Services and can assist you to plan, deploy, tune, administer and troubleshoot firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. Read additional information about ASA 5500-X Firewalls with Firepower Services configuration and debugging services.

Cisco Security and Virtual Private Network Consulting Expertise
Cisco's security and remote access technology offer a full range of manageable security solutions to help protect your wired and wireless network infrastructure. Cisco's Virtual Private Network product family includes switches, firewalls, intrusion detection devices and VPN concentrators. Progent's expert staff of consultants includes field-proven specialists with Cisco CCIE and Cisco Certified Network Professional certifications who are able to assist your organization to select Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security solutions that align best with your business objectives. Learn more details concerning Progent's Support Services for Cisco Security Solutions and VPN Products.

Consulting Services for Additional Firewall and VPN Products
Progent provides small and mid-size businesses professional support for Intrusion Protection products and IPsec VPN solutions from major firewall and VPN security companies including Check Point Software, Juniper Networks, and SonicWALL. Progent can show you how to design a comprehensive security plan and choose appropriate technologies from multiple vendors to achieve your security objectives while sticking within your budget limits.

Progent's Fixed-price Managed Services for Information Assurance
Progent's affordable ProSight family of managed services is intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance. ProSight managed services offered by Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring is an endpoint protection solution that utilizes cutting edge behavior-based machine learning technology to guard endpoints as well as physical and virtual servers against modern malware assaults like ransomware and file-less exploits, which routinely get by traditional signature-based anti-virus tools. ProSight Active Security Monitoring safeguards local and cloud resources and provides a unified platform to automate the complete threat lifecycle including protection, detection, containment, remediation, and post-attack forensics. Top capabilities include one-click rollback using Windows Volume Shadow Copy Service and automatic network-wide immunization against newly discovered threats. Learn more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.

ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Protection
Progent's ProSight Enhanced Security Protection managed services deliver affordable multi-layer security for physical and virtual servers, desktops, smartphones, and Exchange email. ProSight ESP uses contextual security and advanced heuristics for continuously monitoring and responding to cyber assaults from all vectors. ProSight ESP delivers firewall protection, intrusion alarms, device management, and web filtering via cutting-edge tools packaged within one agent accessible from a single control. Progent's security and virtualization consultants can help your business to design and implement a ProSight ESP deployment that addresses your organization's unique requirements and that allows you demonstrate compliance with legal and industry data protection regulations. Progent will help you define and implement policies that ProSight ESP will manage, and Progent will monitor your IT environment and respond to alarms that call for immediate action. Progent can also help you to install and verify a backup and disaster recovery solution such as ProSight Data Protection Services so you can get back in business rapidly from a potentially disastrous cyber attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint security and Exchange email filtering.

ProSight DPS: Managed Cloud Backup
ProSight Data Protection Services from Progent offer small and mid-sized organizations an affordable end-to-end service for reliable backup/disaster recovery (BDR). For a fixed monthly price, ProSight DPS automates your backup processes and enables fast recovery of critical data, apps and VMs that have become unavailable or corrupted as a result of hardware failures, software bugs, disasters, human mistakes, or malware attacks like ransomware. ProSight DPS can help you back up, retrieve and restore files, folders, apps, system images, as well as Microsoft Hyper-V and VMware virtual machine images. Critical data can be protected on the cloud, to a local device, or mirrored to both. Progent's cloud backup consultants can deliver world-class expertise to set up ProSight Data Protection Services to be compliant with government and industry regulatory requirements such as HIPPA, FIRPA, and PCI and, whenever necessary, can help you to recover your critical data. Find out more about ProSight DPS Managed Cloud Backup.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering service that incorporates the technology of top information security vendors to provide web-based control and world-class protection for all your inbound and outbound email. The powerful structure of Email Guard managed service integrates cloud-based filtering with an on-premises gateway appliance to offer advanced protection against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-based malware. Email Guard's cloud filter serves as a preliminary barricade and blocks most unwanted email from reaching your network firewall. This reduces your vulnerability to inbound attacks and saves system bandwidth and storage. Email Guard's onsite security gateway appliance provides a further layer of analysis for incoming email. For outgoing email, the local security gateway offers anti-virus and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The on-premises security gateway can also assist Microsoft Exchange Server to monitor and protect internal email that stays inside your security perimeter. For more details, visit Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small or mid-size organization can have its critical servers and applications hosted in a protected Tier III data center on a high-performance virtual machine host set up and managed by Progent's network support professionals. With Progent's ProSight Virtual Hosting service model, the customer owns the data, the OS platforms, and the applications. Because the system is virtualized, it can be moved easily to an alternate hardware environment without requiring a lengthy and difficult configuration procedure. With ProSight Virtual Hosting, your business is not tied one hosting provider. Find out more details about ProSight Virtual Hosting services.

ProSight IT Asset Management: Infrastructure Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to capture, maintain, retrieve and protect data about your network infrastructure, procedures, business apps, and services. You can quickly locate passwords or IP addresses and be warned automatically about upcoming expirations of SSLs or domains. By updating and organizing your network documentation, you can save as much as 50% of time wasted trying to find critical information about your network. ProSight IT Asset Management features a common location for storing and sharing all documents related to managing your network infrastructure like standard operating procedures and self-service instructions. ProSight IT Asset Management also offers a high level of automation for collecting and associating IT information. Whether youíre planning enhancements, performing regular maintenance, or responding to a crisis, ProSight IT Asset Management gets you the information you require as soon as you need it. Find out more details about ProSight IT Asset Management service.

