Company IT networks in Louisiana can depend on quick and economical remote technical support from Progent's certified network security professionals to help with urgent security issues. Rates are affordable, charges are by the minute, sign-up is fast, and support is unbeatable. Progent also provides assistance for long-term projects that demand the knowledge of seasoned security engineers with high-level security certifications.

In case your Louisiana business is located away from more populated metropolitan neighborhoods such as New Orleans, Baton Rouge, Shreveport, Metairie, or Lafayette, help from nearby accredited security support specialists is often problematic when you have a security disaster. This can result in lost income for your company, upset customers, idle workers, and defocused management. By calling Progent's online services, you can get in touch with a qualified security professional ready to offer help whenever you require it to get your network running and salvage your data.

Progent can help you in a variety of ways in your initiatives to defend your IT environment with support services that can range from network security assessments to developing a comprehensive security plan. Progent offers economical support to assist companies of any size to configure and manage safe networks powered by Windows and Cisco technology and that may include computers running UNIX or Linux platforms as well as mobile clients with Apple iOS iPhones and iPads or Android or Windows Phone devices.

Progent can also assist you to outsource spam filtering and protection from email-borne security threats. Email Guard is Progent's email security solution that incorporates the services and infrastructure of top data security vendors to provide centralized management and world-class security for all your inbound and outbound email. The powerful architecture of Progent's Email Guard combines cloud-based filtering with an on-premises gateway device to provide complete protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. ProSight Email Guard's Cloud Protection Layer acts as a preliminary barricade and keeps most threats from making it to your security perimeter. This reduces your vulnerability to external threats and saves system bandwidth and storage. ProSight Email Guard's on-premises gateway device adds a deeper layer of analysis for inbound email. For outbound email, the local security gateway provides AV and anti-spam protection, protection against data leaks, and email encryption. The onsite gateway can also help Exchange Server to track and safeguard internal email that stays within your corporate firewall.

Progent's certified experts are available online or in person to provide a range of urgent or longer-term network security services which include:

If your company has an urgent need for computer security support, refer to Progent's Emergency Online Technical Support.

Progent's support professionals provide world-class services in key areas of system protection that include auditing, firewall and VPN solutions, and advanced security planning.

Security Assessment
Progent's expert security consultants can evaluate the effectiveness of your current network protection implementation by performing exhaustive remote automated testing based on sophisticated software tools and proven techniques. Progent's skill in this service saves your company consulting fees and assures an objective picture of system vulnerability. The knowledge your IT organization gains can form the basis of a network protection plan that will permit your information system to run safely and respond rapidly to new threats.

Automated Security Assessment
Progent provides expertise in the application of security auditing software such as MBSA and GFI LANguard NSS for economically running a set of programmed system auditing scans to identify possible security problems. Progent has broad experience with additional network auditing products such as NMAP, AMAP, eEye, plus utilities such as SolarWinds, Netcat, Hydra, and Nikto. Progent can help you to understand testing reports and react appropriately.

Progent can help you design protection into your business processes, install auditing applications, plan and deploy a protected network architecture, and suggest policies to maximize the safety of your network. Progent's security engineers are available to help you configure a firewall, implement safe remote connectivity to email and business applications, and integrate virtual private network. Learn additional information about Progent's network security analysis.

Security Inventory Scanning Packages for Small Businesses
Progent has put together two ultra-affordable security inventory and evaluation packages intended to enable small companies to receive an independent network security evaluation from an accredited security specialist. With Progent's External Security Inventory Checkup, a security expert runs an extensive test of your network from beyond your company firewall to uncover possible weaknesses in the security profile you present to the outside world. With Progent's Internal Network Security Inventory Scan, an engineer executes a system scan from an authorized machine within your firewall to uncover the risk to internal threats. The two security inventory services are set up and run from a secured remote site. The project is directed by an engineer who has earned high-level security accreditations and who generates a report that summarizes and interprets the information captured by the security scan and proposes cost-effective improvements where called for.

