For immediate remote assistance with data security problems, companies in Portland, OR, can find expert support from Progent's certified security engineers. Progent's online service staff is available to offer efficient and affordable assistance with security issues that threaten the viability of your IT network. Progent's security consultants are qualified to provide help for systems based on Microsoft, Linux, Apple macOS and OS X, Sun Solaris, and major derivatives of UNIX. Progent's broad range of consulting services covers firewall technology, email filtering and encryption, secure system design, and business continuity planning. Progent's technical support team has earned the world's most advanced security accreditations including CISM and Information System Security Architecture Professional (ISSAP).

Progent offers online security support on a by-the-minute basis with no minimum minutes and without extra fees for sign-up or after hours service. By charging by the minute and by delivering top-level expertise, Progent's pricing policy keeps expenses low and avoids scenarios where simple fixes result in major expenses.

Our Network Has Been Attacked: What Should We Do Now?
If you are currently experiencing a security emergency, visit Progent's Emergency Online Computer Support to find out how to get fast aid.

For companies who have planned beforehand for being hacked, the formal incident response procedure promoted by Global Information Assurance Certification is Progent's approved method of handling a serious security incident.

Introduction to Security Expertise
Coordinating data protection as well as staying ready for restoring vital information and functions after an attack requires an on-going effort involving an array of technologies and processes. Progent's certified professionals can help your business at all levels in your attempt to guard your IT network, ranging from security evaluation to creating a complete security plan. Key areas supported by Progent's experts include Planning and Prevention, Data Restoration and Security Failure Analysis, and Outsourced Protection from Email-Borne Spam and Viruses.

Designing and Implementing Protected Networks
Any business ought to have a carefully considered security strategy that incorporates both preventive and responsive activity. The proactive strategy is a set of steps that helps to reduce vulnerabilities. The post-attack plan defines activities to help security personnel to evaluate the damage resulting from a breach, repair the damage, document the event, and revive business functions as soon as possible. Progent can advise you how to build security into your business processes. Progent can install auditing software, create and execute a safe network infrastructure, and propose processes and policies that will optimize the safety of your network. Progent's security professionals are available to help you to configure a firewall, design secure offsite access to e-mail and information, and configure an effective virtual private network (VPN).

If you are looking for an economical option for outsourcing your network security administration, Progent's Round-the-clock Network Support Options include non-stop remote network tracking and immediate resolution of problems.

Hybrid Cloud Solutions
Progent can help your company you to design, implement, administer and repair enterprise hybrid cloud solutions that combine local and cloud hosted infrastructure and that comply with government and industry data security requirements. (Find out about Progent's Office 365 integration solutions with on-premises installations of Exchange, Azure enterprise hybrid cloud integration and Progent's Amazon Web Services (AWS) enterprise hybrid cloud solutions.)

System Recovery and Failure Analysis
Progent offers skill in restoring networks and computers that have been hacked, are in question, or have failed because of a security breach. Progent can show you how to evaluate the damage resulting from the attack, return your company to ordinary functions, and recover information compromised owing to the event. Progent's certified specialists can also manage a thorough failure evaluation by examining event logs and using other advanced forensics techniques. Progent's experience with security consulting reduces your business disruption and permits Progent to suggest efficient ways to avoid or mitigate future assaults.

Progent's Flat-rate Managed Services for Information Security
Progent's value-priced ProSight series of managed services is intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all facets of information assurance. Managed services available from Progent include:

ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that utilizes next generation behavior machine learning technology to guard endpoints as well as servers and VMs against modern malware attacks like ransomware and email phishing, which easily escape traditional signature-based anti-virus tools. ProSight Active Security Monitoring protects local and cloud resources and offers a unified platform to manage the entire malware attack progression including protection, identification, mitigation, remediation, and forensics. Key features include single-click rollback using Windows Volume Shadow Copy Service (VSS) and real-time system-wide immunization against newly discovered threats. Read more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense.

ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Protection
Progent's ProSight Enhanced Security Protection (ESP) managed services offer ultra-affordable in-depth security for physical servers and VMs, workstations, mobile devices, and Exchange email. ProSight ESP uses adaptive security and modern behavior analysis for round-the-clock monitoring and reacting to security threats from all attack vectors. ProSight ESP offers two-way firewall protection, penetration alerts, device control, and web filtering through leading-edge tools packaged within one agent accessible from a unified console. Progent's data protection and virtualization experts can help you to design and configure a ProSight ESP environment that meets your company's specific requirements and that allows you demonstrate compliance with legal and industry data security regulations. Progent will assist you specify and implement security policies that ProSight ESP will manage, and Progent will monitor your IT environment and react to alerts that require urgent attention. Progent's consultants can also assist your company to set up and verify a backup and restore solution such as ProSight Data Protection Services so you can recover rapidly from a destructive cyber attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint protection and Microsoft Exchange filtering.

