Business information networks in Oregon now have fast and economical remote access to Progent's qualified network security professionals to fix complex security problems. Rates are affordable, billing is per minute, engagement is immediate, and service is unbeatable. Progent also offers assistance for long-term engagements that requires the services of seasoned security engineers with top security credentials.

If your Oregon business is based far from larger metropolitan neighborhoods including Portland, Salem, Eugene, Gresham, or Beaverton, access to nearby accredited network security consultants may be limited when you have an emergency. This can result in lost income for your business, angry clients, idle workers, and defocused management. By contacting Progent, you can get in touch with a certified security professional ready to deliver help when you require it to keep your computer network running and restore your data.

Progent can help you in a variety of ways in your efforts to defend your IT environment with services that can range from network security checks to creating a comprehensive security plan. Progent provides economical service to assist businesses of all sizes to configure and manage protected networks based on Microsoft Windows and Cisco products and that may include servers and desktops based on UNIX or Linux operating systems plus BYOD clients with Apple iOS iPhones and iPads or Android or Windows Phone smart phones and tablets.

Progent can also help you outsource spam blocking and protection from email-borne security threats. Email Guard is Progent's email security solution that uses the technology of leading information security companies to deliver centralized control and comprehensive protection for all your inbound and outbound email. The hybrid architecture of Email Guard integrates cloud-based filtering with an on-premises security gateway appliance to offer advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-borne threats. The cloud filter serves as a preliminary barricade and blocks the vast majority of threats from reaching your network firewall. This decreases your vulnerability to inbound attacks and saves network bandwidth and storage. ProSight Email Guard's onsite gateway appliance provides a deeper layer of inspection for inbound email. For outgoing email, the onsite security gateway offers anti-virus and anti-spam filtering, DLP, and email encryption. The onsite security gateway can also help Microsoft Exchange Server to monitor and safeguard internal email traffic that originates and ends within your corporate firewall.

Progent's security engineers are available remotely or on site to provide a variety of urgent or project-based IT security services such as:

  • Run extensive security evaluations
  • Recuperate promptly after virus and worm attacks
  • Configure and troubleshoot firewalls
  • Implement secure methods for remote and mobile access
  • Deploy effective applications for defense against viruses, spam and directory harvest attacks
  • Develop a comprehensive security strategy with 24x7 security monitoring
  • Provide comprehensive Call Center Services
  • Help Develop an effective data backup and business continuity plan centered on Data Protection Manager backup/restore capability
If your company has an emergency requirement for computer security support, go to Progent's Emergency Remote Technical Help.

Progent's engineers offer world-class services in vital facets of network protection that include security evaluation, firewall and VPN expertise, and advanced security planning.

Security Audits
Progent's certified security consultants can assess the strength of your current network protection systems by performing comprehensive remote automated analysis based on advanced software tools and tested procedures. Progent's skill in this service saves you money and assures an accurate picture of gaps. The knowledge your IT organization gains can be used as the foundation of a network protection strategy that can permit your information system to operate safely and react quickly to new threats.

Automated Network Vulnerability Assessment
Progent offers consulting in the use of security auditing utilities such as Microsoft Baseline Security Analyzer and LANguard from GFI for affordably performing a set of automatic system auditing scans to identify possible security problems. Progent has extensive experience with other network analysis tools including NMAP Port Scanner, AMAP Application Scanner, eEye Vulnerability Scanner, as well as utilities like Metasploit Framework, Hydra, and Nikto. Progent can show you how to make sense of audit reports and react effectively.

Progent can help you build protection into your company operations, configure scanning software, define and implement a protected network architecture, and recommend procedures to optimize the safety of your network. Progent's security engineers are able to show you how to set up a firewall, implement secure remote access to email and data, and install virtual private network. Learn more concerning Progent's network security evaluation.