Network Penetration Analysis Support Services
Stealth intrusion testing is an important part of any successful network security plan. Progent’s security professionals can perform thorough intrusion tests without the awareness of your organization's internal network support resources. Stealth penetration testing shows whether existing security monitoring systems such as intrusion incident alerts and event history monitoring are properly set up and actively monitored. Find out more about Progent's stealth security penetration testing consulting.

Firewalls and VPN Solutions
Progent's expertise in security solutions includes in-depth familiarity with leading firewalls and Virtual Private Network (VPN) products from a variety of vendors including Cisco, Microsoft, and Symantec. Progent offers the services of engineers who have earned important networking certifications such as CCIE and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Configuration and Troubleshooting
The current ASA 5500-X Family of firewalls with Firepower Services offer significantly more performance than Cisco's previous PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 security appliances for all new installations. After Cisco's purchase of Sourcefire, the entire family of Cisco ASA 5500-X devices can be configured to enable Firepower Services, based on Sourcefire's Snort product, which is the market's most popular intrusion protection system. Firepower services bring enhanced features including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-certified CCIE network experts can help your company to manage your existing PIX or ASA 5500 firewalls and upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist your organization to design, configure, tune, administer and debug firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Find out more information about Cisco ASA Firewalls with Firepower Services configuration and debugging support.

Cisco Network Security and VPN Engineering Expertise
Cisco's security and offsite connection technology represent a full line of easy-to-administer security solutions to help safeguard your wired and wireless information system. Cisco's Virtual Private Network line includes switches, firewalls, intrusion detection systems and Virtual Private Network appliances. Progent's expert staff of consultants includes experienced specialists with Cisco's Certified Internetwork Expert and CCNP qualifications who are able to help your organization to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security technologies that fit best with your company goals. Learn additional details about Progent's Support Services for Cisco Security Technology and VPN Products.

Engineering Services for Other Firewall and Virtual Private Network Technology
Progent offers small and medium size organizations professional support for Intrusion Protection products and IPsec VPN solutions from leading firewall and Virtual Private Network security vendors including WatchGuard, Juniper Networks, and SonicWALL. Progent can help you design a detailed security strategy and select appropriate technologies from multiple suppliers to support your security goals while staying within your budget limits.

Progent's Fixed-price Managed Services for Information Security
Progent's affordable ProSight line of network management outsourcing services is intended to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all facets of information assurance and compliance. ProSight managed services offered by Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection solution that utilizes cutting edge behavior-based machine learning technology to guard endpoints and servers and VMs against new malware attacks such as ransomware and file-less exploits, which routinely get by legacy signature-based AV tools. ProSight Active Security Monitoring protects on-premises and cloud resources and offers a single platform to manage the complete threat progression including blocking, detection, mitigation, cleanup, and post-attack forensics. Top capabilities include one-click rollback using Windows VSS and real-time network-wide immunization against new attacks. Read more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware defense.

ProSight Enhanced Security Protection: Unified Endpoint Security
Progent's ProSight Enhanced Security Protection (ESP) managed services offer ultra-affordable in-depth security for physical and virtual servers, workstations, smartphones, and Exchange Server. ProSight ESP utilizes adaptive security and advanced machine learning for round-the-clock monitoring and responding to security assaults from all vectors. ProSight ESP provides firewall protection, intrusion alarms, device control, and web filtering through cutting-edge technologies incorporated within one agent accessible from a single console. Progent's security and virtualization experts can assist you to plan and configure a ProSight ESP environment that meets your organization's specific requirements and that allows you demonstrate compliance with legal and industry information security regulations. Progent will assist you specify and implement security policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alarms that call for urgent action. Progent can also help you to install and test a backup and disaster recovery solution like ProSight Data Protection Services so you can recover quickly from a potentially disastrous cyber attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified endpoint protection and Microsoft Exchange filtering.

