To get fast online help with data security issues, businesses in Portland, OR, can find world-class expertise by contacting Progent's security engineers. Progent's remote service staff is available to offer effective and low-cost assistance with security crises that threaten the productivity of your information system. Progent's accredited consultants are certified to support systems powered by Windows, Linux, Apple macOS and OS X, Sun, and popular derivatives of UNIX. Progent's wide selection of services covers firewall configuration, email security, secure network infrastructure, and business continuity planning. Progent's support staff has earned the world's top security credentials including GIAC (Global Information Assurance Certification) and Certified Information Systems Security Professional (CISSP).

Progent offers online security help on a per-minute basis without minimum minutes and without additional fees for setup or after hours service. By charging per minute and by delivering top-level expertise, Progent's billing model keeps costs under control and eliminates situations where quick fixes result in major expenses.

Our Network Has Been Attacked: What Are We Supposed to Do?
Cybersecurity ConsultantsIf your network is now faced with a network security crisis, refer to Progent's Urgent Online Computer Support to find out how to receive immediate aid. Progent maintains a pool of certified cybersecurity experts who can provide remote and onsite assistance that includes threat containment, mitigation, recovery, forensics, and enhancement of your cybersecurity defense to protect against future attacks.

For organizations that have planned carefully for an attack, the step-by-step post-attack response procedure promoted by GIAC is Progent's approved method of reacting to a serious security incident.

Introduction to Progent's Security Expertise
Managing computer protection plus preparation for restoring vital information and functions following a security breach requires a continual program involving a variety of technologies and procedures. Progent's certified security professionals can help your organization at all levels in your efforts to protect your IT network, from security audits to designing a complete security program. Some areas covered by Progent's security consultants include Security Planning and Implementation, Information Recovery and Security Forensics, and Outsourced Protection from Email-Borne Attacks.

Planning and Building Secure Networks
Every company ought to have a thoroughly thought out security strategy that incorporates both preventive and reactive steps. The proactive plan is a collection of steps that works to reduce security gaps. The post-attack plan defines procedures to assist security personnel to assess the losses caused by a breach, remediate the damage, document the experience, and revive network activity as soon as feasible. Progent can show you how to incorporate protection into your business processes. Progent can install scanning utilities, define and implement a safe computer architecture, and propose processes and policies to optimize the protection of your network. Progent's security experts are available to help you to set up a firewall, deploy safe offsite connectivity to email and information, and configure an efficient virtual private network (VPN).

If you are looking for an economical option for outsourcing your security administration, Progent's 24x7 Network Support Packages feature automated online system monitoring and fast resolution of emergencies.

Hybrid Cloud Solutions
Progent can help your company you to design, deploy, manage and repair enterprise hybrid cloud solutions that incorporate local and cloud hosted resources and that comply with regulatory data security requirements. (Learn about Progent's Office 365 Exchange Online integration solutions with on-premises installations of Exchange, Microsoft Azure enterprise hybrid cloud integration and Progent's Amazon Web Services (AWS) enterprise hybrid cloud solutions.)

System Recovery and Security Forensics
Progent provides expertise in recovering networks and devices that have been compromised, are suspect, or have stopped working because of a security breach. Progent can show you how to determine the losses resulting from the assault, restore normal business operations, and retrieve data compromised as a result of the event. Progent's security engineers can also manage a comprehensive forensic evaluation by examining activity logs and using a variety of proven assessment techniques. Progent's experience with security consulting minimizes your downtime and allows Progent to propose efficient ways to avoid or mitigate future assaults.

Progent's Low-Cost Managed Services for Information Security
Progent's low-cost ProSight line of network management outsourcing services is designed to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance. Managed services offered by Progent include:

ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring is an endpoint protection service that utilizes cutting edge behavior-based machine learning tools to guard endpoints and physical and virtual servers against modern malware assaults such as ransomware and file-less exploits, which routinely evade legacy signature-matching AV products. ProSight ASM protects local and cloud resources and provides a unified platform to manage the entire threat progression including protection, detection, containment, remediation, and forensics. Key capabilities include one-click rollback using Windows VSS and real-time network-wide immunization against newly discovered attacks. Read more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware recovery.

ProSight Enhanced Security Protection (ESP): Unified Endpoint Protection
ProSight Enhanced Security Protection (ESP) services offer economical in-depth security for physical servers and VMs, desktops, mobile devices, and Exchange Server. ProSight ESP uses contextual security and advanced machine learning for round-the-clock monitoring and reacting to cyber assaults from all vectors. ProSight ESP offers firewall protection, intrusion alarms, device control, and web filtering via leading-edge technologies packaged within one agent accessible from a single control. Progent's security and virtualization experts can help you to design and configure a ProSight ESP environment that addresses your company's specific requirements and that allows you demonstrate compliance with government and industry information protection standards. Progent will help you specify and configure policies that ProSight ESP will enforce, and Progent will monitor your network and react to alarms that call for immediate action. Progent can also help your company to install and verify a backup and restore system such as ProSight Data Protection Services so you can recover rapidly from a destructive cyber attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection unified endpoint security and Microsoft Exchange email filtering.

