Business information networks in Louisiana can depend on fast and affordable remote access to Progent's accredited security professionals to fix urgent security problems. Rates are competitive, billing is by the minute, engagement is immediate, and support is world class. Progent also offers help for complex engagements that requires the expertise of senior security consultants with top industry credentials.

In case your Louisiana company is situated far from more populated urban areas such as New Orleans, Baton Rouge, Shreveport, Metairie, or Lafayette, the availability of local certified network security experts may be problematic during a security disaster. This could mean a drop in productivity for your business, upset clients, unproductive employees, and distracted executives. By calling Progent's remote support, you can get in touch with a qualified security engineer ready to offer help whenever you have to have it to keep your information system running and restore your information.

Progent can assist you in all your initiatives to defend your network with support services ranging from security audits to creating a company-wide security strategy. Progent offers economical support to assist small and midsize companies to set up and maintain safe networks based on Microsoft Windows and Cisco technology and that can include servers and desktops running UNIX or Linux operating systems plus BYOD users with Apple handhelds or Google Android or Windows Phone handsets.

Progent can also assist you to outsource spam filtering and defense against email-borne attacks. Email Guard is Progent's email security platform that incorporates the services and infrastructure of leading data security companies to deliver web-based management and comprehensive protection for all your email traffic. The powerful structure of Email Guard combines a Cloud Protection Layer with a local gateway device to offer complete protection against spam, viruses, Denial of Service Attacks, DHAs, and other email-based threats. Email Guard's Cloud Protection Layer acts as a preliminary barricade and blocks most threats from reaching your security perimeter. This reduces your exposure to inbound attacks and conserves network bandwidth and storage space. Email Guard's onsite security gateway appliance provides a further layer of inspection for incoming email. For outbound email, the local gateway provides anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The onsite gateway can also help Exchange Server to track and safeguard internal email traffic that stays inside your security perimeter.

Progent's certified experts are accessible remotely or on premises to provide a variety of emergency or longer-term IT security services including:

  • Run comprehensive network security evaluations
  • Clean up promptly after virus and worm attacks
  • Configure and troubleshoot firewalls
  • Implement safe solutions for offsite and mobile connectivity
  • Install effective utilities for protection against spam and DHAs
  • Develop a company-wide security plan with round-the-clock security monitoring
  • Provide comprehensive Help Desk Services
  • Create an effective backup and business continuity solution based on Microsoft DPM backup/restore technology
If your network has an immediate need for computer security help, refer to Progent's Urgent Online Technical Help.

Progent's consultants provide advanced services in key facets of computer protection that include security assessment, firewall and VPN expertise, and high-level security planning.

Security Audits
Progent's certified security consultants can evaluate the vulnerability of your current computer security environment through exhaustive remote automated testing via sophisticated software tools and tested techniques. Progent's skill in administering this service saves you time and money and offers an objective portrayal of system vulnerability. The knowledge your business is provided can make up the foundation of a security strategy that can allow your network to operate safely and adapt rapidly to new threats.

Automated Security Evaluation
Progent offers consulting in the application of security evaluation utilities such as Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard for affordably performing a variety of automatic system auditing checks to identify potential security gaps. Progent has extensive knowledge of other security analysis products such as NMAP, AMAP Application Scanner, eEye, as well as utilities like Metasploit, Netcat, Socat, and Nikto. Progent can help you to understand audit reports and react appropriately.

Progent can help you design protection into your company processes, install scanning tools, define and deploy a protected system environment, and suggest policies to maximize the safety of your network. Progent's security consultants are able to help you configure a firewall, implement secure remote connectivity to email and business applications, and integrate VPN. Learn more concerning Progent's network security audits.

Security Inventory Service Packages for Small Businesses
Progent has put together two low-cost security inventory and evaluation bundles designed to allow small businesses to receive an independent network security assessment from a certified security consultant. With Progent's External Network Security Inventory Scan, a security engineer runs a comprehensive examination of your network from outside your firewall to uncover possible weaknesses in the security profile you present to the public. With Progent's Internal Security Inventory Checkup, a security expert runs a network scan from a secure computer within your company firewall to evaluate the risk to inside threats. The two security inventory services are configured and run from a secured remote location. The project is managed by a consultant who has earned top security credentials and who produces a document that details and analyzes the data collected by the scan and proposes cost-effective improvements where called for.

Stealth Intrusion Testing Support Services
Stealth penetration testing is a key part of any serious IT system security strategy. Progentís security experts can run extensive penetration tests without the awareness of your organization's internal IT staff. Stealth penetration checking shows whether existing security monitoring tools such as intrusion detection alerts and event history monitoring are correctly set up and consistently checked. Learn more concerning Progent's network penetration analysis support services.

