Small business information networks in the state of Mississippi can depend on quick and economical online help from Progent's accredited security experts to resolve critical security issues. The cost is affordable, billing is per minute, sign-up is immediate, and support is unbeatable. Progent also offers help for complex projects that demand the expertise of seasoned security engineers with high-level industry credentials.

If your Mississippi network is located some distance from larger metropolitan neighborhoods like Jackson, Gulfport, Biloxi, or Hattiesburg, help from local accredited security support specialists may be problematic when there's a crisis. This could mean lost productivity for your company, upset clients, unproductive workers, and defocused management. By calling Progent, you can get in touch with a qualified security engineer who can offer help whenever you need it to keep your information system operating and salvage your data.

Progent can assist you in your efforts to protect your information system with support services that can range from network security audits to creating a company-wide security strategy. Progent offers affordable support to help companies of any size to configure and manage protected IT environments based on Microsoft Windows and Cisco technology and that may include computers based on UNIX, Linux, Sun Solaris, or Mac OS X platforms as well as BYOD users with Apple iOS iPhones and iPads or Google Android or Windows Phone devices.

Progent can also show you how to outsource spam blocking and protection from email-borne assaults. Email Guard is Progent's email security platform that uses the services and infrastructure of leading data security vendors to deliver centralized management and world-class protection for your email traffic. The hybrid architecture of Progent's Email Guard combines a Cloud Protection Layer with a local security gateway appliance to offer advanced defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-based malware. ProSight Email Guard's cloud filter acts as a preliminary barricade and keeps most unwanted email from making it to your security perimeter. This decreases your vulnerability to external threats and conserves network bandwidth and storage space. ProSight Email Guard's onsite security gateway device adds a further layer of analysis for inbound email. For outbound email, the onsite security gateway provides AV and anti-spam protection, policy-based Data Loss Prevention, and encryption. The on-premises gateway can also enable Microsoft Exchange Server to monitor and protect internal email traffic that originates and ends within your security perimeter.

Progent's certified consultants are available online or on site to provide a variety of emergency or project-based IT security services which include:

If your company has an urgent need for IT security help, go to Progent's Emergency Online Network Support.

Progent's engineers can deliver advanced services in key fields of computer protection that include auditing, firewalls and VPN, and advanced security consulting.

System Evaluation
Progent's expert security engineers can evaluate the strength of your existing network protection implementation through comprehensive remote automated analysis via sophisticated utilities and tested procedures. Progent's experience in administering this service saves your company money and assures a detailed picture of weaknesses. The knowledge your IT organization is provided can form the basis of a security strategy that can allow your information system to operate safely and respond rapidly to new threats.

Automated Security Audits
Progent provides expertise in the use of security auditing packages including MBSA and GFI LANguard Network Security Scanner for economically performing a set of automatic network testing checks to identify possible security holes. Progent has extensive knowledge of other security analysis utilities such as NMAP, AMAP Application Scanner, eEye Vulnerability Scanner, plus utilities like SolarWinds, Hydra, and Nikto. Progent can help you to understand testing reports and respond appropriately.

Progent can help you design protection into your business processes, configure scanning tools, plan and implement a secure network environment, and suggest policies to optimize the safety of your IT system. Progent's security consultants are ready to assist you to configure a firewall, design safe remote access to email and business applications, and install VPN. Find out more about Progent's automated security analysis.

Security Inventory Service Bundles for Small Businesses
Progent offers two ultra-affordable security inventory bundles intended to enable small businesses to get an independent network security evaluation from an accredited security engineer. With Progent's External Security Inventory Checkup, an engineer administers an extensive test of your IT infrastructure from beyond your firewalled perimeter to determine potential weaknesses in the security posture you expose to the public. With Progent's Internal Network Security Inventory Checkup, an engineer runs a system scan from a secure computer within your firewall to evaluate the risk to internal attacks. The two security inventory services are configured and executed from a secured remote location. The process is managed by an engineer with high-level security credentials and who produces a document that details and analyzes the data collected by the scan and suggests cost-effective improvements where appropriate.

Network Intrusion Testing Consulting
Stealth intrusion checking is an important part of any successful network security plan. Progentís security experts can perform thorough intrusion tests without the awareness of your company's in-house network support staff. Stealth penetration checking uncovers whether current security monitoring systems such as intrusion detection warnings and event history monitoring are correctly configured and actively checked. Find out additional information about Progent's stealth security penetration testing support services.