ProSight Data Protection Services: Managed Backup
ProSight Data Protection Services provide small and medium-sized organizations a low cost and fully managed solution for reliable backup/disaster recovery. Available at a fixed monthly cost, ProSight DPS automates your backup activities and allows fast recovery of vital files, apps and VMs that have become lost or damaged due to component failures, software glitches, natural disasters, human mistakes, or malicious attacks such as ransomware. ProSight DPS can help you back up, recover and restore files, folders, applications, system images, as well as Hyper-V and VMware images. Important data can be backed up on the cloud, to an on-promises storage device, or to both. Progent's cloud backup specialists can provide advanced expertise to set up ProSight Data Protection Services to be compliant with government and industry regulatory requirements like HIPPA, FINRA, PCI and Safe Harbor and, when needed, can help you to recover your business-critical information. Find out more about ProSight Data Protection Services Managed Cloud Backup.

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering service that uses the technology of top data security vendors to deliver web-based management and comprehensive protection for your inbound and outbound email. The hybrid structure of Progent's Email Guard managed service combines a Cloud Protection Layer with an on-premises security gateway appliance to provide advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. Email Guard's cloud filter serves as a first line of defense and keeps the vast majority of threats from reaching your security perimeter. This reduces your vulnerability to external attacks and conserves system bandwidth and storage space. Email Guard's on-premises gateway appliance adds a further level of analysis for inbound email. For outbound email, the on-premises gateway provides anti-virus and anti-spam filtering, DLP, and email encryption. The on-premises security gateway can also help Exchange Server to monitor and safeguard internal email traffic that originates and ends inside your security perimeter. For more details, see Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small or mid-size business can have its key servers and apps hosted in a protected Tier III data center on a high-performance virtual machine host set up and maintained by Progent's network support professionals. Under Progent's ProSight Virtual Hosting service model, the client owns the data, the operating system platforms, and the applications. Because the environment is virtualized, it can be ported immediately to a different hardware solution without a time-consuming and technically risky reinstallation process. With ProSight Virtual Hosting, your business is not locked into one hosting service. Find out more about ProSight Virtual Hosting services.

ProSight IT Asset Management: Network Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to create, maintain, retrieve and protect data about your IT infrastructure, procedures, business apps, and services. You can quickly locate passwords or serial numbers and be warned automatically about upcoming expirations of SSL certificates or warranties. By cleaning up and organizing your IT documentation, you can eliminate as much as half of time spent searching for vital information about your network. ProSight IT Asset Management includes a centralized location for holding and sharing all documents related to managing your network infrastructure like standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also offers advanced automation for gathering and relating IT data. Whether you’re planning improvements, performing maintenance, or responding to an emergency, ProSight IT Asset Management delivers the knowledge you require the instant you need it. Find out more about Progent's ProSight IT Asset Management service.

Certified Security Design
Every company should have a thoroughly thought out security strategy that incorporates both preventive procedures and reaction planning. The proactive plan is a collection of procedures intended to minimize vulnerabilities. The post-attack strategy helps your company's security engineers to evaluate the impact caused by a security penetration, repair the system, document the experience, and get business functions restored as rapidly as feasible.

Progent's expert information security consultants can to assist your business to run a comprehensive risk evaluation and create a network security plan to establish security policies and controls to minimize ongoing assaults and dangers.

CISM Qualified Network Security Consulting Expertise
The CISM organization defines the basic competencies and worldwide standards of skill that IT security managers are required to learn. It provides business management the confidence that those who have qualified for their CISM certification possess the experience and capability to provide efficient security management and support services. Progent offers the expertise of CISM certified security professionals to assist businesses with:

  • IS Security Processes
  • Risk Analysis
  • Information Security Implementation Management
  • Network Security Management
  • Recovery Management
Learn additional details concerning Progent's CISM Accredited Information Security Engineering Expertise.