Firewall And Virtual Private Network (VPN) Support
Progent's background in network security solutions includes in-depth familiarity with leading firewalls and VPN products offered by a variety of companies such as Cisco, Microsoft, and CheckPoint. Progent can provide the support of engineers who have earned key networking certifications such as CCIE and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Integration and Troubleshooting
The new ASA 5500-X Family Next-Generation Firewalls with Firepower Services provide substantially more bang for the buck than Cisco's legacy PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX firewalls for all new deployments. Following Cisco's purchase of Sourcefire, the entire family of Cisco ASA 5500-X devices can be provisioned to enable Firepower Services, built on Sourcefire's Snort product, which is the market's most deployed intrusion protection system. Firepower services provide powerful new capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can help your company to manage your current PIX or ASA 5500 security appliances or upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and onsite support for ASA 5500-X firewalls with Firepower Services and can assist your company to design, integrate, tune, manage and debug firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. Find out more details about Cisco ASA Firewalls with Firepower integration and debugging support.

Cisco Network Security and VPN Engineering Services
Cisco's security and remote connection technology represent a comprehensive line of manageable security solutions to help protect your wired and wireless network infrastructure. Cisco's Virtual Private Network line includes routers, firewalls, intrusion detection systems and VPN concentrators. Progent's professional consulting staff includes field-proven engineers with Cisco's CCIE and CCNP qualifications who can help your company to evaluate Cisco VPN, Cisco RADIUS Security, and additional Cisco security technologies that align most closely with your business objectives. Read additional details about Progent's Support Services for Cisco Security Solutions and VPN Appliances.

Consulting Services for Additional Firewall and Virtual Private Network Technology
Progent offers small and mid-size businesses expert consulting for Intrusion Protection Systems and IPsec VPN technology from major firewall and Virtual Private Network security companies including WatchGuard, Juniper Networks, and SonicWALL. Progent can help you create a detailed security plan and choose appropriate products from multiple vendors to support your security objectives while staying within your budget limits.

Progent's Fixed-price Managed Services for Information Security
Progent offers a collection of affordable, fixed-price monthly managed services intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance. Managed services available from Progent include:
Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
Email Guard is Progent's email security solution that uses the technology of leading data security companies to provide centralized management and world-class security for your inbound and outbound email. The powerful architecture of Email Guard managed service combines a Cloud Protection Layer with a local security gateway device to provide advanced defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. The cloud filter acts as a first line of defense and keeps most threats from making it to your network firewall. This decreases your vulnerability to external threats and conserves network bandwidth and storage. Email Guard's onsite gateway appliance adds a deeper layer of inspection for inbound email. For outgoing email, the on-premises gateway provides anti-virus and anti-spam protection, policy-based Data Loss Prevention, and encryption. The onsite gateway can also help Exchange Server to track and protect internal email that stays within your security perimeter. Learn more about Progent's Email Guard Spam Filtering, Virus Defense, Email Content Filtering and Data Leakage Protection.

ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring is an endpoint protection service that utilizes cutting edge behavior-based analysis tools to defend endpoint devices as well as servers and VMs against modern malware assaults like ransomware and file-less exploits, which routinely escape legacy signature-based AV tools. ProSight Active Security Monitoring protects on-premises and cloud-based resources and offers a unified platform to address the entire threat lifecycle including filtering, detection, mitigation, remediation, and forensics. Top capabilities include one-click rollback with Windows Volume Shadow Copy Service (VSS) and automatic network-wide immunization against newly discovered attacks. Read more about Progent's ProSight Active Security Monitoring (ASM) Next-Generation Endpoint Protection and Ransomware Recovery.

ProSight Data Protection Services: Managed Cloud Backup
ProSight Data Protection Services from Progent offer small and mid-sized businesses a low cost and fully managed solution for reliable backup/disaster recovery. For a fixed monthly rate, ProSight DPS automates your backup activities and enables rapid recovery of critical data, apps and VMs that have become lost or corrupted as a result of component failures, software bugs, disasters, human mistakes, or malicious attacks like ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, applications, system images, as well as Microsoft Hyper-V and VMware images. Important data can be backed up on the cloud, to a local device, or mirrored to both. Progent's backup and recovery consultants can deliver world-class support to set up ProSight Data Protection Services to to comply with regulatory standards such as IPPA, FIRPA, PCI and Safe Harbor and, whenever necessary, can help you to restore your critical data. Learn more about ProSight DPS Managed Cloud Backup.

Expert Security Consulting
Any company should have a carefully thought out security strategy that incorporates both pre-attack processes and reaction plans. The pre-attack plan is a set of procedures designed to reduce vulnerabilities. The reactive plan assists your security personnel to assess the damage resulting from a security penetration, repair the network, record the experience, and get the IT network operational as soon as possible.

