Small business computer networks in the state of Louisiana can now get quick and economical online technical support from Progent's certified security support specialists to help with critical security issues. The cost is reasonable, charges are by the minute, engagement is fast, and service is unbeatable. Progent also provides help for long-term projects that demand the knowledge of seasoned security engineers with top security certifications.

In case your Louisiana organization is located outside of major metropolitan areas like New Orleans, Baton Rouge, Shreveport, Metairie, or Lafayette, contact with local qualified network security consultants could be limited during a crisis. This can cause a drop in revenue for your company, upset customers, unproductive employees, and defocused management. By contacting Progent, you have access to a certified security consultant who can provide expertise whenever you require it to get your information system operating and salvage your data.

Progent can help you at any level in your efforts to guard your network with support that can range from security checks to creating a comprehensive security strategy. Progent offers economical service to assist companies of any size to design and manage safe IT environments based on Windows and Cisco technology and that can include servers and desktops based on UNIX, Linux, Solaris, or Apple Mac OS X platforms as well as mobile clients with Apple iOS handhelds or Android or Windows Phone devices.

Progent can also assist you to outsource spam filtering and defense against e-mail-based security threats. Email Guard is Progent's email filtering and encryption platform that incorporates the services and infrastructure of leading data security vendors to deliver centralized management and world-class security for all your inbound and outbound email. The hybrid structure of Progent's Email Guard integrates cloud-based filtering with an on-premises security gateway device to offer advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. ProSight Email Guard's Cloud Protection Layer serves as a first line of defense and blocks the vast majority of unwanted email from reaching your network firewall. This decreases your exposure to external threats and conserves network bandwidth and storage. ProSight Email Guard's on-premises gateway device adds a further level of analysis for inbound email. For outbound email, the onsite security gateway offers AV and anti-spam protection, policy-based Data Loss Prevention, and encryption. The local gateway can also enable Exchange Server to monitor and safeguard internal email traffic that stays within your corporate firewall.

Progent's security consultants are accessible remotely or on premises to offer a range of urgent or longer-term network security services such as:

If your business has an urgent requirement for computer security support, refer to Progent's Emergency Remote Network Support.

Progent's support professionals offer world-class support in key areas of computer security including auditing, firewall/VPN support, and high-level security consulting.

System Assessment
Progent's expert security engineers can assess the strength of your existing computer security implementation by performing comprehensive remote automated analysis via advanced software tools and proven techniques. Progent's skill in this service saves your company consulting fees and offers an accurate picture of gaps. The information your business gains can be used as the basis of a security plan that will permit your information system to run safely and respond quickly to new threats.

Automated Vulnerability Analysis
Progent offers expertise in the use of security testing software such as Microsoft's MBSA and GFI LANguard Network Security Scanner for economically performing a set of programmed system testing scans to identify potential security vulnerabilities. Progent has broad knowledge of other security analysis products such as NMAP Port Scanner, AMAP, eEye, as well as tools like Metasploit, Netcat, Socat, and Nikto. Progent can help you to understand audit reports and respond effectively.

Progent can help you design security into your business processes, install scanning software, plan and deploy a secure system environment, and suggest procedures to maximize the safety of your IT system. Progent's security professionals are available to help you configure a firewall, design secure remote connectivity to email and business applications, and integrate virtual private network. Learn additional information about Progent's network security audits.

Security Inventory and Evaluation Bundles for Small Companies
Progent offers two ultra-affordable security inventory packages intended to enable small companies to get a professional security assessment from a qualified security specialist. With Progent's External Network Security Inventory Checkup, a security expert runs a comprehensive examination of your network from outside your company firewall to uncover possible risks in the security profile you expose to the public. With Progent's Internal Security Inventory Scan, an engineer runs a network scan from a secure computer within your firewall to assess vulnerabilities to internal attacks. Both security inventory services are configured and executed from a protected external location. The project is managed by an engineer with top security accreditations and who generates a report that details and analyzes the data captured by the scan and suggests cost-effective improvements if called for.