Firewalls and VPN Solutions
Progent's background in network security solutions includes extensive field work with leading firewalls and VPN technology offered by a variety of vendors such as Cisco, Microsoft, and Symantec. Progent offers the services of engineers who have earned important industry certifications including Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Security Appliances Configuration and Troubleshooting
The new ASA 5500-X Series of firewalls with Firepower Services deliver significantly more value than Cisco's earlier PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 security appliances for new deployments. After Cisco's purchase of Sourcefire, the entire line of Cisco ASA 5500-X devices can be provisioned to support Firepower Services, built on Sourcefire's Snort technology, which is the world's most deployed network intrusion protection system. Firepower services provide enhanced capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-qualified CCIE network experts can assist your company to maintain your current PIX or ASA 5500 firewalls and migrate efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises support for ASA 5500-X firewalls with Firepower Services and can help your company to design, deploy, tune, manage and debug firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. Learn additional details about Cisco ASA 5500-X Firewalls with Firepower Services integration and debugging support.

Cisco Network Security and VPN Consulting Services
Cisco's network security and remote access technology represent a complete range of manageable security products to help safeguard your wired and wireless information system. Cisco's Virtual Private Network product family includes routers, firewalls, intrusion detection systems and VPN concentrators. Progent's expert staff of consultants includes field-proven specialists with Cisco Certified Internetwork Expert and CCNP qualifications who are able to assist your organization to select Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security solutions that align best with your company goals. Learn more details about Progent's Support Expertise for Cisco Security Solutions and VPN Products.

Support Expertise for Additional Firewall and Virtual Private Network Products
Progent offers small and medium size companies professional consulting for Intrusion Protection products and IPsec VPN products from major firewall and VPN security vendors including Check Point Software, Juniper Networks, and Symantec. Progent can help you create a comprehensive security plan and choose appropriate products from multiple vendors to achieve your security goals while sticking within your budget limits.

Progent's Flat-rate Managed Services for Information Assurance
Progent's low-cost ProSight family of network management outsourcing services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. Managed services available from Progent include:
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's email security solution that uses the services and infrastructure of top data security companies to deliver web-based control and world-class protection for all your inbound and outbound email. The powerful structure of Progent's Email Guard managed service integrates cloud-based filtering with a local gateway appliance to offer advanced protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-based malware. ProSight Email Guard's Cloud Protection Layer acts as a preliminary barricade and keeps the vast majority of unwanted email from making it to your security perimeter. This reduces your vulnerability to inbound threats and conserves system bandwidth and storage. ProSight Email Guard's on-premises security gateway appliance provides a further layer of analysis for incoming email. For outgoing email, the on-premises gateway offers AV and anti-spam filtering, policy-based Data Loss Prevention, and encryption. The onsite security gateway can also assist Microsoft Exchange Server to track and safeguard internal email that originates and ends within your security perimeter. Learn more about Progent's ProSight Email Guard Spam Filtering, Virus Blocking, Content Filtering and Data Leakage Protection.

ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring is an endpoint protection service that incorporates next generation behavior-based machine learning technology to defend endpoint devices and servers and VMs against new malware attacks like ransomware and file-less exploits, which routinely get by traditional signature-matching AV products. ProSight Active Security Monitoring protects on-premises and cloud resources and offers a unified platform to automate the complete malware attack lifecycle including protection, identification, containment, remediation, and post-attack forensics. Top features include one-click rollback using Windows Volume Shadow Copy Service (VSS) and automatic network-wide immunization against new threats. Read more about Progent's ProSight Active Security Monitoring Endpoint Protection and Ransomware Recovery.

ProSight Data Protection Services: Managed Cloud Backup
ProSight Data Protection Services from Progent provide small and medium-sized businesses a low cost end-to-end service for reliable backup/disaster recovery. Available at a fixed monthly price, ProSight DPS automates your backup activities and enables rapid recovery of vital data, applications and VMs that have become unavailable or corrupted as a result of component breakdowns, software glitches, natural disasters, human mistakes, or malicious attacks such as ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, applications, system images, as well as Microsoft Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to an on-promises storage device, or mirrored to both. Progent's BDR consultants can provide world-class expertise to set up ProSight DPS to to comply with government and industry regulatory requirements like HIPPA, FIRPA, PCI and Safe Harbor and, whenever needed, can assist you to recover your business-critical data. Read more about ProSight DPS Managed Cloud Backup and Recovery.

Certified Security Consulting
Any company ought to have a thoroughly thought out security program that includes both pre-attack processes and reaction plans. The pre-attack plan is a set of steps intended to minimize vulnerabilities. The post-attack strategy assists your IT security personnel to evaluate the impact caused by a security penetration, repair the damage, record the event, and get business functions operational as rapidly as feasible.

