For immediate online assistance with network security issues, businesses in Portland, OR, can find world-class support from Progent's security engineers. Progent's remote support consultants are ready to offer effective and economical help with security crises that threaten the productivity of your information system. Progent's security engineers are certified to support systems based on Windows, Linux, Apple, Sun, and popular derivatives of UNIX. Progent's broad array of consulting services addresses firewall expertise, email security, secure system infrastructure, and disaster recovery planning. Progent's support staff has earned the industry's most advanced security certifications including Certified Information Systems Auditor (CISA) and Certified Information Systems Security Professional.

Progent provides remote security support on a by-the-minute model without minimum times and no additional charges for sign-up or after hours service. By charging per minute and by delivering top-level expertise, Progent's pricing model keeps expenses under control and eliminates situations where simple fixes entail big expenses.

Our System Has Been Hacked: What Should We Do?
In case your network is now experiencing a security crisis, go to Progent's Emergency Remote Network Support to find out how to receive immediate assistance.

For businesses who have planned in advance for an attack, the formal post-attack response procedure outlined by Global Information Assurance Certification is Progent's approved method of responding to a major security incident.

Introduction to Progent's Security Expertise
Coordinating computer protection plus preparation for restoring critical data and systems following an attack demands an on-going process involving an array of tools and processes. Progent's certified security engineers can assist your business at any level in your attempt to guard your IT system, from security evaluation to creating a complete security plan. Some technologies covered by Progent's experts include Security Planning and Prevention, Information Recovery and Security Forensics, and Outsourced Protection from E-mail-Borne Attacks.

Designing and Implementing Protected Networks
Any business ought to have a thoroughly considered security plan that incorporates both proactive and responsive steps. The proactive strategy is a set of steps that works to reduce vulnerabilities. The post-attack strategy specifies procedures to assist security staff to inventory the losses resulting from an attack, remediate the damage, record the event, and revive business activity as quickly as feasible. Progent can show you how to incorporate protection into your company processes. Progent can install auditing software, create and build a safe network architecture, and propose processes and policies to enhance the safety of your computing environment. Progent's security experts are available to assist you to configure a firewall, deploy protected online and mobile connectivity to email and information, and install an efficient virtual private network.

If your company is interested in an affordable option for jobbing out your network security management, Progent's Round-the-clock Monitoring Options include non-stop online server tracking and immediate resolution of problems.

Hybrid Cloud Solutions
Progent can assist your company you to plan, implement, administer and troubleshoot enterprise hybrid cloud solutions that incorporate local and cloud-based resources and that are compliant with regulatory data security standards. (Learn about Progent's Office 365 integration with on-premises Exchange, Azure enterprise hybrid cloud integration and Progent's Amazon Web Services (AWS) enterprise hybrid cloud solutions.)

Data Recovery and Security Forensics
Progent provides skill in recovering networks and devices that have been hacked, are quarantined, or have ceased to function because of a security breakdown. Progent can help assess the losses resulting from the breach, restore normal functions, and retrieve data compromised owing to the attack. Progent's certified specialists can also manage a thorough forensic analysis by examining event logs and using other advanced forensics tools. Progent's background with security issues reduces your business disruption and permits Progent to recommend efficient strategies to avoid or mitigate new assaults.

Progent's Fixed-price Managed Services for Information Assurance
Progent's low-cost ProSight series of managed services is designed to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all facets of information assurance. ProSight managed services available from Progent include:

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering and email encryption service that uses the infrastructure of top data security companies to deliver centralized control and comprehensive security for your email traffic. The powerful architecture of Progent's Email Guard managed service integrates cloud-based filtering with an on-premises security gateway device to offer advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-based malware. Email Guard's cloud filter serves as a preliminary barricade and keeps the vast majority of unwanted email from reaching your network firewall. This decreases your exposure to inbound attacks and saves system bandwidth and storage space. Email Guard's onsite security gateway device adds a deeper level of analysis for inbound email. For outgoing email, the onsite gateway provides AV and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The local gateway can also assist Exchange Server to monitor and safeguard internal email that stays inside your corporate firewall. For more information, see ProSight Email Guard spam and content filtering.

ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that utilizes next generation behavior machine learning technology to guard endpoints and physical and virtual servers against new malware attacks like ransomware and file-less exploits, which easily evade legacy signature-based AV products. ProSight Active Security Monitoring safeguards local and cloud-based resources and provides a unified platform to automate the entire threat progression including protection, detection, mitigation, remediation, and post-attack forensics. Key features include one-click rollback using Windows Volume Shadow Copy Service and automatic system-wide immunization against new attacks. Learn more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware recovery.

ProSight Data Protection Services: Managed Cloud Backup
ProSight Data Protection Services from Progent offer small and mid-sized businesses an affordable end-to-end solution for secure backup/disaster recovery (BDR). Available at a low monthly price, ProSight DPS automates your backup activities and enables fast recovery of vital files, applications and VMs that have become unavailable or damaged as a result of hardware breakdowns, software bugs, natural disasters, human mistakes, or malicious attacks such as ransomware. ProSight DPS can help you protect, recover and restore files, folders, apps, system images, as well as Microsoft Hyper-V and VMware images. Critical data can be backed up on the cloud, to a local device, or to both. Progent's cloud backup specialists can provide world-class support to set up ProSight DPS to to comply with government and industry regulatory requirements such as HIPPA, FINRA, and PCI and, when necessary, can help you to restore your critical data. Read more about ProSight Data Protection Services Managed Cloud Backup.

ProSight IT Asset Management: Infrastructure Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, update, retrieve and safeguard information related to your IT infrastructure, procedures, business apps, and services. You can instantly find passwords or IP addresses and be warned about upcoming expirations of SSL certificates or domains. By cleaning up and organizing your IT documentation, you can save up to half of time spent searching for vital information about your IT network. ProSight IT Asset Management includes a common repository for holding and sharing all documents required for managing your business network like standard operating procedures and self-service instructions. ProSight IT Asset Management also supports advanced automation for gathering and relating IT information. Whether you’re planning enhancements, performing regular maintenance, or reacting to an emergency, ProSight IT Asset Management delivers the knowledge you require as soon as you need it. Learn more details about Progent's ProSight IT Asset Management service.

Special Security Expertise Available from Progent
Progent's seasoned consultants offer unique support in vital facets of computer security such as:

Security Vulnerability Audits and Compliance Testing
Progent offers experience with security evaluation utilities such as Microsoft Baseline Security Analyzer and LANguard from GFI for conducting a set of automatic network scans to identify potential security gaps. Progent has extensive experience with scanning tools and can assist your company to understand audit results and react efficiently. Progent's security consultants also offer web application testing and can perform thorough evaluation of corporate-wide security to assess your company's compliance with key worldwide security specifications such as FISMA, NIST, and ISO. In addition, Progent can assess the effectiveness of your wireless protection covering in-place wireless equipment as well as portable handsets. Get additional details concerning Progent's Vulnerability Evaluation and Security Compliance Assessment.

Cisco Security, PIX and ASA Firewall, Virtual Private Network (VPN), Aironet and Meraki Wi-Fi Expertise
Progent's Cisco Certified Internetwork Experts (CCIEs) and Cisco Certified Network Professionals (CCNPs) can deliver in-depth consulting services for Cisco's entire range of security and Virtual Private Network (VPN) products including PIX 500 Firewalls and ASA Series Firewalls, Catalyst Firewall Services Module, secure broadband and integrated services routers, wireless access points, Meraki cloud-managed Wi-Fi access points, and Catalyst family switches. Learn additional details about Cisco Protection, Virtual Private Network (VPN) and Aironet Wireless Expertise.

Other Firewall and VPN Solutions
In addition to supporting a broad array of security technologies from Microsoft and Cisco, Progent can provide businesses of all sizes top-level support for products from other important firewall and Virtual Private Network (VPN) suppliers. Progent's consultants offer:

Stealth Penetration Checking Consulting
Unannounced penetration testing is a valuable method for helping businesses to determine how vulnerable their information systems are to real-world attacks by testing how well network security processes and technologies stand up against authorized but unannounced penetration efforts instigated by veteran security engineers using the latest intrusion methods. Find out more information concerning Progent's Penetration Testing Services.

