Company IT networks in Mississippi can depend on quick and affordable online help from Progent's qualified security engineers to assist with critical security problems. The cost is affordable, billing is by the minute, sign-up is fast, and service is unbeatable. Progent also provides assistance for complex engagements that requires the knowledge of seasoned security engineers with top security certifications.

In case your Mississippi organization is some distance from more populated urban areas like Jackson, Gulfport, Biloxi, or Hattiesburg, support from local accredited security engineers could be problematic when you have an urgent situation. This could mean a loss of revenue for your business, upset clients, unproductive employees, and distracted management. By utilizing Progent, you can get in touch with a certified security professional who can offer expertise when you need it to get your system on line and recover your information.

Progent can help you in all your initiatives to guard your network with support that ranges from security audits to developing a comprehensive security plan. Progent provides affordable service to assist small and midsize companies to set up and manage protected IT environments based on Microsoft Windows and Cisco technology and that can include servers and desktops based on UNIX, Linux, Sun Solaris, or Mac OS X platforms as well as BYOD users with Apple iPhones and iPads or Google Android or Windows Phone handsets.

Progent can also help you outsource spam filtering and defense against e-mail-based assaults. Email Guard is Progent's email filtering and encryption solution that incorporates the technology of top information security vendors to deliver centralized management and world-class security for all your email traffic. The hybrid structure of Email Guard managed service combines cloud-based filtering with an on-premises gateway appliance to provide advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. ProSight Email Guard's Cloud Protection Layer serves as a first line of defense and keeps the vast majority of threats from making it to your security perimeter. This decreases your exposure to inbound attacks and saves system bandwidth and storage. ProSight Email Guard's on-premises gateway device provides a deeper layer of inspection for inbound email. For outgoing email, the on-premises gateway offers anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The local security gateway can also help Microsoft Exchange Server to track and protect internal email traffic that originates and ends inside your corporate firewall.

Progent's certified professionals are available remotely or in person to provide a range of urgent or longer-term network security services which include:

  • Perform comprehensive network security audits
  • Recover rapidly after virus and worm attacks
  • Configure effective firewalls
  • Implement safe methods for remote and mobile access
  • Install effective applications for protection against spam and directory harvest attacks
  • Help create a comprehensive security strategy with proactive security monitoring
  • Provide comprehensive Help Desk Services
  • Develop a practical data backup and disaster recovery plan built around Data Protection Manager backup technology
If your network has an immediate need for computer security support, refer to Progent's Urgent Remote Network Help.

Progent's support professionals provide advanced support in vital facets of network security including security assessment, firewall/VPN support, and high-level security planning.

System Security Assessment
Progent's certified security consultants can evaluate the vulnerability of your current computer security systems by performing comprehensive remote automated analysis based on sophisticated utilities and proven procedures. Progent's skill in administering this service saves your company money and offers an objective portrayal of gaps. The knowledge your IT organization is provided can be used as the foundation of a security plan that can permit your network to run safely and react quickly to future risks.

Automated Vulnerability Assessment
Progent offers expertise in the use of security testing products such as Microsoft Baseline Security Analyzer and GFI LANguard Network Security Scanner for affordably performing a set of automatic network auditing checks to uncover potential security holes. Progent has broad knowledge of additional network auditing utilities including NMAP Port Scanner, AMAP application mapper, eEye Vulnerability Scanner, as well as tools such as SolarWinds, Netcat, and Nikto. Progent can help you to understand testing reports and react appropriately.

Progent can show you how to build security into your business processes, configure scanning software, define and deploy a secure network environment, and suggest policies to maximize the security of your network. Progent's security consultants are available to assist you to configure a firewall, design secure remote connectivity to email and business applications, and integrate virtual private network. Learn more concerning Progent's network security assessment.