Progent's certified IT security engineers are available to help your business to perform a comprehensive risk assessment and create a computer security strategy to establish security policies and mechanisms to mitigate future attacks and dangers.

CISM Certified System Security Engineering Assistance
The CISM committee defines the basic competencies and worldwide standards of performance that information security professionals are expected to learn. CISM gives business management the assurance that those who have earned their CISM credential have the experience and capability to provide efficient security management and support consulting. Progent can provide the support of CISM certified security professionals to assist companies with:

  • Information Security Processes
  • Risk Analysis
  • Information Security Program Management
  • IS Security Management
  • Recovery Management
Find out additional information about Progent's CISM Accredited Information Security Support Professionals.

CISSP Accredited Security Consulting Assistance
CISSP certification denotes mastery of a worldwide standard for information security. ANSI has awarded certification accreditation in the field of information security under ISO 17024. Progent can provide the services of security experts who have qualified for CISSP certification. Progent can provide a CISSP-certified professional to help your company in a variety security areas including:

  • Security Administration Procedures
  • Security Infrastructure and Models
  • Access Control Systems and Processes
  • Applications Development Security
  • Operations Security
  • Physical Security
  • Data Encryption Technology
  • Telecommunications, Network and Internet Security
  • Disaster Recovery Planning
Learn more information concerning Progent's CISSP Accredited Security Engineering Services.

ISSAP Accredited Secure System Architecture Engineering Services
Progent's ISSAP certified IT architecture engineers are consultants who have earned ISSAP Certification as a result of thorough examination and extensive work with network security design. The Information System Security Architecture Professional (ISSAP) certification represents proven competence in the more complex demands of IS security architecture within the wider field of information security expertise needed for CISSP accreditation. Progent's ISSAP-qualified security experts can help your business with all phases of architecture security including.

  • Access Management Mechanisms and Methodologies
  • Phone System and Network Protection
  • Data Encryption Options
  • Requirements Evaluation and Security Standards
  • Business Continuity Planning and Disaster Recovery Planning
  • Hardware Security
Read additional details about Progent's ISSAP Qualified Secure Network Architecture Consulting Services.

CISA Certified Security Auditing Engineering Services
The Certified Information Systems Auditor (CISA) credential is a recognized achievement that represents expertise in network security audit and control. Certified by ANSI, the CISA credential has consultants pass an extensive examination given by the ISACA international professional group. Progent's CISA-certified IS security audit specialists can assist your IT organization with:

  • Information Systems Audit Process
  • Information Technology Enforcement
  • Systems and Infrastructure Lifecycle Planning
  • Information Technology Service Delivery
  • Protecting Information Resources
  • Disaster Recovery Preparedness
Find out more information about Progent's CISA Certified Security Auditing Consulting Expertise.

CRISC Consultants
The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA to verify a consultant's skills to design, implement, and support IS control mechanisms to reduce risk. Progent can provide the services of a CRISC-certified consultant to help you to develop and execute a workplace continuity plan that follows leading practices promoted by CRISC and geared to align with your organization's risk tolerance, business objectives, and budgetary guidelines. Progent's CRISC-certified network risk mitigation engineers offer a variety of risk identification services including:

  • Collect information and review documentation to identify significant vulnerabilities
  • Identify legal, regulatory, and business mandates and organizational policies related to your network to assess their possible impact on your strategic objectives
  • Identify potential threats for your operational processes to assist in evaluating your enterprise risk
  • Develop a risk awareness initiative and conduct training to make sure your organization understand IS risk so they can contribute to your risk control process
  • Connect identified risk scenarios to related business procedures to help assign risk responsibility
  • Validate risk tolerance with executive management and major stakeholders to make sure they align
Find out additional information about Progent's Certified in Risk and Information Systems Control (CRISC) Experts.

GIAC Qualified Security Consulting Support
Global Information Assurance Certification was established in 1999 to certify the knowledge of information technology security engineers. GIAC's mission is to make sure that an accredited security consultant has the knowledge necessary to deliver services in key areas of system, information, and program security. GIAC certifications are recognized by businesses and institutions around the world including and the United States National Security Agency. Progent's GIAC-qualified security audit consultants can assist your IT organization with:

  • Assessing Security Systems
  • Security Incident Response
  • Traffic Analysis
  • Web-based Services Security
  • SIEM solutions
Find out more information about Progent's GIAC Information Assurance Support.

Contact a Security Specialist
To learn how you can get in touch with a Progent security consultant for remote or on-premises expertise in Mississippi, phone 1-800-993-9400 or visit Online Network Help.














© 2002- 2018 Progent Corporation. All rights reserved.