ProSight DPS: Managed Cloud Backup and Recovery
ProSight Data Protection Services from Progent provide small and medium-sized businesses a low cost end-to-end solution for reliable backup/disaster recovery (BDR). Available at a fixed monthly rate, ProSight Data Protection Services automates your backup activities and enables rapid restoration of critical files, apps and virtual machines that have become unavailable or corrupted due to component breakdowns, software bugs, natural disasters, human error, or malicious attacks such as ransomware. ProSight DPS can help you back up, retrieve and restore files, folders, apps, system images, as well as Microsoft Hyper-V and VMware images. Important data can be backed up on the cloud, to an on-promises device, or mirrored to both. Progent's backup and recovery consultants can provide world-class expertise to set up ProSight Data Protection Services to be compliant with regulatory requirements such as HIPPA, FIRPA, PCI and Safe Harbor and, whenever necessary, can assist you to restore your business-critical data. Find out more about ProSight Data Protection Services Managed Cloud Backup.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering and email encryption service that incorporates the infrastructure of leading data security vendors to deliver centralized management and world-class security for your email traffic. The powerful structure of Progent's Email Guard integrates cloud-based filtering with an on-premises security gateway appliance to provide complete protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. The cloud filter acts as a preliminary barricade and keeps most threats from reaching your network firewall. This decreases your exposure to external threats and saves system bandwidth and storage. Email Guard's onsite security gateway device adds a further layer of analysis for inbound email. For outbound email, the on-premises security gateway offers AV and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The onsite security gateway can also help Exchange Server to monitor and safeguard internal email traffic that originates and ends inside your corporate firewall. For more information, see Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small business can have its key servers and applications hosted in a secure Tier III data center on a fast virtual host set up and managed by Progent's network support experts. Under the ProSight Virtual Hosting model, the client owns the data, the operating system software, and the apps. Because the system is virtualized, it can be ported immediately to a different hardware environment without a lengthy and difficult reinstallation procedure. With ProSight Virtual Hosting, your business is not tied a single hosting provider. Find out more details about ProSight Virtual Hosting services.

ProSight IT Asset Management: Infrastructure Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, maintain, find and protect data related to your IT infrastructure, processes, business apps, and services. You can quickly locate passwords or serial numbers and be warned about impending expirations of SSL certificates ,domains or warranties. By updating and organizing your IT documentation, you can save up to half of time spent searching for vital information about your IT network. ProSight IT Asset Management includes a common repository for storing and collaborating on all documents required for managing your business network like standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also offers advanced automation for collecting and relating IT information. Whether you’re planning improvements, performing maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the information you need the instant you need it. Learn more about Progent's ProSight IT Asset Management service.

Special Security Services Available from Progent
Progent's security consultants offer unique consulting support in key areas of network protection such as:

Vulnerability Evaluation and Compliance Testing
Progent offers experience with security evaluation utilities such as Microsoft Baseline Security Analyzer or LANguard from GFI for performing a set of comprehensive network tests to uncover potential security holes. Progent has extensive experience with these and similar utilities and can help you to understand assessment results and react efficiently. Progent's security engineers also offer web application validation and can perform expert evaluation of corporate-wide security to assess your organization's compliance with major global security standards including HIPAA, NIST, and ISO. Also, Progent can assess the strength of your wireless security including in-place wireless equipment as well as portable handsets. Learn more information concerning Progent's Vulnerability Evaluation and Security Compliance Assessment.

Cisco Security, PIX Firewall and ASA Firewall, Virtual Private Network, Aironet and Meraki Wi-Fi Expertise
Progent's Cisco Certified Internetwork Experts and Cisco Certified Network Professionals can provide in-depth technical expertise for Cisco's entire range of security and Virtual Private Network (VPN) products such as PIX 500 Firewalls and ASA Series Firewalls, Catalyst FWSM, secure broadband and IS routers, wireless access points and bridges, Cisco Meraki cloud-managed Wi-Fi access points, and Catalyst Series switches. Learn more details concerning Cisco Security, Virtual Private Network (VPN) and Wireless Support.

Additional Firewall and VPN Consulting Services
In addition to being expert in a wide range of network security technologies from Microsoft and Cisco, Progent can provide companies of any size top-level engineering services for products from other major firewall and Virtual Private Network vendors. Progent's engineers can provide:

Unannounced Intrusion Checking Consulting
Unannounced intrusion checking is a key technique for allowing organizations to determine how exposed their information systems are to serious attacks by revealing how effectively corporate protection policies and technologies stand up to planned but unpublicized intrusion attempts launched by seasoned security specialists utilizing the latest intrusion techniques. Find out more details concerning Progent's Penetration Testing Services.