Security Inventory and Evaluation Bundles for Small Companies
Progent has put together two ultra-affordable security inventory scanning bundles intended to enable small companies to receive an impartial security assessment from an accredited security specialist. With Progent's External Security Inventory Scan, an engineer administers a comprehensive test of your IT infrastructure from outside your company firewall to determine possible weaknesses in the security posture you present to the public. With Progent's Internal Security Inventory Scan, a certified security professional executes a system scan from an authorized machine within your company firewall to uncover vulnerabilities to inside assaults. Both security inventory packages are set up and run from a secured remote site. The process is overseen by an engineer with high-level security accreditations and who generates a document that details and analyzes the information captured by the scan and proposes cost-effective remediation where called for.

Network Security Penetration Testing Support Services
Stealth penetration checking is an important part of any serious IT system security plan. Progent’s security experts can run extensive penetration checks without the awareness of your company's internal network support staff. Unannounced penetration checking uncovers whether current security monitoring tools such as intrusion incident warnings and event history analysis are correctly configured and consistently monitored. Find out additional information about Progent's network security penetration analysis consulting.

Firewalls and VPN Expertise
Progent's background in security technology encompasses extensive familiarity with major firewalls and VPN technology offered by multiple companies including Cisco, Microsoft, and Symantec. Progent can provide the support of consultants who have earned key industry accreditations including CCIE and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Integration and Debugging
The latest generation of ASA 5500-X Series of firewalls with Firepower Services provide significantly more bang for the buck than Cisco's earlier firewalls and have superseded the ASA 5500 and PIX 500 firewalls for new deployments. Following Cisco's acquisition of Sourcefire, the whole family of ASA 5500-X firewalls can be configured to support Firepower Services, built on Sourcefire's Snort technology, which is the market's most popular intrusion protection system. Firepower services provide powerful new capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-qualified CCIE network consultants can help your company to manage your existing PIX or Cisco ASA 5500 firewalls or migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite support for ASA 5500-X firewalls with Firepower Services and can assist you to design, deploy, optimize, administer and debug firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services. Find out additional details about ASA Firewalls with Firepower Services configuration and troubleshooting services.

Cisco Network Security and VPN Support Services
Cisco's network security and remote access products represent a full line of easy-to-administer security solutions to help protect your local and remote network infrastructure. Cisco's Virtual Private Network product family features switches, firewalls, intrusion detection devices and Virtual Private Network appliances. Progent's expert consulting staff includes field-proven specialists with Cisco CCIE and CCNP qualifications who are able to assist your organization to select Cisco VPN, Cisco RADIUS Security, and other Cisco security solutions that fit best with your company objectives. Read additional details concerning Progent's Support Expertise for Cisco Security Solutions and VPN Products.

Engineering Services for Additional Firewall and Virtual Private Network Solutions
Progent offers small and mid-size businesses professional support for Intrusion Protection products and IPsec VPN products from leading firewall and Virtual Private Network security companies including Check Point Software, Juniper, and SonicWALL. Progent can show you how to design a comprehensive security plan and choose the right technologies from multiple suppliers to achieve your security goals while sticking within your budget restraints.

Progent's Fixed-price Managed Services for Information Security
Progent's low-cost ProSight series of network management outsourcing services is designed to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance. ProSight managed services offered by Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection solution that incorporates next generation behavior-based analysis technology to guard endpoint devices as well as servers and VMs against modern malware assaults such as ransomware and file-less exploits, which routinely evade legacy signature-matching anti-virus products. ProSight ASM safeguards on-premises and cloud-based resources and provides a single platform to automate the entire malware attack lifecycle including filtering, identification, containment, cleanup, and post-attack forensics. Top features include one-click rollback with Windows Volume Shadow Copy Service and real-time network-wide immunization against newly discovered attacks. Find out more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware recovery.

ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Protection
Progent's ProSight Enhanced Security Protection managed services deliver affordable multi-layer protection for physical servers and VMs, workstations, smartphones, and Microsoft Exchange. ProSight ESP utilizes contextual security and modern behavior analysis for continuously monitoring and reacting to cyber threats from all attack vectors. ProSight ESP offers firewall protection, intrusion alarms, device control, and web filtering via cutting-edge technologies packaged within a single agent managed from a unified console. Progent's security and virtualization consultants can assist your business to plan and implement a ProSight ESP environment that meets your company's unique requirements and that helps you prove compliance with government and industry data protection regulations. Progent will help you specify and implement security policies that ProSight ESP will enforce, and Progent will monitor your IT environment and react to alarms that require urgent action. Progent can also assist you to set up and test a backup and restore solution such as ProSight Data Protection Services so you can get back in business rapidly from a destructive cyber attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint security and Microsoft Exchange email filtering.

