Small business IT networks in Mississippi can now get fast and economical online technical support from Progent's accredited security professionals to assist with complex security problems. The cost is competitive, charges are per minute, sign-up is immediate, and service is world class. Progent also provides assistance for long-term projects that demand the expertise of seasoned security engineers with top security certifications.

In case your Mississippi company is based far from major urban neighborhoods such as Jackson, Gulfport, Biloxi, or Hattiesburg, help from local qualified security support specialists may be limited when you have an urgent situation. This could mean lost income for your company, angry customers, unproductive employees, and defocused executives. By contacting Progent's remote support, you have access to a certified security engineer ready to provide help when you have to have it to keep your system running and recover your data.

Progent can help you in a variety of ways in your efforts to defend your network with services that ranges from network security assessments to developing a comprehensive security plan. Progent provides economical service to help businesses of all sizes to configure and maintain protected networks powered by Windows and Cisco products and that can include servers and desktops running UNIX, Linux, Sun Solaris, or Mac OS X platforms plus BYOD users with Apple handhelds or Google Android or Windows Phone smart phones and tablets.

Progent can also show you how to outsource spam blocking and defense against email-borne assaults. Email Guard is Progent's email filtering and encryption solution that uses the services and infrastructure of top data security vendors to deliver centralized management and world-class protection for all your inbound and outbound email. The powerful architecture of Email Guard managed service integrates a Cloud Protection Layer with an on-premises gateway device to offer complete defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-based threats. ProSight Email Guard's Cloud Protection Layer acts as a first line of defense and keeps the vast majority of unwanted email from making it to your network firewall. This decreases your vulnerability to inbound threats and saves system bandwidth and storage. ProSight Email Guard's onsite security gateway appliance adds a deeper layer of analysis for incoming email. For outbound email, the on-premises security gateway provides AV and anti-spam protection, DLP, and encryption. The local security gateway can also enable Exchange Server to monitor and safeguard internal email traffic that stays within your corporate firewall.

Progent's certified experts are available online or on premises to provide a variety of urgent or longer-term computer security services which include:

If your network has an urgent need for IT security support, go to Progent's Emergency Remote Technical Support.

Progent's support professionals offer advanced services in vital fields of system protection that include security assessment, firewalls and VPN, and high-level security consulting.

System Security Assessment
Progent's certified security consultants can assess the strength of your existing network security implementation by performing exhaustive remote automated testing via advanced utilities and tested techniques. Progent's skill in this testing saves your company money and offers a detailed portrayal of system vulnerability. The knowledge your IT organization gains can be used as the basis of a network protection plan that will permit your information system to run safely and react rapidly to new risks.

Automated Network Security Audits
Progent offers expertise in the use of security auditing software including MBSA and GFI LANguard NSS for affordably performing a variety of automatic network testing checks to uncover possible security weaknesses. Progent has broad knowledge of other security auditing utilities such as NMAP Port Scanner, AMAP application mapper, eEye Vulnerability Scanner, as well as tools like Metasploit Framework, Netcat, Hydra, and Nikto. Progent can show you how to understand audit reports and react appropriately.

Progent can show you how to design security into your company processes, install auditing applications, define and deploy a secure network environment, and recommend policies to maximize the safety of your network. Progent's security professionals are available to assist you to set up a firewall, implement safe remote connectivity to email and data, and install VPN. Find out additional information about Progent's automated security audits.

Security Inventory Bundles for Small Companies
Progent has put together two ultra-affordable security inventory scanning bundles designed to allow small companies to receive a professional security assessment from a certified security engineer. With Progent's External Security Inventory Checkup, an engineer runs an extensive test of your IT infrastructure from beyond your firewalled perimeter to determine potential risks in the security profile you expose to the public. With Progent's Internal Security Inventory Scan, a certified security professional executes a network scan from an authorized computer inside your company firewall to assess the risk to inside assaults. Both security inventory packages are set up and executed from a protected external site. The project is directed by an engineer with top security accreditations and who generates a document that details and interprets the data collected by the security scan and suggests practical improvements if appropriate.

Network Penetration Testing Support Services
Stealth intrusion testing is an important component of any successful IT system security plan. Progentís security experts can perform extensive intrusion tests without the awareness of your organization's in-house IT staff. Unannounced penetration checking uncovers whether current security defense tools such as intrusion detection alerts and event log monitoring are properly configured and consistently checked. Learn more about Progent's network penetration analysis support services.

