Small business IT networks in the state of Mississippi can depend on prompt and economical remote help from Progent's qualified security professionals to fix critical security issues. The cost is reasonable, charges are per minute, engagement is immediate, and service is unbeatable. Progent also provides help for long-term engagements that demand the services of senior security engineers with top industry credentials.

If your Mississippi office is outside of more populated urban areas such as Jackson, Gulfport, Biloxi, or Hattiesburg, help from nearby accredited security engineers may be limited when you have a security disaster. This could mean a loss of productivity for your business, angry customers, idle employees, and distracted executives. By contacting Progent, you have access to a qualified security consultant who can provide help when you need it to keep your network running and restore your information.

Progent can help you at any level in your initiatives to defend your IT environment with services that can range from network security checks to developing a comprehensive security plan. Progent provides affordable support to help companies of any size to configure and manage secure networks based on Windows and Cisco technology and that may include computers running UNIX, Linux, Sun Solaris, or Mac OS X operating systems plus BYOD clients with Apple handhelds or Google Android or Windows Phone devices.

Progent can also help you outsource spam filtering and defense against e-mail-based assaults. Email Guard is Progent's email security platform that incorporates the technology of leading data security companies to provide centralized control and comprehensive security for all your email traffic. The hybrid structure of Email Guard integrates a Cloud Protection Layer with a local security gateway device to offer complete protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. Email Guard's cloud filter acts as a first line of defense and blocks most threats from reaching your security perimeter. This decreases your vulnerability to inbound threats and saves network bandwidth and storage. Email Guard's on-premises security gateway appliance adds a deeper level of analysis for inbound email. For outgoing email, the local gateway offers anti-virus and anti-spam protection, DLP, and email encryption. The onsite gateway can also help Exchange Server to track and safeguard internal email that originates and ends inside your security perimeter.

Progent's certified engineers are accessible online or on premises to offer a range of emergency or longer-term IT security services which include:

  • Run thorough security audits
  • Recover promptly after attacks
  • Configure hardware and software firewalls
  • Implement secure techniques for remote and mobile connectivity
  • Deploy effective software for automatic protection against viruses, spam and directory harvest attacks
  • Develop a comprehensive security strategy with 24x7 security monitoring
  • Provide comprehensive Help Desk Support
  • Create a practical backup and recovery plan built around Microsoft DPM backup/restore capability
If your business has an urgent need for computer security support, go to Progent's Urgent Remote Network Support.

Progent's security experts offer world-class support in vital facets of network protection including security assessment, firewall and VPN solutions, and high-level security planning.

System Security Evaluation
Progent's expert security engineers can evaluate the vulnerability of your existing network protection systems through comprehensive remote automated analysis via advanced utilities and proven techniques. Progent's skill in this testing saves your company consulting fees and assures a detailed picture of security holes. The knowledge your IT organization gains can be used as the foundation of a security plan that will allow your network to run safely and react rapidly to future threats.

Automated Security Audits
Progent offers expertise in the use of security auditing utilities including Microsoft's MBSA and LANguard from GFI for affordably running a set of automatic system auditing checks to uncover possible security holes. Progent has broad knowledge of other network analysis utilities such as NMAP, AMAP, eEye Vulnerability Scanner, plus utilities like Metasploit Framework, Hydra, and Nikto. Progent can help you to understand testing reports and react effectively.

Progent can show you how to design protection into your business processes, configure auditing applications, define and deploy a protected network environment, and recommend procedures to maximize the safety of your network. Progent's security professionals are able to show you how to set up a firewall, implement secure remote connectivity to email and data, and integrate virtual private network. Learn additional information about Progent's automated security assessment.

Security Inventory Service Packages for Small Companies
Progent offers two low-cost security inventory and evaluation bundles designed to enable small companies to get an objective network security evaluation from a qualified security consultant. With Progent's External Security Inventory Scan, an engineer administers a comprehensive test of your IT infrastructure from beyond your company firewall to uncover potential risks in the security profile you present to the public. With Progent's Internal Network Security Inventory Scan, a security engineer runs a network scan from a secure machine within your firewall to evaluate vulnerabilities to internal attacks. Both security inventory packages are set up and executed from a secured remote site. The process is managed by a consultant with top security credentials and who produces a document that summarizes and interprets the information captured by the scan and proposes cost-effective improvements if called for.

Stealth Intrusion Testing Support Services
Stealth intrusion testing is a key part of any comprehensive IT system security plan. Progentís security professionals can run extensive penetration checks without the awareness of your company's in-house IT resources. Stealth penetration checking uncovers whether current security monitoring tools such as intrusion incident warnings and event history analysis are properly set up and consistently checked. Learn additional information concerning Progent's stealth penetration testing consulting.