ProSight DPS: Managed Backup
ProSight Data Protection Services from Progent offer small and mid-sized businesses an affordable end-to-end solution for reliable backup/disaster recovery (BDR). Available at a fixed monthly price, ProSight Data Protection Services automates your backup activities and allows fast recovery of vital files, applications and VMs that have become unavailable or damaged due to hardware failures, software bugs, disasters, human mistakes, or malware attacks such as ransomware. ProSight DPS can help you protect, recover and restore files, folders, apps, system images, plus Hyper-V and VMware virtual machine images. Critical data can be protected on the cloud, to an on-promises device, or mirrored to both. Progent's BDR specialists can provide advanced support to configure ProSight Data Protection Services to be compliant with government and industry regulatory standards such as HIPPA, FIRPA, and PCI and, whenever necessary, can help you to recover your business-critical information. Find out more about ProSight DPS Managed Backup.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering service that incorporates the infrastructure of top information security companies to provide web-based control and comprehensive security for all your email traffic. The powerful structure of Email Guard managed service integrates a Cloud Protection Layer with an on-premises security gateway device to provide complete protection against spam, viruses, Denial of Service Attacks, DHAs, and other email-borne threats. Email Guard's Cloud Protection Layer acts as a first line of defense and keeps the vast majority of threats from making it to your security perimeter. This decreases your exposure to inbound threats and saves system bandwidth and storage. Email Guard's onsite gateway appliance adds a deeper layer of analysis for inbound email. For outbound email, the on-premises gateway provides AV and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The onsite gateway can also assist Exchange Server to track and safeguard internal email traffic that stays within your corporate firewall. For more details, see Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small or mid-size organization can have its critical servers and applications hosted in a secure fault tolerant data center on a high-performance virtual machine host configured and managed by Progent's network support experts. Under Progent's ProSight Virtual Hosting service model, the customer retains ownership of the data, the operating system platforms, and the applications. Since the system is virtualized, it can be moved easily to a different hosting environment without requiring a time-consuming and technically risky configuration procedure. With ProSight Virtual Hosting, you are not locked into one hosting service. Learn more about ProSight Virtual Hosting services.

ProSight IT Asset Management: Network Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to capture, maintain, find and protect information related to your network infrastructure, processes, applications, and services. You can quickly locate passwords or serial numbers and be alerted about impending expirations of SSLs or domains. By updating and managing your network documentation, you can eliminate as much as 50% of time wasted trying to find vital information about your IT network. ProSight IT Asset Management includes a centralized repository for holding and collaborating on all documents required for managing your business network such as standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also supports a high level of automation for gathering and associating IT data. Whether you’re planning enhancements, performing maintenance, or responding to a crisis, ProSight IT Asset Management delivers the knowledge you require when you need it. Learn more details about Progent's ProSight IT Asset Management service.

Expert Security Design
Every business should have a thoroughly considered security program that includes both pre-attack processes and response plans. The proactive strategy is a collection of procedures designed to reduce vulnerabilities. The post-attack strategy assists your security engineers to assess the damage caused by an attack, repair the network, record the experience, and get business functions operational as quickly as feasible.

Progent's expert IT security engineers are available to help your business to run a complete risk assessment and create a network security plan to implement security processes and controls to minimize ongoing attacks and threats.

CISM Certified Security Consulting Services
The CISM organization defines the core capabilities and worldwide standards of performance that information security professionals are expected to learn. It gives business management the assurance that those who have qualified for their CISM credential possess the background and knowledge to provide effective security management and consulting services. Progent offers the services of CISM certified security professionals to help companies with:

  • Information Security Governance
  • Vulnerability Management
  • Information Security Implementation Management
  • Network Security Management
  • Response Planning
Find out additional details concerning Progent's CISM Accredited Information Security Consulting Expertise.