Progent's expert information security engineers can to assist your company to perform a complete vulnerability evaluation and create a computer security strategy to establish security policies and mechanisms to mitigate future attacks and threats.

CISM Qualified Security Engineering Assistance
The CISM committee defines the core capabilities and worldwide standards of skill that IT security managers are required to master. CISM provides business management the confidence that consultants who have qualified for their CISM certification possess the experience and knowledge to provide efficient security management and consulting services. Progent can provide the services of CISM qualified security consultants to assist companies with:

  • IS Security Processes
  • Risk Analysis
  • IS Security Program Management
  • IS Security Administration
  • Recovery Management
Find out more details concerning Progent's CISM Accredited Security Consulting Expertise.

CISSP Certified Security Consulting Support
CISSP recognizes mastery of a worldwide standard for data security. ANSI has awarded certification accreditation in the field of data security stipulated by ISO/IEC 17024. Progent offers the services of security consultants who have earned CISSP accreditation. Progent can give you access to a CISSP-certified expert to help your organization in a variety security fields such as:

  • Security Administration Practices
  • Security Infrastructure and Paradigms
  • Access Management Solutions and Processes
  • Software Development Security
  • Operations Security
  • Physical Security
  • Data Encryption Technology
  • Telecommunications, Network and WAN Security
  • Disaster Recovery Preparedness
Learn more details concerning Progent's CISSP Information Security Support Professionals.

ISSAP Qualified Secure Information System Architecture Consulting Expertise
Progent's ISSAP certified information system architecture professionals are consultants who have been awarded ISSAP status as a result of rigorous examination and extensive experience with network security design. The Information System Security Architecture Professional (ISSAP) credential represents demonstrated competence in the most in-depth requirements of information security architecture within the broader scope of information security expertise needed for CISSP accreditation. Progent's ISSAP-certified security experts can assist your business with all phases of secure network architecture including.

  • Access Control Systems and Techniques
  • Telecom and System Infrastructure Security
  • Cryptography Solutions
  • Requirements Evaluation and Security Criteria
  • BCP and DRP
  • Hardware Security
Find out additional details about Progent's ISSAP Qualified Secure IT Architecture Consulting Expertise.

CISA Qualified Security Auditing Consulting Expertise
The Certified Information Systems Auditor (CISA) credential is a prestigious qualification that indicates mastery in network security audit and control. Accredited by the American National Standards Institute, the CISA accreditation requires that consultants undergo a comprehensive examination administered by the ISACA international professional group. Progent's CISA network security audit engineers can help your business in the areas of:

  • Information Systems Audit Process
  • IT Administration
  • Systems and Infrastructure Lifecycle
  • IT Support
  • Safeguarding Data Assets
  • Disaster Recovery Preparedness
Find out more details concerning Progent's CISA Accredited IS Security Auditing Engineering Services.

Certified in Risk and Information Systems Control (CRISC) Consultants
The Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA to verify a consultant's ability to design, deploy, and support IS controls to mitigate network risk. Progent offers the services of a CRISC-certified consultant to help your company to create and carry out a workplace continuity or disaster recovery plan that follows industry best practices promoted by CRISC and crafted to align with your organization's risk tolerance, business objectives, and budgetary guidelines. Progent's CRISC-qualified IT risk management consultants offer a variety of risk identification services including:

  • Collect data and review documentation to evaluate significant vulnerabilities
  • Inventory statutory, regulatory, and business mandates and organizational policies associated with your network to assess their potential influence on your strategic goals
  • Identify possible threats for your operational processes to help in evaluating your corporate risk
  • Develop a risk awareness program and conduct training to make sure your organization appreciate IS risk so they can assist with your risk control program
  • Connect identified risk scenarios to related business processes to help determine risk responsibility
  • Determine risk tolerance with your senior leadership and key stakeholders to ensure they match
Learn additional information about Progent's Certified in Risk and Information Systems Control (CRISC) Experts.

GIAC Accredited Security Engineering Support
GIAC was established in 1999 to certify the skill of IT security professionals. GIAC's goal is to assure that an accredited professional possesses the skills needed to deliver services in key categories of system, information, and application program security. GIAC accreditations are acknowledged by businesses and government organizations all over the world including and the U.S. National Security Agency. Progent's GIAC-qualified security audit engineers can help your IT organization with:

Find out more information concerning Progent's GIAC Information Assurance Support.

Contact a Progent Security Expert
To learn how to contact a certified Progent security engineer for remote or onsite help in Louisiana, call 1-800-993-9400 or visit Online Computer Support.














© 2002- 2017 Progent Corporation. All rights reserved.