Security Inventory Packages for Small Companies
Progent has put together two low-cost security inventory bundles designed to enable small companies to get an independent network security evaluation from a certified security specialist. With Progent's External Network Security Inventory Checkup, an engineer runs a comprehensive examination of your network from outside your firewalled perimeter to uncover potential weaknesses in the security posture you present to the outside world. With Progent's Internal Security Inventory Checkup, a security expert runs a system scan from an authorized computer within your firewall to assess the risk to internal assaults. Both security inventory packages are set up and executed from a secured remote location. The process is directed by an engineer who has earned top security accreditations and who produces a report that details and analyzes the data collected by the scan and suggests practical improvements where called for.

Stealth Intrusion Testing Support Services
Stealth intrusion testing is an important component of any successful IT system security plan. Progent’s security experts can run thorough penetration checks without the knowledge of your organization's in-house IT resources. Stealth penetration testing shows whether current security monitoring tools such as intrusion detection alerts and event history analysis are properly set up and actively monitored. Learn additional information concerning Progent's stealth penetration testing support services.

Firewall and Virtual Private Network Expertise
Progent's background in network security solutions encompasses in-depth familiarity with leading firewalls and Virtual Private Network products from multiple vendors such as Cisco, Microsoft, and Juniper. Progent can provide the support of engineers with important networking certifications such as Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Configuration and Troubleshooting
The new Cisco ASA 5500-X Series of firewalls with Firepower Services offer significantly more bang for the buck than Cisco's legacy firewalls and have superseded the ASA 5500 and PIX security appliances for new deployments. Since Cisco's purchase of Sourcefire, the entire line of Cisco ASA 5500-X firewalls can be configured to enable Firepower Services, based on Sourcefire's Snort product, which is the market's most deployed intrusion protection system (IPS). Firepower services provide enhanced features such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-qualified CCIE network experts can help your company to manage your current PIX or ASA 5500 security appliances and migrate efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises help with ASA 5500-X firewalls with Firepower Services and can help you to plan, deploy, tune, administer and troubleshoot firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. Learn more information about Cisco ASA 5500-X Firewalls with Firepower Services configuration and debugging services.

Cisco Security and Virtual Private Network Consulting Expertise
Cisco's network security and remote access technology represent a full range of manageable security solutions to help protect your local and remote network infrastructure. Cisco's VPN product family includes routers, firewalls, intrusion detection systems and VPN concentrators. Progent's professional staff of consultants includes experienced engineers with Cisco Certified Internetwork Expert and Cisco Certified Network Professional certifications who can help your company to select Cisco VPN, Cisco RADIUS Security, and additional Cisco security solutions that align most closely with your company goals. Read additional information concerning Progent's Consulting Expertise for Cisco Security Technology and VPN Products.

Consulting Expertise for Other Firewall and VPN Technology
Progent provides small and medium size businesses expert support for Intrusion Protection products and IPsec VPN products from major firewall and VPN security companies including Check Point Software, Juniper Networks, and Symantec. Progent can help you create a detailed security strategy and choose the right products from a variety of suppliers to achieve your security objectives while sticking within your spending limits.

Progent's Low-Cost Managed Services for Information Assurance
Progent's value-priced ProSight series of network monitoring and management services is intended to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all facets of information assurance. Managed services offered by Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring is an endpoint protection service that incorporates next generation behavior machine learning tools to defend endpoint devices as well as physical and virtual servers against new malware attacks like ransomware and file-less exploits, which easily get by legacy signature-based anti-virus products. ProSight ASM protects local and cloud-based resources and provides a single platform to manage the entire threat lifecycle including filtering, infiltration detection, mitigation, cleanup, and forensics. Top capabilities include single-click rollback with Windows VSS and real-time system-wide immunization against newly discovered threats. Learn more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware recovery.