Firewall And Virtual Private Network (VPN) Support
Progent's background in network security solutions includes extensive field work with major firewalls and Virtual Private Network products offered by multiple companies such as Cisco, Microsoft, and CheckPoint. Progent offers the support of engineers who have earned key networking accreditations such as CCIE and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Integration and Troubleshooting
The new ASA 5500-X Series of firewalls with Firepower Services provide substantially more performance than Cisco's previous firewalls and have replaced the ASA 5500 and PIX firewalls for all new installations. After Cisco's acquisition of Sourcefire, the whole line of ASA 5500-X firewalls can be provisioned to enable Firepower Services, based on Sourcefire's Snort product, which is the market's most popular intrusion protection system. Firepower services provide powerful new features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-certified CCIE network consultants can help your company to manage your legacy PIX or Cisco ASA 5500 firewalls and migrate efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist your company to plan, configure, tune, manage and debug firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. Find out more information about Cisco ASA Firewalls with Firepower Services configuration and troubleshooting services.

Cisco Network Security and Virtual Private Network Consulting Expertise
Cisco's network security and offsite connection technology provide a complete line of manageable security solutions to help protect your wired and wireless information system. Cisco's VPN line includes switches, firewalls, intrusion detection systems and VPN concentrators. Progent's professional staff of consultants includes field-proven specialists with Cisco's CCIE and Cisco Certified Network Professional certifications who are able to help your business to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security technologies that align best with your business goals. Read additional information about Progent's Consulting Services for Cisco Security Solutions and VPN Products.

Support Expertise for Other Firewall and VPN Products
Progent provides small and medium size companies professional support for Intrusion Protection products and IPsec VPN products from major firewall and Virtual Private Network security companies including WatchGuard, Juniper Networks, and Symantec. Progent can show you how to design a detailed security strategy and choose appropriate products from a variety of suppliers to achieve your security objectives while sticking within your budget limits.

Progent's Flat-rate Managed Services for Information Security
Progent offers a selection of affordable, set-price monthly managed services intended to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all facets of information assurance. Managed services offered by Progent include:
Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
Email Guard is Progent's email security solution that uses the services and infrastructure of top data security vendors to deliver web-based control and comprehensive security for all your email traffic. The hybrid architecture of Email Guard combines a Cloud Protection Layer with an on-premises gateway device to offer complete defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-borne threats. The cloud filter acts as a first line of defense and blocks the vast majority of unwanted email from making it to your security perimeter. This reduces your vulnerability to external threats and conserves system bandwidth and storage. Email Guard's on-premises gateway appliance adds a further layer of inspection for incoming email. For outgoing email, the on-premises security gateway provides anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and encryption. The onsite gateway can also help Microsoft Exchange Server to track and protect internal email that originates and ends inside your corporate firewall. Learn more about Progent's Email Guard Spam Filtering, Virus Defense, Content Filtering and Data Loss Protection.

ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that utilizes next generation behavior analysis tools to guard endpoints and physical and virtual servers against new malware assaults like ransomware and file-less exploits, which routinely evade legacy signature-based anti-virus products. ProSight Active Security Monitoring safeguards on-premises and cloud resources and offers a single platform to address the complete threat progression including blocking, detection, containment, cleanup, and post-attack forensics. Key capabilities include single-click rollback with Windows Volume Shadow Copy Service (VSS) and real-time system-wide immunization against newly discovered threats. Read more about Progent's ProSight Active Security Monitoring (ASM) Endpoint Protection and Ransomware Defense.

ProSight DPS: Managed Cloud Backup and Recovery
ProSight Data Protection Services provide small and medium-sized businesses a low cost and fully managed service for reliable backup/disaster recovery (BDR). For a low monthly cost, ProSight DPS automates and monitors your backup processes and allows fast recovery of critical files, applications and VMs that have become unavailable or damaged due to hardware breakdowns, software glitches, natural disasters, human error, or malicious attacks such as ransomware. ProSight Data Protection Services can help you protect, recover and restore files, folders, applications, system images, as well as Hyper-V and VMware virtual machine images. Important data can be backed up on the cloud, to an on-promises storage device, or mirrored to both. Progent's BDR consultants can provide world-class expertise to set up ProSight DPS to be compliant with government and industry regulatory standards like IPPA, FIRPA, and PCI and, when needed, can assist you to recover your business-critical data. Find out more about ProSight Data Protection Services Managed Cloud Backup and Recovery.

Certified Security Consulting
Every company should have a carefully considered security strategy that includes both proactive procedures and response planning. The proactive plan is a collection of mechanisms intended to minimize vulnerabilities. The post-attack strategy helps your network security personnel to evaluate the damage resulting from an attack, fix the system, document the experience, and get the IT network operational as rapidly as feasible.