CISSP Accredited Security Consulting Expertise
CISSP recognizes expertise with a worldwide standard for information security. The American National Standards Institute has granted certification accreditation in the field of information security under ISO 17024. Progent offers the services of security professionals who have earned CISSP certification. Progent can give you access to a CISSP-certified expert to help your company in a variety security fields such as:

  • Security Administration Procedures
  • Security Infrastructure and Models
  • Access Control Solutions and Methodology
  • Software Development Security
  • Secure Operations
  • Physical Security
  • Data Encryption Technology
  • Telecommunications, LAN and Internet Security
  • Business Continuity Preparedness
Learn additional information about Progent's CISSP Qualified Cybersecurity Support Professionals.

CISSP-ISSAP Certified Secure Network Architecture Consulting Services
Progent's CISSP-ISSAP certified network architecture professionals are consultants who have earned ISSAP Certification as a result of thorough testing and significant experience with information security design. The ISSAP credential indicates proven skill in the most in-depth requirements of IS security architecture bounded by the broader scope of information security knowledge needed for CISSP certification. Progent's ISSAP-certified security experts can help your company with all aspects of secure network architecture including.

  • Access Management Systems and Techniques
  • Phone System and Network Protection
  • Data Encryption Solutions
  • Requirements Evaluation and Security Standards
  • BCP and Disaster Recovery Planning
  • Physical Security
Learn additional details concerning Progent's ISSAP Qualified Secure Network Architecture Consulting Professionals.

CISA Qualified IS Security Auditing Engineering Expertise
The CISA accreditation is a prestigious achievement that indicates expertise in IS security auditing. Certified by the American National Standards Institute (ANSI), the CISA accreditation requires that candidates pass a comprehensive test administered by the ISACA professional association. Progent's CISA-certified network security audit engineers can assist your business in the areas of:

  • Information Systems Audit Services
  • Information Technology Administration
  • Network Assets and Infrastructure Planned Useful Life
  • IT Service Delivery
  • Safeguarding Information Resources
  • Business Continuity Planning
Find out more details about Progent's CISA Qualified Security Auditing Consulting Support.

CRISC Experts
The Certified in Risk and Information Systems Control (CRISC) certification program was established by ISACA in 2010 to verify a consultant's skills to design, implement, and support IS control mechanisms to mitigate network risk. Progent offers the expertise of a CRISC-certified consultant to help you to develop and carry out a workplace continuity or disaster recovery plan that follows leading practices identified by CRISC and geared to align with your organization's risk appetite, business goals, and budgetary guidelines. Progent's CRISC network risk mitigation specialists offer a range of risk assessment services including:

  • Collect information and review documentation to help identify major vulnerabilities
  • Inventory legal, industry, and contractual mandates and organizational standards related to your information system to assess their possible impact on your strategic goals
  • Identify potential threats for your operational processes to assist in evaluating your corporate risk
  • Create a risk awareness program and conduct seminars to make sure your organization understand IT risk so they can contribute to your risk management process
  • Connect identified risk vectors to related business procedures to help assign risk responsibility
  • Validate risk tolerance with your senior management and major stakeholders to ensure they are in agreement
Read the details about Progent's CRISC Risk Management Consultants.

GIAC Certified IS Security Consulting Support
Global Information Assurance Certification was established in 1999 to certify the knowledge of computer security experts. GIAC's goal is to ensure that an accredited professional has the knowledge necessary to provide support in important categories of system, information, and software security. GIAC accreditations are acknowledged by companies and government organizations all over the world including and the United States National Security Agency. Progent's GIAC-certified network security audit experts can help your business with:

  • Assessing IT Infrastructure
  • Incident Response
  • Intrusion Detection
  • Web Services Security
  • SIEM solutions
Read additional details about Progent's GIAC Information Assurance Expertise.

Contact a Progent Security Expert
To see how you can contact a Progent security engineer for remote or on-premises expertise in Mississippi, call 1-800-993-9400 or visit Online Network Support.














© 2002- 2019 Progent Corporation. All rights reserved.