ProSight Enhanced Security Protection (ESP): Unified Endpoint Protection
Progent's ProSight Enhanced Security Protection managed services offer ultra-affordable in-depth protection for physical and virtual servers, workstations, mobile devices, and Exchange Server. ProSight ESP uses contextual security and modern behavior analysis for round-the-clock monitoring and reacting to cyber threats from all attack vectors. ProSight ESP offers two-way firewall protection, penetration alarms, device control, and web filtering through cutting-edge tools incorporated within a single agent accessible from a unified console. Progent's security and virtualization consultants can help you to design and configure a ProSight ESP environment that meets your organization's specific requirements and that helps you prove compliance with government and industry information security standards. Progent will help you specify and configure policies that ProSight ESP will manage, and Progent will monitor your IT environment and react to alerts that require immediate attention. Progent's consultants can also assist your company to install and test a backup and restore solution such as ProSight Data Protection Services so you can get back in business rapidly from a destructive cyber attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint security and Microsoft Exchange email filtering.

ProSight Data Protection Services: Managed Backup
ProSight Data Protection Services from Progent provide small and mid-sized businesses an affordable and fully managed service for secure backup/disaster recovery (BDR). For a fixed monthly price, ProSight Data Protection Services automates your backup processes and allows fast restoration of critical files, applications and VMs that have become unavailable or damaged due to hardware failures, software glitches, disasters, human mistakes, or malicious attacks such as ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, apps, system images, as well as Hyper-V and VMware virtual machine images. Important data can be backed up on the cloud, to an on-promises storage device, or to both. Progent's BDR consultants can deliver advanced expertise to configure ProSight DPS to be compliant with regulatory standards such as HIPPA, FIRPA, PCI and Safe Harbor and, whenever needed, can help you to restore your critical data. Read more about ProSight DPS Managed Backup.

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering and email encryption service that incorporates the infrastructure of top data security companies to deliver web-based management and comprehensive security for your email traffic. The hybrid architecture of Email Guard managed service integrates cloud-based filtering with an on-premises gateway appliance to offer advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. The cloud filter acts as a preliminary barricade and blocks most threats from reaching your network firewall. This decreases your vulnerability to external attacks and saves network bandwidth and storage. Email Guard's onsite gateway device adds a deeper layer of analysis for incoming email. For outgoing email, the local security gateway offers AV and anti-spam protection, protection against data leaks, and email encryption. The onsite gateway can also help Microsoft Exchange Server to monitor and protect internal email that originates and ends within your security perimeter. For more information, see Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small organization can have its key servers and apps hosted in a secure fault tolerant data center on a fast virtual machine host configured and maintained by Progent's network support experts. Under Progent's ProSight Virtual Hosting model, the customer retains ownership of the data, the OS platforms, and the applications. Because the environment is virtualized, it can be ported immediately to an alternate hardware solution without requiring a time-consuming and difficult configuration procedure. With ProSight Virtual Hosting, you are not tied one hosting provider. Learn more details about ProSight Virtual Hosting services.

ProSight IT Asset Management: Infrastructure Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to create, update, find and safeguard information related to your network infrastructure, processes, business apps, and services. You can instantly locate passwords or serial numbers and be warned automatically about impending expirations of SSL certificates ,domains or warranties. By cleaning up and managing your network documentation, you can save as much as 50% of time spent searching for vital information about your IT network. ProSight IT Asset Management features a centralized location for storing and collaborating on all documents related to managing your business network like standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also supports a high level of automation for gathering and relating IT data. Whether you’re making improvements, performing regular maintenance, or responding to a crisis, ProSight IT Asset Management delivers the information you need the instant you need it. Learn more details about ProSight IT Asset Management service.

Expert Security Consulting
Any business ought to develop a thoroughly considered security program that includes both pre-attack processes and reaction plans. The proactive plan is a set of steps designed to reduce security weaknesses. The reactive strategy helps your company's IT security personnel to evaluate the damage caused by a security penetration, repair the system, record the event, and get the IT network restored as quickly as feasible.

Progent's certified IS security consultants are available to assist your business to perform a complete risk evaluation and define a computer security plan to establish security processes and controls to minimize future assaults and dangers.

CISM Qualified Network Security Consulting Services
The CISM committee defines the core capabilities and international standards of skill that information security professionals are expected to learn. It provides executive management the assurance that consultants who have earned their CISM certification have the experience and capability to deliver effective security administration and support consulting. Progent can provide the expertise of CISM qualified security consultants to assist companies with:

  • Information Security Governance
  • Vulnerability Management
  • IS Security Program Management
  • Network Security Administration
  • Recovery Management
Find out additional details about Progent's CISM Qualified IS Security Consulting Professionals.