Expert Security Design
Every company ought to develop a thoroughly considered security program that includes both pre-attack processes and reaction plans. The proactive plan is a collection of steps intended to reduce security weaknesses. The reactive strategy assists your security engineers to assess the impact resulting from an attack, fix the system, document the event, and get business functions running as rapidly as possible.

Progent's expert IS security engineers are available to help you to perform a full vulnerability evaluation and create a computer security plan to establish security policies and mechanisms to minimize future attacks and dangers.

CISM Certified Information Security Support Assistance
The CISM committee describes the basic competencies and international standards of skill that information security managers are expected to learn. CISM gives executive management the assurance that consultants who have earned their CISM credential possess the background and knowledge to deliver effective security management and support services. Progent can provide the services of CISM qualified security professionals to assist businesses with:

  • IS Security Strategies
  • Vulnerability Management
  • IS Security Implementation Management
  • Information Security Management
  • Response Planning
Learn additional information concerning Progent's CISM Information Security Consulting Expertise.

CISSP Certified Security Consulting Services
The CISSP credential recognizes mastery of a global standard for data security. The American National Standards Institute has awarded the CISSP credential recognition in the area of data protection under ISO 17024. Progent can provide the services of security professionals who have earned CISSP certification. Progent can give you access to a CISSP-certified expert to help your enterprise in a variety security areas including:

  • Security Management Procedures
  • Security Infrastructure and Paradigms
  • Access Management Systems and Methodology
  • Applications Development Security
  • Operations Security
  • Site Security
  • Encryption/Decryption Technology
  • Telecommunications, Network and WAN Security
  • Disaster Recovery Preparedness
Find out additional details concerning Progent's CISSP Qualified IS Security Engineering Professionals.

ISSAP Certified Secure Network Architecture Consulting Support
Progent's ISSAP qualified network architecture engineers are consultants who have been awarded ISSAP Certification as a result of thorough examination and extensive experience with information security design. The Information System Security Architecture Professional (ISSAP) certification represents demonstrated competence in the most in-depth requirements of IS security architecture within the broader field of information security knowledge required for CISSP accreditation. Progent's ISSAP-certified security experts can help your company with all aspects of secure network architecture such as.

  • Access Management Systems and Techniques
  • Telecommunications and Network Infrastructure Protection
  • Cryptography Solutions
  • Needs Analysis and Security Guidelines
  • BCP and DRP
  • Hardware Security
Find out more details about Progent's ISSAP Accredited Secure Information System Architecture Consulting Services.

CISA Qualified IS Security Auditing Engineering Support
The Certified Information Systems Auditor accreditation is a globally recognized achievement that signifies expertise in information system security auditing. Accredited by the American National Standards Institute, the CISA accreditation has candidates pass a comprehensive examination administered by the ISACA professional group. Progent's CISA-qualified information security audit experts are available to assist your company with:

  • IS Audit Services
  • Information Technology Enforcement
  • Network Assets and Architecture Lifecycle
  • IT Support
  • Safeguarding Information Assets
  • Business Continuity Preparedness
Get more details concerning Progent's CISA Qualified IS Security Auditing Consulting Assistance.

CRISC Experts
The CRISC program was established by ISACA in 2010 to verify a consultant's skills to plan, deploy, and support IS control mechanisms to reduce network risk. Progent offers the services of a CRISC-certified engineer to help your company to develop and carry out a business continuity plan that follows industry best practices identified by CRISC and crafted to align with your company's risk tolerance, business goals, and budgetary guidelines. Progent's CRISC-certified IT risk management consultants can provide a variety of risk identification services such as:

  • Collect data and review documentation to identify major risk scenarios
  • Inventory legal, regulatory, and business mandates and company standards associated with your network to assess their potential influence on your strategic objectives
  • Point out potential threats for your business workflows to help in evaluating your enterprise risk
  • Create a risk awareness initiative and provide seminars to make sure your organization appreciate IS risk so they can contribute to your risk control process
  • Connect key risk scenarios to related operational processes to help determine risk ownership
  • Validate risk appetite with your senior management and major stakeholders to make sure they are in agreement
Get additional information about Progent's Certified in Risk and Information Systems Control (CRISC) Experts.

GIAC Certified Network Security Consulting Support
GIAC was founded in 1999 to validate the skill of network security experts. GIAC's goal is to verify that a certified security consultant has the knowledge appropriate to provide support in important categories of network, information, and application software security. GIAC certifications are recognized by companies and government organizations around the world including and the United States NSA. Progent's GIAC information security audit consultants are available to assist your IT organization in the areas of:

  • Auditing IT Infrastructure
  • Security Incident Response
  • Intrusion Detection
  • Web-based Services Security
  • SIEM solutions
Find out more details about Progent's GIAC Information Assurance Support.

Get in Touch with a Security Specialist
To find out how to contact a certified security engineer for remote or on-premises expertise in Louisiana, phone 1-800-993-9400 or visit Online Computer Help.














© 2002- 2018 Progent Corporation. All rights reserved.