ProSight Data Protection Services: Managed Backup and Recovery
ProSight Data Protection Services provide small and mid-sized businesses a low cost and fully managed solution for reliable backup/disaster recovery (BDR). Available at a low monthly price, ProSight Data Protection Services automates your backup activities and allows rapid restoration of critical files, apps and virtual machines that have become lost or damaged due to component breakdowns, software glitches, natural disasters, human mistakes, or malicious attacks like ransomware. ProSight DPS can help you protect, recover and restore files, folders, apps, system images, plus Microsoft Hyper-V and VMware virtual machine images. Important data can be protected on the cloud, to an on-promises storage device, or mirrored to both. Progent's cloud backup consultants can deliver world-class support to configure ProSight DPS to be compliant with regulatory standards such as HIPPA, FINRA, and PCI and, whenever needed, can help you to recover your critical information. Find out more about ProSight Data Protection Services Managed Cloud Backup and Recovery.

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering and email encryption service that incorporates the technology of top information security vendors to deliver centralized management and world-class protection for your inbound and outbound email. The hybrid structure of Email Guard integrates a Cloud Protection Layer with an on-premises security gateway device to provide advanced defense against spam, viruses, Denial of Service Attacks, DHAs, and other email-based malware. Email Guard's cloud filter serves as a first line of defense and keeps the vast majority of unwanted email from reaching your network firewall. This reduces your vulnerability to external attacks and saves system bandwidth and storage space. Email Guard's on-premises security gateway device provides a deeper level of analysis for inbound email. For outgoing email, the local security gateway offers anti-virus and anti-spam filtering, DLP, and email encryption. The on-premises gateway can also help Microsoft Exchange Server to monitor and protect internal email traffic that stays within your security perimeter. For more details, see Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small or mid-size business can have its key servers and applications hosted in a protected Tier III data center on a high-performance virtual machine host set up and maintained by Progent's IT support experts. Under Progent's ProSight Virtual Hosting service model, the customer retains ownership of the data, the OS software, and the applications. Because the system is virtualized, it can be ported easily to an alternate hardware environment without requiring a lengthy and technically risky configuration procedure. With ProSight Virtual Hosting, you are not tied a single hosting provider. Learn more details about ProSight Virtual Hosting services.

ProSight IT Asset Management: Network Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to create, update, find and protect data about your IT infrastructure, processes, business apps, and services. You can instantly find passwords or IP addresses and be warned about upcoming expirations of SSLs or warranties. By updating and managing your IT documentation, you can eliminate up to 50% of time thrown away searching for critical information about your network. ProSight IT Asset Management features a common location for storing and collaborating on all documents related to managing your network infrastructure like recommended procedures and How-To's. ProSight IT Asset Management also offers advanced automation for collecting and relating IT data. Whether you’re making improvements, performing regular maintenance, or responding to an emergency, ProSight IT Asset Management delivers the knowledge you require when you need it. Find out more details about Progent's ProSight IT Asset Management service.

Special Security Services Available from Progent
Progent's veteran consultants offer unique consulting support in key facets of network protection including:

Security Vulnerability Audits and Security Compliance Assessment
Progent provides experience with security auditing utilities such as Microsoft Baseline Security Analyzer or LANguard for performing a set of comprehensive system tests to uncover possible security holes. Progent has extensive experience with testing utilities and can help your company to understand audit reports and react efficiently. Progent's security engineers also offer web application testing and can perform thorough evaluation of corporate-wide security to determine your company's compliance with major global security specifications including FISMA, NIST, and ISO. Also, Progent can assess the strength of your wireless security covering stationary wireless appliances as well as portable handsets. Get more information about Progent's Information Risk Evaluation and Compliance Assessment.

Cisco Network Security, PIX and ASA Firewall, VPN, Aironet and Meraki Wireless Help
Progent's Cisco Certified Internetwork Experts and Cisco Certified Network Professionals can deliver in-depth technical support for Cisco's complete range of security and VPN solutions including PIX 500 Series Firewalls and ASA 5500 Firewalls, the Catalyst Firewall Services Module, protected broadband and integrated services routers, wireless access points, Meraki cloud-managed Wi-Fi APs, and Catalyst switches. Learn additional details about Cisco Security, Virtual Private Network (VPN) and Wireless Consulting.