Firewall and Virtual Private Network Support
Progent's background in network security technology includes extensive field work with major firewalls and Virtual Private Network technology offered by multiple companies such as Cisco, Microsoft, and CheckPoint. Progent can provide the services of consultants with important industry accreditations including CCIE and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Firewalls Configuration and Debugging
The latest generation of ASA 5500-X Series Next-Generation Firewalls with Firepower Services provide substantially more bang for the buck than Cisco's previous PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 security appliances for all new deployments. Following Cisco's acquisition of Sourcefire, the whole family of Cisco ASA 5500-X firewalls can be provisioned to support Firepower Services, built on Sourcefire's Snort product, which is the world's most deployed network intrusion protection system. Firepower services bring enhanced features such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-certified CCIE network experts can assist you to maintain your current PIX or ASA 5500 security appliances and migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist your business to plan, configure, optimize, administer and debug firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. See additional details about ASA Firewalls with Firepower Services configuration and troubleshooting support.

Cisco Network Security and VPN Consulting Services
Cisco's network security and remote connection products offer a full range of manageable security solutions to help protect your wired and wireless network infrastructure. Cisco's Virtual Private Network product family includes switches, firewalls, intrusion detection systems and VPN appliances. Progent's expert staff of consultants includes field-proven engineers with Cisco Certified Internetwork Expert and Cisco Certified Network Professional qualifications who can assist your business to select Cisco VPN, Cisco RADIUS Security, and additional Cisco security solutions that fit best with your business objectives. Learn additional details concerning Progent's Support Expertise for Cisco Security and Virtual Private Network Products.

Engineering Services for Additional Firewall and Virtual Private Network Products
Progent provides small and mid-size organizations expert consulting for Intrusion Protection products and IPsec VPN technology from leading firewall and Virtual Private Network security vendors including WatchGuard, Juniper Networks, and SonicWALL. Progent can help you create a comprehensive security strategy and select the right technologies from a variety of suppliers to achieve your security goals while sticking within your spending restraints.

Progent's Low-Cost Managed Services for Information Assurance
Progent's value-priced ProSight portfolio of outsourced network management services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. Managed services offered by Progent include:
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering and email encryption service that incorporates the infrastructure of top data security vendors to provide centralized control and world-class protection for your inbound and outbound email. The powerful architecture of Email Guard combines a Cloud Protection Layer with a local security gateway appliance to provide advanced protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-borne malware. The cloud filter serves as a first line of defense and blocks most threats from making it to your security perimeter. This decreases your vulnerability to inbound attacks and saves system bandwidth and storage space. Email Guard's onsite security gateway device provides a deeper layer of inspection for incoming email. For outgoing email, the on-premises gateway offers anti-virus and anti-spam protection, DLP, and email encryption. The onsite gateway can also assist Microsoft Exchange Server to track and protect internal email traffic that stays inside your corporate firewall. For more details, visit ProSight Email Guard spam filtering and data leakage protection.

ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection service that utilizes cutting edge behavior analysis technology to defend endpoint devices as well as physical and virtual servers against new malware attacks like ransomware and email phishing, which easily escape legacy signature-matching AV tools. ProSight Active Security Monitoring safeguards local and cloud resources and provides a unified platform to manage the entire threat progression including blocking, infiltration detection, mitigation, cleanup, and post-attack forensics. Key capabilities include single-click rollback with Windows Volume Shadow Copy Service and automatic network-wide immunization against new threats. Learn more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware recovery.

ProSight Data Protection Services: Managed Cloud Backup and Recovery
ProSight Data Protection Services from Progent offer small and mid-sized organizations an affordable end-to-end solution for reliable backup/disaster recovery. For a fixed monthly rate, ProSight Data Protection Services automates your backup processes and allows fast recovery of vital files, apps and VMs that have become unavailable or corrupted due to hardware failures, software bugs, natural disasters, human error, or malware attacks like ransomware. ProSight Data Protection Services can help you protect, recover and restore files, folders, apps, system images, as well as Hyper-V and VMware images. Critical data can be backed up on the cloud, to an on-promises device, or to both. Progent's backup and recovery specialists can deliver advanced support to configure ProSight DPS to to comply with regulatory standards such as HIPPA, FINRA, PCI and Safe Harbor and, whenever needed, can assist you to restore your critical data. Read more about ProSight DPS Managed Cloud Backup.

ProSight IT Asset Management: Network Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, maintain, find and safeguard data about your IT infrastructure, procedures, business apps, and services. You can instantly locate passwords or IP addresses and be warned about upcoming expirations of SSL certificates ,domains or warranties. By cleaning up and managing your network documentation, you can save as much as half of time thrown away trying to find vital information about your IT network. ProSight IT Asset Management includes a common repository for holding and sharing all documents related to managing your business network like standard operating procedures and How-To's. ProSight IT Asset Management also offers a high level of automation for gathering and relating IT information. Whether youíre planning enhancements, doing regular maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the knowledge you need as soon as you need it. Find out more about Progent's ProSight IT Asset Management service.

Expert Security Consulting
Any business ought to have a carefully considered security strategy that includes both pre-attack processes and reaction plans. The proactive strategy is a collection of steps intended to reduce vulnerabilities. The post-attack strategy helps your company's IT security engineers to evaluate the damage caused by a security penetration, repair the system, record the experience, and get the IT network operational as soon as feasible.

