For immediate remote help with network security problems, businesses in Portland, OR, can find expert troubleshooting from Progent's certified security professionals. Progent's remote service consultants are available to offer fast and economical assistance with security issues that are impacting the productivity of your IT network. Progent's accredited security engineers are certified to support environments powered by Microsoft Windows, Linux, Apple macOS and OS X, Sun, and popular versions of UNIX. Progent's wide selection of consulting services addresses firewall technology, email security, secure network infrastructure, and business continuity preparedness. Progent's support team has earned the industry's top security credentials including CISM and Information System Security Architecture Professional (ISSAP).

Progent provides remote security assistance on a by-the-minute model without minimum minutes and without extra charges for setup or after hours support. By billing per minute and by providing world-class support, Progent's pricing structure keeps expenses under control and avoids scenarios where quick fixes turn into major bills.

We've Been Hacked: What Are We Supposed to Do Now?
If your business is currently fighting a network security emergency, go to Progent's Emergency Online Network Support to find out how to get fast help.

For organizations that have prepared beforehand for a security breech, the formal post-attack handling model outlined by Global Information Assurance Certification is Progent's recommended method of responding to a major security penetration.

Introduction to Progent's Security Support Services
Coordinating network security as well as staying ready for recovering critical data and systems after a security breach demands a continual program that entails a variety of technologies and processes. Progent's certified engineers can assist your organization at whatever level in your attempt to protect your information system, from security audits to creating a comprehensive security strategy. Important areas covered by Progent's experts include Planning and Implementation, Data Recovery and Security Forensics, and Outsourced Protection from E-mail-Based Spam and Viruses.

Designing and Building Secure Networks
Every business ought to develop a thoroughly thought out security plan that includes both proactive and reactive steps. The proactive plan is a collection of precautions that helps to minimize security gaps. The post-attack plan specifies activities to assist security personnel to evaluate the damage resulting from an attack, repair the damage, document the experience, and restore network activity as soon as possible. Progent can advise you how to incorporate protection into your business operations. Progent can set up auditing software, define and build a safe computer architecture, and propose processes and policies to optimize the safety of your network. Progent's security professionals are available to help you to configure a firewall, deploy safe remote access to e-mail and information, and configure an effective virtual private network (VPN).

If your company is looking for an economical way for outsourcing your security management, Progent's Round-the-clock Network Support Options feature automated online system monitoring and quick response to emergencies.

Hybrid Cloud Solutions
Progent can help your IT team you to design, deploy, manage and troubleshoot enterprise hybrid cloud solutions that incorporate local and cloud-based infrastructure and that comply with government and industry data security requirements. (Find out about Progent's Office 365 integration solutions with on-premises installations of Exchange, Azure enterprise hybrid cloud integration and Progent's Amazon Web Services enterprise hybrid cloud solutions.)

System Recovery and Failure Analysis
Progent has skill in recovering networks and devices that have been compromised, are quarantined, or have stopped working because of a security breakdown. Progent can show you how to assess the losses resulting from the attack, restore normal business operations, and recover data compromised owing to the breach. Progent's certified engineers can also manage a comprehensive failure analysis by examining event logs and using a variety of proven assessment tools. Progent's experience with security issues minimizes your off-air time and allows Progent to recommend effective measures to avoid or contain future assaults.

Progent's Fixed-price Managed Services for Information Assurance
Progent's affordable ProSight series of outsourced network management services is intended to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all facets of information assurance. Managed services offered by Progent include:

ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring is an endpoint protection service that utilizes cutting edge behavior-based analysis tools to defend endpoint devices and physical and virtual servers against new malware assaults like ransomware and email phishing, which routinely get by traditional signature-based anti-virus tools. ProSight Active Security Monitoring safeguards on-premises and cloud-based resources and provides a single platform to manage the complete malware attack progression including protection, infiltration detection, mitigation, remediation, and post-attack forensics. Top capabilities include single-click rollback with Windows Volume Shadow Copy Service (VSS) and real-time system-wide immunization against newly discovered threats. Learn more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware defense.

ProSight Enhanced Security Protection: Unified Endpoint Security
Progent's ProSight Enhanced Security Protection services deliver ultra-affordable in-depth security for physical and virtual servers, desktops, mobile devices, and Microsoft Exchange. ProSight ESP utilizes adaptive security and modern behavior analysis for continuously monitoring and responding to cyber threats from all vectors. ProSight ESP provides firewall protection, penetration alarms, endpoint control, and web filtering via cutting-edge tools packaged within one agent accessible from a unified console. Progent's data protection and virtualization consultants can help you to design and configure a ProSight ESP deployment that meets your organization's specific needs and that allows you prove compliance with legal and industry data protection regulations. Progent will assist you specify and configure security policies that ProSight ESP will enforce, and Progent will monitor your network and react to alarms that require immediate action. Progent can also help you to install and verify a backup and restore system such as ProSight Data Protection Services so you can get back in business rapidly from a potentially disastrous cyber attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint protection and Microsoft Exchange email filtering.