Stealth Penetration Analysis Consulting
Stealth penetration testing is an important component of any comprehensive network security plan. Progentís security professionals can run thorough intrusion tests without the knowledge of your company's in-house IT resources. Unannounced penetration checking shows whether current security monitoring tools such as intrusion incident warnings and event log monitoring are correctly set up and consistently monitored. Learn more on Progent's stealth security penetration testing support services.

Firewalls and VPN Support
Progent's expertise in security technology includes in-depth field work with major firewalls and Virtual Private Network technology from multiple companies such as Cisco, Microsoft, and Symantec. Progent can provide the support of consultants who have earned important networking accreditations such as CCIE and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Integration and Debugging
The current ASA 5500-X Series Next-Generation Firewalls with Firepower Services provide substantially more value than Cisco's previous PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX security appliances for all new installations. Following Cisco's purchase of Sourcefire, the entire line of Cisco ASA 5500-X devices can be configured to support Firepower Services, based on Sourcefire's Snort technology, which is the world's most deployed intrusion protection system. Firepower services provide powerful new capabilities including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-certified CCIE network consultants can help you to maintain your legacy PIX or ASA 5500 security appliances or upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist your business to design, deploy, optimize, administer and troubleshoot firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. See more information about ASA Firewalls with Firepower Services configuration and debugging support.

Cisco Security and Virtual Private Network Engineering Expertise
Cisco's network security and remote connection technology provide a comprehensive range of manageable security solutions to help protect your wired and wireless information system. Cisco's Virtual Private Network line features switches, firewalls, intrusion detection systems and VPN concentrators. Progent's expert consulting staff includes field-proven engineers with Cisco CCIE and CCNP certifications who can help your company to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security solutions that fit best with your business goals. Find out more details about Progent's Consulting Expertise for Cisco Security Technology and Virtual Private Network Appliances.

Engineering Expertise for Additional Firewall and VPN Solutions
Progent provides small and mid-size organizations professional consulting for Intrusion Protection products and IPsec VPN technology from major firewall and Virtual Private Network security companies including Check Point Software, Juniper, and SonicWALL. Progent can show you how to create a comprehensive security strategy and choose the right technologies from a variety of suppliers to support your security objectives while sticking within your spending restraints.

Progent's Flat-rate Managed Services for Information Assurance
Progent's low-cost ProSight line of managed services is designed to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all facets of information assurance. Managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring is an endpoint protection (EPP) solution that utilizes cutting edge behavior-based machine learning technology to guard endpoint devices as well as physical and virtual servers against new malware attacks like ransomware and email phishing, which routinely evade legacy signature-matching AV products. ProSight Active Security Monitoring safeguards local and cloud resources and provides a unified platform to automate the entire malware attack lifecycle including filtering, identification, containment, cleanup, and forensics. Key capabilities include one-click rollback using Windows Volume Shadow Copy Service (VSS) and real-time network-wide immunization against new threats. Read more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.

ProSight Enhanced Security Protection (ESP): Unified Endpoint Security
Progent's ProSight Enhanced Security Protection services deliver ultra-affordable in-depth security for physical servers and virtual machines, desktops, smartphones, and Microsoft Exchange. ProSight ESP utilizes contextual security and advanced heuristics for round-the-clock monitoring and responding to cyber threats from all vectors. ProSight ESP provides firewall protection, penetration alerts, endpoint control, and web filtering via leading-edge tools incorporated within a single agent managed from a single control. Progent's data protection and virtualization consultants can assist you to plan and configure a ProSight ESP environment that addresses your company's specific requirements and that helps you demonstrate compliance with legal and industry information security standards. Progent will assist you define and implement security policies that ProSight ESP will manage, and Progent will monitor your network and respond to alerts that call for immediate attention. Progent's consultants can also help your company to set up and test a backup and restore system like ProSight Data Protection Services so you can recover rapidly from a destructive security attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified endpoint security and Exchange email filtering.