Progent's certified IS security engineers are available to help your company to run a full risk evaluation and create a computer security strategy to establish security processes and controls to minimize future assaults and threats.

CISM Accredited Information Security Consulting Assistance
The Certified Information Security Manager (CISM) committee describes the core competencies and international standards of skill that information security managers are required to master. CISM provides business management the confidence that consultants who have earned their CISM certification possess the experience and knowledge to provide efficient security administration and support services. Progent offers the services of CISM qualified security consultants to help companies with:

  • Information Security Processes
  • Vulnerability Analysis
  • Information Security Program Management
  • Information Security Management
  • Response Planning
Read additional information concerning Progent's CISM Certified Information Security Support Services.

CISSP Qualified Security Consulting Support
CISSP certification denotes expertise with a worldwide standard for network security. The American National Standards Institute has granted the CISSP credential recognition in the area of data protection stipulated by ISO/IEC 17024. Progent can provide access to of security consultants who have qualified for CISSP certification. Progent can provide a CISSP-certified professional to help your company in a broad range of security areas such as:

  • Security Administration Procedures
  • Security Architecture and Paradigms
  • Access Control Systems and Methodology
  • Applications Development Security
  • Operations Security
  • Physical Security
  • Cryptography Mechanisms
  • Telecom, LAN and WAN Security
  • Business Continuity Planning
Find out additional details concerning Progent's CISSP Accredited Security Consulting Services.

ISSAP Certified Secure System Architecture Consulting Services
Progent's ISSAP qualified network architecture engineers are experts who have earned ISSAP status as a result of rigorous examination and extensive experience with information security architecture. The Information System Security Architecture Professional (ISSAP) certification represents proven mastery in the most in-depth demands of IS security architecture bounded by the wider field of information security knowledge required for CISSP accreditation. Progent's ISSAP-certified security consultants can help your business with all aspects of architecture security including.

  • Access Management Mechanisms and Techniques
  • Phone System and Network Infrastructure Security
  • Cryptography Options
  • Needs Evaluation and Security Guidelines
  • Business Continuity Planning and DRP
  • Site Security
Find out additional details concerning Progent's ISSAP Certified Secure Network Architecture Consulting Professionals.

CISA Certified Information System Security Auditing Engineering Services
The Certified Information Systems Auditor (CISA) credential is a prestigious qualification that signifies expertise in network security audit and control. Certified by the American National Standards Institute (ANSI), the CISA credential has candidates pass an extensive examination given by the ISACA international professional group. Progent's CISA network security audit specialists are available to assist your IT organization with:

  • Information Systems Audit Process
  • IT Enforcement
  • Network Assets and Infrastructure Lifecycle Planning
  • IT Service Delivery
  • Safeguarding Information Assets
  • Business Continuity Planning
Read additional details concerning Progent's CISA Certified Network Security Auditing Consulting Assistance.

CRISC Experts
The Certified in Risk and Information Systems Control (CRISC) certification program was established by ISACA to validate a consultant's ability to design, deploy, and support IS control mechanisms to reduce risk. Progent offers the services of a CRISC-certified consultant to assist your company to develop and execute a workplace continuity plan based on industry best practices identified by CRISC and geared to match your company's risk tolerance, business objectives, and IT budget. Progent's CRISC-certified IT risk mitigation consultants offer a range of risk assessment services such as:

  • Gather information and review documentation to help identify major risk scenarios
  • Inventory statutory, regulatory, and contractual mandates and company standards related to your information system to assess their possible impact on your strategic goals
  • Point out possible threats for your business processes to assist in analyzing your corporate risk
  • Create a risk awareness program and provide training to ensure your stakeholders appreciate IS risk so they can assist with your risk control process
  • Match key risk vectors to related business procedures to help determine risk responsibility
  • Determine risk appetite with your senior management and major stakeholders to ensure they are in agreement
Find out more information concerning Progent's CRISC Experts.

GIAC Qualified IS Security Engineering Services
Global Information Assurance Certification was founded in 1999 to validate the skill of IT security professionals. GIAC's mission is to make sure that an accredited professional possesses the skills needed to provide support in key areas of system, data, and program security. GIAC accreditations are recognized by businesses and institutions all over the world including and the U.S. NSA. Progent's GIAC-qualified IS security audit consultants are available to help your IT organization with:

  • Auditing Perimeters
  • Security Incident Response
  • Intrusion Detection
  • Web-based Application Security
  • SIEM solutions
Learn additional details about Progent's GIAC Information Assurance Expertise.

Talk to a Progent Security Engineer
To learn how to access a Progent security consultant for online or onsite support in Mississippi, phone 1-800-993-9400 or go to Remote Network Help.














© 2002- 2018 Progent Corporation. All rights reserved.