CISSP Qualified Security Engineering Services
The CISSP credential denotes mastery of a global standard for network security. ANSI (American National Standards Institute) has granted the CISSP credential accreditation in the field of information protection defined by ISO/IEC 17024. Progent offers the services of security professionals who have earned CISSP accreditation. Progent can provide a CISSP-certified expert to help your company in a variety security areas such as:

  • Security Administration Practices
  • Security Architecture and Paradigms
  • Access Management Systems and Processes
  • Software Development Security
  • Secure Operations
  • Physical Security
  • Encryption/Decryption Technology
  • Telecom, LAN and Internet Security
  • Disaster Recovery Planning
Read more information about Progent's CISSP-certified Security Engineering Services.

ISSAP Accredited Secure System Architecture Engineering Support
Progent's ISSAP certified system architecture professionals are experts who have been awarded ISSAP Certification through thorough testing and extensive experience with information security design. The ISSAP credential represents proven skill in the most complex requirements of IS security architecture bounded by the wider scope of information security knowledge needed for CISSP accreditation. Progent's ISSAP-qualified security experts can assist your company with all aspects of secure network architecture including.

  • Access Management Mechanisms and Methodologies
  • Telecom and System Infrastructure Security
  • Cryptography Solutions
  • Needs Evaluation and Security Guidelines
  • Business Continuity Planning (BCP) and Disaster Recovery Planning
  • Hardware Security
Read additional information about Progent's ISSAP Qualified Secure Network Architecture Consulting Expertise.

CISA Qualified Network Security Auditing Engineering Services
The CISA accreditation is a recognized achievement that represents mastery in information system security auditing. Certified by the American National Standards Institute (ANSI), the CISA credential requires that consultants pass an extensive test administered by the ISACA international professional group. Progent's CISA-qualified IS security audit experts can assist your company with:

  • IS Audit Process
  • Information Technology Administration
  • Systems and Architecture Planned Useful Life
  • IT Support
  • Safeguarding Information Resources
  • Business Continuity Preparedness
Get more details about Progent's CISA Certified Information System Security Auditing Consulting Services.

CRISC Consultants
The Certified in Risk and Information Systems Control (CRISC) program was established by ISACA in 2010 to validate a consultant's skills to plan, deploy, and maintain IS control mechanisms to reduce risk. Progent can provide the expertise of a CRISC-certified consultant to assist you to develop and execute a business continuity plan based on leading practices promoted by CRISC and geared to match your company's risk tolerance, business objectives, and IT budget. Progent's CRISC-certified network risk management experts offer a range of risk assessment services such as:

  • Collect information and review documentation to evaluate significant risk scenarios
  • Inventory statutory, regulatory, and business mandates and company standards associated with your information system to determine their possible impact on your strategic goals
  • Point out possible threats for your operational workflows to help in evaluating your corporate risk
  • Create a risk awareness initiative and conduct training to make sure your stakeholders appreciate IS risk so they can assist with your risk management process
  • Connect identified risk scenarios to your associated business procedures to help determine risk ownership
  • Validate risk appetite with executive management and major stakeholders to ensure they align
Find out the details about Progent's CRISC Consultants.

GIAC Accredited Network Security Consulting Assistance
Global Information Assurance Certification was founded in 1999 to certify the skill of network security professionals. GIAC's mission is to make sure that a certified professional possesses the knowledge appropriate to provide support in vital categories of system, information, and application software security. GIAC certifications are acknowledged by companies and institutions throughout the world including and the U.S. National Security Agency. Progent's GIAC-certified information security audit experts can assist your company in the areas of:

  • Assessing Perimeters
  • Incident Response
  • Intrusion Detection
  • Web-based Services Security
  • SIEM solutions
Read additional details concerning Progent's GIAC Information Assurance Services.

Get in Touch with a Certified Security Expert
To see how you can get in touch with a certified Progent security engineer for online or onsite support in Louisiana, call 1-800-993-9400 or visit Online Network Support.














© 2002- 2018 Progent Corporation. All rights reserved.