Additional Firewall and Virtual Private Network Technologies
In addition to being expert in a broad range of protection solutions available from Microsoft and Cisco, Progent offers organizations of any size top-level engineering services for technologies from other important firewall and Virtual Private Network vendors. Progent's consultants can provide:

Unannounced Intrusion Testing Consulting
Unannounced intrusion checking is a key technique for helping companies to determine how exposed their networks are to potential threats by testing how effectively network protection policies and mechanisms hold up to planned but unpublicized intrusion attempts instigated by veteran security specialists utilizing the latest hacking techniques. Find out more information about Progent's Penetration Testing Services.

CISM Security Support Services
Certified Information Security Manager (CISM) Engineers for Portland, OregonCISM defines the fundamental competencies and international standards of performance that information technology security managers are expected to master. CISM offers executive management the assurance that consultants who have earned their certification have the experience and skill to provide effective security administration and engineering services. Progent can offer a CISM-certified support professional to assist your organization in vital security disciplines such as data protection governance, vulnerability management, information security program management, and crisis handling management.

Learn additional information about Progent's Certified Information Security Manager Security Consulting Services.

Certified Information Systems Security Professionals (CISSP) Security Support Services
CISSP Qualified Network Security Professionals for Portland, OregonProgent's CISSP consultants are security engineers who have been awarded CISSP accreditation as a result of demonstrated professional work, rigorous study, and formal examination. CISSP Certification recognizes expertise in a worldwide standard for IT security. ANSI has granted the CISSP status official recognition in the field of IT security under ISO/IEC 17024. Fields of expertise covered under CISSP include security management practices, security architecture and test systems, connection permission systems, applications development security, business processes security, physical security, encryption, communications, Internet security, and disaster recovery planning.

Read additional details about Progent's Certified Information Systems Security Professionals (CISSP) Consulting Services.

ISSAP-Qualified Engineers for Secure Network Infrastructure
ISSAP Information Systems Security Architecture Professionals for Portland, OregonProgent's ISSAP certified security consultants are experts who have earned ISSAP accreditation after rigorous testing and significant hands-on work with network security design. ISSAP consultants have acquired in-depth understanding of access management mechanisms and methodologies, phone system and network security, cryptography, needs evaluation, BCP and DRP, and physical security. Progent's ISSAP-qualified security experts can help your company with all phases of architecture security.

Read more information about Progent's ISSAP Certified Secure IT Infrastructure Engineering Services.

Certified Information Systems Auditor Consulting Services
CISA Engineers for Portland, OregonThe CISA credential is a prestigious qualification that indicates expertise in network security auditing. Certified by the American National Standards Institute, the CISA credential requires that candidates undergo an exhaustive test overseen by the ISACA international professional group. Progent offers the expertise of a CISA-qualified security audit consultant able to help businesses in the fields of IS audit process, IT governance, network assets and infrastructure planned useful life, IT service delivery, safeguarding data resources, and business continuity planning.

Learn additional information about Progent's CISA Professional Services.

CRISC Network Risk Management Specialists
CRISC-certified Risk Consultants for Portland, OregonThe Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA to validate an IT professional's skills to design, deploy, and maintain IS controls to mitigate risk. Progent offers the services of a CRISC-certified consultant to assist you to create and carry out a business continuity or disaster recovery plan based on leading practices identified by CRISC and geared to align with your organization's risk tolerance, business objectives, and budgetary guidelines. Progent's risk mitigation services are complementary to the services provided by Progent's CISA-qualified security engineers for impartially auditing your IS control mechanisms and also with the expertise of Progent's CISM support professionals for implementing company-wide security policies.

Learn additional details concerning Progent's CRISC IT Risk Management Consulting.

GIAC (Global Information Assurance Certification) Consulting Expertise
Security Engineers with GIAC Certification for Portland, OregonGIAC (Global Information Assurance Certification) was established in 1999 to certify the knowledge of network security professionals. GIAC's goal is to make sure that a certified professional has the skills needed to deliver support in vital categories of system, information, and program security. GIAC certifications are acknowledged by companies and government organizations throughout the world including and the United States National Security Agency (NSA). Progent can provide the help of certified security engineers for any of the security disciplines covered within GIAC accreditation topics such as assessing perimeters, security incident response, intrusion detection, web services security, and security information and event management (SIEM) solutions.

Read more details about Progent's GIAC Information Assurance Services.

Contact Progent for Network Security Support
If your company is situated in Portland or anywhere in the state of Oregon and you want computer security consulting, telephone Progent at 800-993-9400 or see Contact Progent.














© 2002- 2018 Progent Corporation. All rights reserved.