ProSight Data Protection Services: Managed Backup
ProSight Data Protection Services from Progent offer small and medium-sized businesses a low cost and fully managed solution for secure backup/disaster recovery (BDR). Available at a fixed monthly rate, ProSight Data Protection Services automates and monitors your backup activities and enables rapid restoration of vital files, apps and VMs that have become unavailable or damaged as a result of component failures, software bugs, natural disasters, human error, or malware attacks like ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, apps, system images, plus Microsoft Hyper-V and VMware images. Critical data can be backed up on the cloud, to an on-promises device, or to both. Progent's backup and recovery specialists can provide world-class support to configure ProSight DPS to be compliant with regulatory standards such as HIPPA, FINRA, and PCI and, whenever necessary, can assist you to recover your critical data. Find out more about ProSight Data Protection Services Managed Cloud Backup.

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering service that uses the technology of top data security vendors to deliver web-based management and comprehensive protection for your email traffic. The hybrid architecture of Progent's Email Guard combines a Cloud Protection Layer with a local gateway appliance to offer advanced protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. The cloud filter serves as a preliminary barricade and blocks most unwanted email from reaching your network firewall. This reduces your exposure to external attacks and conserves system bandwidth and storage. Email Guard's on-premises gateway device adds a deeper layer of inspection for inbound email. For outbound email, the on-premises gateway offers anti-virus and anti-spam filtering, DLP, and email encryption. The onsite security gateway can also assist Microsoft Exchange Server to monitor and safeguard internal email that stays inside your corporate firewall. For more information, visit Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small or mid-size organization can have its critical servers and applications hosted in a protected fault tolerant data center on a fast virtual machine host set up and managed by Progent's IT support professionals. Under the ProSight Virtual Hosting service model, the customer retains ownership of the data, the operating system platforms, and the applications. Since the system is virtualized, it can be ported immediately to an alternate hardware environment without requiring a time-consuming and difficult configuration process. With ProSight Virtual Hosting, you are not tied one hosting provider. Find out more details about ProSight Virtual Hosting services.

ProSight IT Asset Management: Infrastructure Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to capture, maintain, find and safeguard information about your IT infrastructure, processes, applications, and services. You can instantly locate passwords or serial numbers and be warned automatically about impending expirations of SSL certificates or domains. By updating and organizing your network documentation, you can eliminate up to half of time wasted searching for vital information about your IT network. ProSight IT Asset Management includes a centralized location for storing and collaborating on all documents required for managing your network infrastructure such as standard operating procedures and self-service instructions. ProSight IT Asset Management also offers a high level of automation for gathering and relating IT information. Whether youíre making enhancements, performing regular maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the knowledge you need when you need it. Find out more details about Progent's ProSight IT Asset Management service.

Expert Security Consulting
Every business ought to develop a carefully thought out security program that includes both proactive processes and reaction plans. The proactive plan is a set of steps intended to reduce security weaknesses. The post-attack plan assists your company's security engineers to evaluate the impact caused by an attack, repair the system, document the experience, and get business functions restored as rapidly as possible.

Progent's expert information security engineers can to assist you to perform a full risk assessment and create a company-wide security plan to establish security processes and mechanisms to reduce future attacks and threats.

CISM Qualified Network Security Support Expertise
The CISM organization describes the basic capabilities and worldwide standards of skill that information security professionals are expected to learn. It provides executive management the confidence that those who have qualified for their CISM certification possess the experience and capability to deliver effective security management and consulting consulting. Progent offers the expertise of CISM qualified security consultants to help companies with:

  • IS Security Governance
  • Vulnerability Analysis
  • Information Security Program Management
  • Network Security Management
  • Recovery Management
Learn additional information concerning Progent's CISM Certified IS Security Consulting Services.