Certified Information Security Manager Security Support Services
Certified Information Security Manager (CISM) Engineers for Portland, OregonCertified Information Security Manager (CISM) defines the basic competencies and international standards of service that IT security managers are required to achieve. CISM provides executive management the confidence that those who have been awarded their CISM possess the experience and knowledge to offer effective security administration and consulting support. Progent can provide a CISM support professional to assist your enterprise in critical security disciplines such as data protection governance, vulnerability management, data protection process management, and incident handling management.

Learn additional details about Progent's CISM Security Consulting Expertise.

CISSP Security Consulting Services
CISSP Qualified Network Security Experts for Portland, OregonProgent's CISSP consultants are security engineers who have been awarded CISSP status as a result of demonstrated experience, extensive study, and formal testing. CISSP Certification recognizes mastery of an international standard for IT security. American National Standards Institute has granted the CISSP credential accreditation in the area of information security under ISO/IEC 17024. Areas of knowledge included under CISSP include security administration practices, security design and models, access permission methodology, software development security, business processes security, physical security, cryptography, communications, Internet security, and disaster recovery planning.

Learn the details about Progent's Certified Information Systems Security Professionals (CISSP) Consulting Expertise.

ISSAP-Certified Consultants for Secure Network Architecture
ISSAP ISSAP Security Engineers for Portland, OregonProgent's ISSAP certified security experts are consultants who have earned ISSAP status following thorough testing and substantial experience. field experience with information security architecture. ISSAP security experts possess in-depth understanding of access control systems and methodologies, phone system and network infrastructure security, cryptography, needs evaluation, business continuity planning (BCP) and disaster recovery, and physical security integration. Progent's ISSAP-qualified security specialists can assist your company with all aspects of secure network architecture.

Read the details concerning Progent's ISSAP Certified Protected System Infrastructure Engineering Services.

Certified Information Systems Auditor (CISA) Consulting Services
Certified Information Systems Auditor Experts for Portland, OregonThe Certified Information Systems Auditor credential is a globally recognized qualification that represents mastery in IS security auditing. Certified by ANSI, the CISA accreditation has consultants pass an extensive test overseen by the ISACA international professional group. Progent can provide the services of a CISA-certified security audit professional trained to assist companies in the areas of IS audit services, information technology enforcement, network assets and architecture planned useful life, IT service delivery, protecting information resources, and disaster recovery preparedness.

Read more details about Progent's Certified Information Systems Auditor (CISA) Professional Services.

CRISC-certified IT Risk Management Consultants
CRISC-certified IT Risk Experts for Portland, OregonThe CRISC certification program was established by ISACA in 2010 to verify a consultant's ability to plan, implement, and maintain information system control mechanisms to mitigate network risk. Progent offers the services of a CRISC-certified engineer to help your company to develop and execute a workplace continuity plan that follows leading practices identified by CRISC and geared to align with your organization's risk tolerance, business objectives, and budgetary guidelines. Progent's network risk mitigation expertise is complementary to the services provided by Progent's CISA-qualified consultants for impartially auditing your IS management mechanisms and with the expertise of Progent's CISM-certified support professionals for implementing company-wide security policies and procedures.

Find out more information about Progent's CRISC Risk Management Support.

GIAC (Global Information Assurance Certification) Support Services
Security Experts with Global Information Assurance Certification for Portland, OregonGIAC (Global Information Assurance Certification) was established in 1999 to validate the knowledge of computer security engineers. GIAC's mission is to assure that a certified security consultant has the skills appropriate to provide services in important areas of system, information, and program security. GIAC accreditations are acknowledged by businesses and institutions around the world including and the U.S. National Security Agency. Progent can provide the expertise of certified professionals for all of the network security disciplines covered under GIAC accreditation programs such as auditing perimeters, incident response, traffic analysis, web services security, and security information and event management (SIEM) solutions.

Learn additional details concerning Progent's GIAC Information Assurance Services.

Depend on Progent for Network Security Consulting Services
If your business is located in Portland or elsewhere in Oregon and you want computer security help, call Progent at 800-993-9400 or go to Contact Progent.














© 2002- 2018 Progent Corporation. All rights reserved.