CISM Security Consulting Expertise
Certified Information Security Manager Consultants for Portland, OregonCertified Information Security Manager (CISM) identifies the basic competencies and international benchmarks of performance that IT security professionals are expected to master. It provides executive management the confidence that consultants who have been awarded their accreditation have the background and knowledge to provide efficient security administration and consulting support. Progent can provide a CISM support professional to help your organization in key security disciplines including data security governance, vulnerability assessment, information security program control, and incident response management.

Read more details about Progent's CISM Security Support Assistance.

Certified Information Systems Security Professionals (CISSP) Security Support Services
CISSP Qualified Network Security Professionals for Portland, OregonProgent's Certified Information Systems Security Professionals (CISSPs) are cybersecurity specialists who have earned CISSP status through verified professional work, extensive study, and exhaustive testing. CISSP qualification indicates expertise in an international standard for information security. ANSI has given the CISSP credential official recognition in the area of information security under ISO/IEC 17024. Fields of expertise covered within CISSP include cybersecurity administration procedures, security architecture and test systems, access permission systems, applications development security, operations security, physical security, encryption, communications, network security, and business continuity planning.

Get additional details about Progent's CISSP Support Services.

CISSP-ISSAP Certified Consultants for Secure Network Infrastructure
CISSP Information Systems Security Architecture Professionals (ISSAP) for Portland, OregonProgent's ISSAP qualified cybersecurity consultants have earned ISSAP accreditation after rigorous testing and extensive experience. field experience with information security design. ISSAP security experts have comprehensive understanding of access control systems and methodologies, phone system and network infrastructure protection, cryptography, needs evaluation, business continuity planning (BCP) and disaster recovery planning (DRP), and physical security. Progent's ISSAP-qualified security specialists can assist your company with all aspects of architecture security.

Learn more details about Progent's ISSAP Accredited Protected IT Architecture Consulting Services.

CISSP-ISSEP Certified Security Engineering Experts
CISSP-ISSEP certified Cybersecurity ExpertsNetwork Security consultants with CISSP-ISSEP (Information Systems Security Engineering Professional) certification have proven their ability to provide enterprises with the expertise associated with a senior systems engineer, information assurance systems engineer, information assurance officer, information assurance analyst, or senior security analyst. Progent can provide the support of a certified CISSP-ISSEP cybersecurity expert to assist your organization to follow current system security engineering theory and techniques in system development, review system security designs according to security engineering leading practices, produce viable system designs that incorporate compliant security features for all critical system functions, define efficient configuration strategies to deliver operational security, perform in-depth risk analysis, and recommend practical security models that balance your operational goals with your company's tolerance for risk.

Learn more about Progent's CISSP-ISSEP Cybersecurity Engineering Consulting.

CISA Security Auditor Support Services
Certified Information Systems Auditor (CISA) Engineers for Portland, OregonThe Certified Information Systems Auditor (CISA) accreditation is an important achievement that indicates expertise in network security audit and control. Accredited by ANSI, the CISA credential has consultants pass an exhaustive examination administered by the ISACA international professional association. Progent offers the expertise of a CISA-certified security audit consultant trained to assist companies in the areas of IS audit process, IT governance, systems and architecture lifecycle, information technology service delivery, safeguarding data resources, and disaster recovery preparedness.

Read the details concerning Progent's Certified Information Systems Auditor Consulting Services.

CRISC IT Risk Management Specialists
CRISC-certified IT Risk Consultants for Portland, OregonThe CRISC program was initiated by ISACA in 2010 to validate an IT professional's ability to design, implement, and maintain information system control mechanisms to mitigate risk. Progent can provide the services of a CRISC-certified engineer to assist you to create and execute a workplace continuity or disaster recovery plan based on industry best practices identified by CRISC and crafted to match your company's risk tolerance, business objectives, and IT budget. Progent's network risk mitigation expertise is a good fit the support available from Progent's CISA-qualified security engineers for objectively auditing your IS control mechanisms and also with the expertise of Progent's CISM-certified support professionals for defining security policies and procedures.

Find out more details concerning Progent's CRISC Network Risk Mitigation Expertise.

GIAC (Global Information Assurance Certification) Support Services
Network Security Engineers with Global Information Assurance Certification for Portland, OregonGlobal Information Assurance Certification was founded in 1999 to certify the skill of computer security experts. GIAC's mission is to ensure that an accredited professional has the skills needed to provide services in vital areas of system, data, and application software security. GIAC accreditations are acknowledged by businesses and government organizations around the world including U.S. NSA. Progent offers the expertise of certified security engineers for all of the security disciplines covered within GIAC accreditation topics including auditing perimeters, security incident response, intrusion detection, web application security, and security information and event management (SIEM) solutions.

Find out more information about Progent's GIAC Information Assurance Services.

Contact Progent for Computer Security Expertise
If your company is situated in Portland or anywhere in Oregon and you want cybersecurity help, phone Progent at 800-993-9400 or go to Contact Progent.














© 2002- 2019 Progent Corporation. All rights reserved.