CISSP Accredited Security Engineering Expertise
CISSP certification recognizes mastery of a global standard for information security. The American National Standards Institute has awarded the CISSP credential accreditation in the area of information security under ISO/IEC 17024. Progent offers the services of security professionals who have earned CISSP accreditation. Progent can provide a CISSP-certified expert to help your company in a broad range of security fields including:

  • Security Administration Practices
  • Security Architecture and Models
  • Access Control Systems and Processes
  • Applications Development Security
  • Operations Security
  • Physical Security
  • Data Encryption Technology
  • Telecommunications, LAN and WAN Security
  • Business Continuity Planning
Read more information concerning Progent's CISSP Qualified IS Security Support Expertise.

ISSAP Qualified Secure System Architecture Engineering Assistance
Progent's ISSAP qualified system architecture professionals are experts who have been awarded ISSAP status as a result of thorough examination and significant work with network security architecture. The ISSAP credential represents proven competence in the more in-depth demands of IS security architecture bounded by the broader field of information system security expertise needed for CISSP accreditation. Progent's ISSAP-certified security experts can help your business with all aspects of architecture security including.

  • Access Control Mechanisms and Techniques
  • Telecommunications and System Infrastructure Protection
  • Data Encryption Options
  • Requirements Analysis and Security Criteria
  • Business Continuity Planning and Disaster Recovery Planning (DRP)
  • Hardware Security
Read more details concerning Progent's ISSAP Qualified Secure IT Architecture Support Professionals.

CISA Accredited IS Security Auditing Consulting Services
The Certified Information Systems Auditor (CISA) credential is a globally recognized qualification that signifies mastery in information system security audit and control. Accredited by the American National Standards Institute (ANSI), the CISA credential has consultants undergo an extensive test given by the ISACA professional association. Progent's CISA-qualified network security audit specialists are available to help your IT organization with:

  • Information Systems Audit Process
  • Information Technology Enforcement
  • Systems and Architecture Lifecycle Planning
  • IT Support
  • Safeguarding Data Assets
  • Disaster Recovery Preparedness
Read more information about Progent's CISA Certified IS Security Auditing Engineering Services.

Certified in Risk and Information Systems Control (CRISC) Experts
The Certified in Risk and Information Systems Control (CRISC) certification program was established by ISACA in 2010 to validate a consultant's skills to plan, implement, and maintain IS controls to mitigate risk. Progent can provide the expertise of a CRISC-certified engineer to assist you to develop and execute a business continuity or disaster recovery plan based on leading practices identified by CRISC and geared to match your company's risk tolerance, business objectives, and IT budget. Progent's CRISC-certified network risk management experts offer a variety of risk assessment services such as:

  • Collect data and study documentation to identify significant risk scenarios
  • Inventory legal, regulatory, and business mandates and organizational standards related to your information system to determine their potential influence on your business objectives
  • Identify potential threats for your business processes to assist in evaluating your enterprise risk
  • Create a risk awareness initiative and conduct seminars to make sure your organization appreciate IT risk so they can contribute to your risk control program
  • Match identified risk scenarios to related business processes to help determine risk responsibility
  • Validate risk appetite with your senior management and major stakeholders to ensure they align
Read the details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Experts.

GIAC Certified Security Engineering Assistance
GIAC (Global Information Assurance Certification) was founded in 1999 to validate the skill of information technology security professionals. GIAC's goal is to assure that an accredited professional possesses the skills necessary to provide services in critical categories of network, data, and software security. GIAC accreditations are acknowledged by businesses and institutions throughout the world including and the United States NSA. Progent's GIAC information security audit experts are available to help your company in the areas of:

  • Assessing Perimeters
  • Security Incident Handling
  • Intrusion Detection
  • Web Services Security
  • SIEM solutions
Learn additional details concerning Progent's GIAC Information Assurance Expertise.

Talk to a Security Specialist
To see how to contact a certified security engineer for online or on-premises help in Louisiana, call 1-800-993-9400 or visit Remote Computer Support.

© 2002- 2018 Progent Corporation. All rights reserved.