ProSight DPS: Managed Backup and Recovery
ProSight Data Protection Services offer small and mid-sized businesses a low cost and fully managed service for reliable backup/disaster recovery. Available at a fixed monthly price, ProSight DPS automates your backup activities and allows rapid restoration of vital files, apps and VMs that have become lost or damaged as a result of component breakdowns, software bugs, disasters, human error, or malware attacks such as ransomware. ProSight DPS can help you back up, recover and restore files, folders, applications, system images, plus Microsoft Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to an on-promises storage device, or mirrored to both. Progent's backup and recovery consultants can deliver world-class support to configure ProSight DPS to be compliant with government and industry regulatory requirements such as HIPPA, FIRPA, and PCI and, when necessary, can assist you to restore your critical information. Find out more about ProSight Data Protection Services Managed Backup.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that incorporates the technology of leading data security companies to provide centralized management and comprehensive protection for all your inbound and outbound email. The powerful architecture of Progent's Email Guard managed service integrates a Cloud Protection Layer with an on-premises security gateway device to offer complete protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne threats. Email Guard's cloud filter serves as a first line of defense and keeps the vast majority of unwanted email from making it to your network firewall. This decreases your exposure to inbound attacks and conserves network bandwidth and storage. Email Guard's onsite security gateway device provides a deeper layer of analysis for inbound email. For outbound email, the local gateway provides AV and anti-spam filtering, DLP, and email encryption. The onsite gateway can also help Exchange Server to track and protect internal email that stays within your security perimeter. For more details, visit Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small organization can have its critical servers and applications hosted in a protected fault tolerant data center on a high-performance virtual host set up and maintained by Progent's IT support professionals. Under the ProSight Virtual Hosting model, the customer owns the data, the OS software, and the apps. Because the environment is virtualized, it can be ported immediately to a different hardware environment without a time-consuming and difficult reinstallation process. With ProSight Virtual Hosting, your business is not tied a single hosting service. Find out more about ProSight Virtual Hosting services.

ProSight IT Asset Management: Network Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to capture, maintain, find and protect data related to your network infrastructure, processes, applications, and services. You can instantly locate passwords or IP addresses and be warned automatically about impending expirations of SSL certificates or domains. By cleaning up and organizing your IT infrastructure documentation, you can save up to half of time thrown away looking for vital information about your network. ProSight IT Asset Management features a common location for storing and collaborating on all documents related to managing your business network like standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also offers advanced automation for gathering and relating IT information. Whether you’re planning improvements, performing maintenance, or responding to a crisis, ProSight IT Asset Management delivers the knowledge you need when you need it. Learn more about Progent's ProSight IT Asset Management service.

Specialized Security Expertise Available from Progent
Progent's security engineers offer world-class consulting support in vital areas of IT protection such as:

Information Risk Audits and Compliance Assessment
Progent offers expertise with security evaluation tools such as Microsoft Baseline Security Analyzer and LANguard for performing a set of automatic network scans to reveal possible security problems. Progent has broad experience with testing tools and can assist your company to understand audit results and respond efficiently. Progent's security consultants also offer web software testing and can perform expert assessments of corporate-wide security to assess your company's compliance with key worldwide security standards including HIPAA, NIST, and ISO. In addition, Progent can evaluate the effectiveness of your wireless security including stationary wireless equipment as well as portable devices. Find out additional information concerning Progent's Information Risk Audits and Compliance Assessment.

Cisco Network Security, PIX Firewall and ASA Firewall, Virtual Private Network, Aironet and Meraki Wireless Consulting
Progent's Cisco Certified Internetwork Experts (CCIEs) and Cisco Certified Network Professionals (CCNPs) can provide world-class technical expertise for Cisco's entire family of security and Virtual Private Network (VPN) solutions such as PIX Series Firewalls and ASA Series Firewalls, the Catalyst Firewall Services Module (FWSM), secure broadband and integrated services (IS) routers, wireless access points, Cisco Meraki cloud-managed Wi-Fi access points, and Catalyst Series switches. Find out more details about Cisco Protection, VPN and Aironet Wireless Support.