Progent's expert IT security consultants can to assist you to run a complete risk assessment and create a computer security strategy to implement security policies and controls to reduce future attacks and dangers.

CISM Qualified Information Security Engineering Assistance
The CISM organization describes the core competencies and global standards of performance that IT security managers are required to learn. CISM provides business management the assurance that those who have qualified for their CISM credential possess the experience and capability to provide efficient security management and consulting services. Progent can provide the support of CISM certified security consultants to help companies with:

  • Information Security Governance
  • Risk Analysis
  • Information Security Implementation Management
  • Network Security Administration
  • Response Planning
Find out additional details concerning Progent's CISM Qualified Network Security Support Professionals.

CISSP Certified Security Engineering Support
The CISSP credential recognizes expertise with a worldwide standard for network security. ANSI has awarded certification accreditation in the area of information protection under ISO 17024. Progent offers access to of security consultants who have earned CISSP certification. Progent can provide a CISSP-certified expert to help your organization in a broad range of security areas including:

  • Security Administration Procedures
  • Security Infrastructure and Paradigms
  • Access Control Systems and Methodology
  • Applications Development Security
  • Operations Security
  • Physical Security
  • Cryptography Technology
  • Telecommunications, Network and Internet Security
  • Disaster Recovery Preparedness
Find out additional information about Progent's CISSP-certified Security Engineering Professionals.

ISSAP Qualified Secure Network Architecture Consulting Services
Progent's ISSAP certified information system architecture engineers are consultants who have earned ISSAP Certification as a result of rigorous testing and significant work with network security architecture. The Information System Security Architecture Professional (ISSAP) credential represents proven skill in the more challenging demands of information security architecture within the wider field of information security expertise required for CISSP certification. Progent's ISSAP-qualified security experts can help your business with all phases of secure network architecture including.

  • Access Control Systems and Methodologies
  • Telecommunications and System Infrastructure Security
  • Encryption/Decryption Solutions
  • Requirements Evaluation and Security Guidelines
  • Business Continuity Planning (BCP) and DRP
  • Hardware Security
Learn more information about Progent's ISSAP Qualified Secure System Architecture Support Expertise.

CISA Accredited Information System Security Auditing Engineering Expertise
The Certified Information Systems Auditor (CISA) credential is a prestigious qualification that signifies mastery in information system security audit and control. Accredited by ANSI, the CISA accreditation requires that candidates undergo a comprehensive test given by the ISACA professional group. Progent's CISA-qualified IS security audit consultants can assist your business in the areas of:

  • Information Systems Audit Services
  • Information Technology Administration
  • Network Assets and Architecture Lifecycle Planning
  • Information Technology Service Delivery
  • Protecting Data Resources
  • Disaster Recovery Planning
Find out more details about Progent's CISA Accredited Security Auditing Consulting Assistance.

CRISC Experts
The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA to verify an IT professional's ability to design, deploy, and maintain information system control mechanisms to reduce network risk. Progent can provide the expertise of a CRISC-certified consultant to help your company to create and carry out a workplace continuity or disaster recovery plan based on industry best practices promoted by CRISC and crafted to align with your company's risk tolerance, business objectives, and IT budget. Progent's CRISC-qualified IT risk management experts offer a range of risk identification services such as:

  • Collect information and study documentation to help identify significant vulnerabilities
  • Inventory statutory, regulatory, and business requirements and organizational standards associated with your information system to determine their possible influence on your business objectives
  • Identify possible threats for your operational processes to help in evaluating your enterprise risk
  • Create a risk awareness program and provide seminars to ensure your organization understand IS risk so they can contribute to your risk management program
  • Connect identified risk vectors to your associated business processes to help determine risk ownership
  • Determine risk tolerance with your senior leadership and key stakeholders to ensure they match
Read more details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Accredited IS Security Consulting Services
GIAC (Global Information Assurance Certification) was established in 1999 to certify the knowledge of information technology security professionals. GIAC's mission is to assure that a certified security consultant has the knowledge appropriate to deliver services in key categories of network, data, and application software security. GIAC accreditations are acknowledged by businesses and institutions throughout the world including and the United States National Security Agency (NSA). Progent's GIAC-qualified information security audit experts can assist your IT organization with:

Find out additional information about Progent's GIAC Information Assurance Expertise.

Get in Touch with a Certified Progent Security Specialist
To learn how to contact a Progent security consultant for online or on-premises expertise in Mississippi, phone 1-800-993-9400 or visit Online Network Help.














© 2002- 2017 Progent Corporation. All rights reserved.