CISSP Certified Security Consulting Support
CISSP certification denotes mastery of a global standard for network security. ANSI has awarded certification accreditation in the area of information protection stipulated by ISO/IEC 17024. Progent offers access to of security consultants who have earned CISSP certification. Progent can provide a CISSP-certified expert to help your business in a variety security areas such as:

  • Security Management Procedures
  • Security Infrastructure and Models
  • Access Management Solutions and Processes
  • Applications Development Security
  • Operations Security
  • Physical Security
  • Cryptography Technology
  • Telecom, Network and WAN Security
  • Disaster Recovery Planning
Read more details about Progent's CISSP-certified Network Security Consulting Services.

ISSAP Certified Secure Network Architecture Consulting Assistance
Progent's ISSAP certified IT architecture professionals are consultants who have earned ISSAP Certification as a result of thorough testing and significant work with network security design. The ISSAP certification indicates proven competence in the most in-depth requirements of IS security architecture bounded by the wider scope of IS security expertise needed for CISSP certification. Progent's ISSAP-certified security specialists can assist your company with all phases of secure network architecture including.

  • Access Control Systems and Techniques
  • Phone System and Network Infrastructure Security
  • Cryptography Solutions
  • Needs Evaluation and Security Guidelines
  • Business Continuity Planning and Disaster Recovery Planning (DRP)
  • Site Security
Read additional details about Progent's ISSAP Qualified Secure Network Architecture Support Expertise.

CISA Certified Security Auditing Engineering Expertise
The Certified Information Systems Auditor accreditation is a prestigious qualification that signifies mastery in information system security audit and control. Accredited by ANSI, the CISA accreditation has consultants undergo an extensive examination given by the ISACA international professional group. Progent's CISA-certified IS security audit specialists can assist your business in the areas of:

  • IS Audit Process
  • Information Technology Governance
  • Network Assets and Infrastructure Planned Useful Life
  • Information Technology Service Delivery
  • Protecting Information Resources
  • Business Continuity Preparedness
Learn additional information about Progent's CISA Qualified Information System Security Auditing Consulting Assistance.

Certified in Risk and Information Systems Control (CRISC) Consultants
The CRISC certification program was established by ISACA to verify a consultant's ability to design, implement, and support information system controls to mitigate risk. Progent offers the services of a CRISC-certified consultant to assist your company to create and carry out a business continuity strategy that follows industry best practices promoted by CRISC and crafted to match your organization's risk appetite, business objectives, and budgetary guidelines. Progent's CRISC-certified IT risk management engineers can provide a range of risk assessment services such as:

  • Gather information and study documentation to help identify significant vulnerabilities
  • Inventory statutory, regulatory, and business mandates and company policies related to your network to determine their possible influence on your business objectives
  • Point out possible vulnerabilities for your business processes to assist in evaluating your enterprise risk
  • Create a risk awareness initiative and provide seminars to make sure your organization understand IS risk so they can assist with your risk management process
  • Connect key risk vectors to your associated operational processes to help determine risk ownership
  • Validate risk tolerance with your senior management and major stakeholders to make sure they align
Get the details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Experts.

GIAC Qualified Information System Security Engineering Assistance
GIAC (Global Information Assurance Certification) was founded in 1999 to validate the knowledge of computer security engineers. GIAC's goal is to make sure that an accredited professional possesses the knowledge necessary to provide support in key areas of network, information, and program security. GIAC certifications are acknowledged by companies and institutions around the world including and the United States National Security Agency (NSA). Progent's GIAC information security audit experts can help your company in the areas of:

Learn more information about Progent's GIAC Information Assurance Expertise.

Talk to a Certified Security Specialist
To learn how you can access a certified Progent security consultant for remote or on-premises expertise in Oregon, phone 1-800-993-9400 or go to Remote Network Support.














© 2002- 2018 Progent Corporation. All rights reserved.