Other Firewall and VPN Technologies
As well as being expert in a broad array of network security technologies available from Microsoft and Cisco, Progent can provide businesses of any size advanced engineering services for technologies from other popular firewall and VPN vendors. Progent's engineers offer:

Stealth Intrusion Checking Services
Stealth intrusion testing is a valuable method for helping companies to find out how exposed their IT environments are to real-world threats by showing how thoroughly corporate security procedures and mechanisms hold up against authorized but unannounced intrusion attempts launched by veteran security specialists using the latest intrusion techniques. Read more details concerning Progent's Penetration Testing Services.

CISM Security Consulting Services
CISM Experts for Portland, OregonCertified Information Security Manager (CISM) identifies the basic competencies and international benchmarks of performance that information security managers are expected to master. It offers executive management the confidence that consultants who have been awarded their CISM possess the background and skill to provide effective security management and consulting services. Progent can provide a CISM-certified expert to help your enterprise in critical security areas such as data protection governance, vulnerability management, data protection process control, and incident response support.

Read the details about Progent's Certified Information Security Manager Security Consulting Assistance.

Certified Information Systems Security Professionals (CISSP) Security Consulting Expertise
CISSP Certified System Security Consultants for Portland, OregonProgent's Certified Information Systems Security Professionals (CISSPs) are security specialists who have earned CISSP status as a result of demonstrated experience, rigorous study, and formal testing. CISSP Certification indicates expertise in an international standard for information security. ANSI has granted the CISSP status accreditation in the area of information security under ISO/IEC 17024. Fields of expertise included under CISSP include security administration practices, security architecture and models, connection control systems, applications development security, operations security, physical security, encryption, communications, Internet security, and disaster recovery planning.

Get the details concerning Progent's CISSP Support Expertise.

ISSAP-Qualified Engineers for Secure Network Architecture
ISSAP ISSAP Security Engineers for Portland, OregonProgent's ISSAP certified security experts are consultants who have been awarded ISSAP certification after thorough examination and significant hands-on work with information security architecture. ISSAP security experts possess comprehensive understanding of access management systems and methodologies, telecommunications and network protection, cryptography, requirements analysis, BCP and DRP, and physical security. Progent's ISSAP-qualified security specialists can help your company with all phases of architecture security.

Get additional information about Progent's ISSAP Accredited Secure Network Architecture Consulting Services.

CISA Professional Services
Certified Information Systems Auditor Experts for Portland, OregonThe CISA accreditation is a prestigious achievement that indicates expertise in information system security audit and control. Certified by ANSI, the CISA accreditation requires that candidates pass a comprehensive test overseen by the ISACA international professional association. Progent offers the services of a CISA-qualified security audit professional able to assist companies in the areas of IS audit process, information technology administration, systems and architecture lifecycle, information technology support, safeguarding information resources, and disaster recovery preparedness.

Find out additional information about Progent's Certified Information Systems Auditor (CISA) Consulting Services.

CRISC Network Risk Management Experts
CRISC IT Risk Consultants for Portland, OregonThe CRISC program was established by ISACA in 2010 to validate a consultant's skills to plan, implement, and support information system control mechanisms to mitigate risk. Progent offers the expertise of a CRISC-certified consultant to assist your company to create and execute a workplace continuity plan that follows industry best practices promoted by CRISC and geared to align with your company's risk appetite, business objectives, and budgetary guidelines. Progent's risk mitigation services are complementary to the support available from Progent's CISA-qualified security engineers for objectively evaluating your IS management design and also with the services of Progent's CISM-certified experts for designing security policies and procedures.

Learn more information concerning Progent's CRISC Network Risk Mitigation Services.

GIAC (Global Information Assurance Certification) Professional Services
Security Experts with GIAC Certification for Portland, OregonGlobal Information Assurance Certification was established in 1999 to validate the skill of IT security engineers. GIAC's mission is to ensure that an accredited security consultant has the skills appropriate to provide support in key areas of system, information, and application program security. GIAC certifications are recognized by companies and government organizations all over the world including and the U.S. National Security Agency (NSA). Progent offers the assistance of GIAC certified professionals for all of the security capabilities covered under GIAC certification topics such as auditing networks, incident handling, traffic analysis, web-based services security, and SIEM solutions.

Find out more details about Progent's GIAC Information Assurance Support.

Get in Touch with Progent for Network Security Consulting Services
If your company is located in Portland or elsewhere in Oregon and you're looking for computer security expertise, phone Progent at 800-993-9400 or go to Contact Progent.














© 2002- 2018 Progent Corporation. All rights reserved.