Business computer networks in the state of Oregon can depend on prompt and economical remote technical support from Progent's certified network security support specialists to fix urgent security problems. Rates are reasonable, billing is by the minute, sign-up is immediate, and support is unbeatable. Progent also provides help for long-term projects that demand the expertise of seasoned security engineers with top security certifications.

In case your Oregon small business is based away from more populated urban areas such as Portland, Salem, Eugene, Gresham, or Beaverton, access to local certified security engineers could be problematic during a security disaster. This can result in lost productivity for your company, angry customers, unproductive workers, and defocused executives. By contacting Progent, you have access to a certified security professional who can provide assistance when you need it to keep your computer network on line and recover your data.

Progent can assist you at any level in your efforts to guard your network with support services ranging from security assessments to developing a company-wide security plan. Progent provides economical support to help small and midsize companies to design and manage secure IT environments powered by Windows and Cisco products and that can include computers based on UNIX or Linux platforms plus mobile clients with Apple iPhones and iPads or Google Android or Windows Phone smart phones and tablets.

Progent can also show you how to outsource spam filtering and protection from e-mail-based assaults. Email Guard is Progent's email security solution that incorporates the technology of leading data security companies to deliver web-based control and world-class security for your email traffic. The powerful architecture of Progent's Email Guard integrates a Cloud Protection Layer with an on-premises security gateway appliance to provide complete protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. Email Guard's Cloud Protection Layer acts as a preliminary barricade and blocks the vast majority of threats from making it to your network firewall. This decreases your vulnerability to external attacks and saves network bandwidth and storage. Email Guard's on-premises gateway device provides a deeper layer of analysis for incoming email. For outbound email, the onsite gateway provides anti-virus and anti-spam protection, DLP, and encryption. The local security gateway can also help Exchange Server to track and protect internal email that originates and ends inside your security perimeter.

Progent's security experts are accessible remotely or on site to provide a variety of emergency or project-based IT security services including:

  • Perform thorough network security evaluations
  • Recuperate promptly after attacks
  • Install firewalls from multiple vendors
  • Configure secure methods for remote and mobile connectivity
  • Deploy advanced utilities for automatic protection against spam and directory harvest attacks
  • Help create a comprehensive security plan with 24x7 monitoring
  • Offer comprehensive Call Center Support
  • Help Create an effective backup and restore plan centered on Microsoft DPM backup/restore capability
If your company has an urgent need for IT security support, go to Progent's Urgent Online Network Support.

Progent's security experts offer world-class support in vital fields of system protection including auditing, firewalls and VPN, and advanced security consulting.

Security Evaluation
Progent's certified security consultants can assess the effectiveness of your existing network protection systems through exhaustive remote automated testing based on advanced software tools and proven procedures. Progent's skill in this service saves you consulting fees and offers a detailed picture of system vulnerability. The knowledge your company gains can make up the foundation of a security strategy that will permit your information system to run dependably and react rapidly to new threats.

Automated Security Audits
Progent provides consulting in the use of security auditing utilities including MBSA and LANguard from GFI for affordably running a set of automatic network testing scans to uncover possible security holes. Progent has extensive experience with additional security auditing utilities including NMAP Port Scanner, AMAP Application Scanner, eEye, as well as tools such as Metasploit, Netcat, and Nikto. Progent can show you how to understand testing reports and react effectively.

Progent can help you build protection into your company operations, install scanning applications, define and deploy a secure system architecture, and suggest procedures to optimize the security of your network. Progent's security consultants are available to assist you to set up a firewall, implement safe remote connectivity to email and business applications, and integrate virtual private network. Find out additional information about Progent's automated security analysis.

Security Inventory Scanning Bundles for Small Companies
Progent offers two ultra-affordable security inventory scanning bundles intended to enable small companies to get an objective network security evaluation from an accredited security engineer. With Progent's External Security Inventory Scan, a security expert runs a comprehensive test of your network from beyond your firewall to uncover possible weaknesses in the security posture you present to the outside world. With Progent's Internal Security Inventory Scan, a certified security professional executes a network scan from a secure computer within your company firewall to assess your exposure to internal threats. Both security inventory services are configured and executed from a secured external site. The project is directed by a consultant with top security accreditations and who produces a document that details and analyzes the information captured by the security scan and suggests practical improvements if appropriate.

Stealth Penetration Analysis Consulting
Stealth penetration testing is a key part of any successful network security plan. Progentís security experts can perform thorough intrusion checks without the knowledge of your organization's internal network support resources. Unannounced penetration testing uncovers whether current security defense systems such as intrusion detection warnings and event history analysis are correctly configured and consistently monitored. Learn more on Progent's network security penetration analysis consulting.

Firewall/VPN Support
Progent's expertise in network security solutions encompasses in-depth familiarity with major firewalls and VPN technology offered by multiple companies including Cisco, Microsoft, and Symantec. Progent can provide the support of engineers with key industry certifications such as Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Security Appliances Configuration and Troubleshooting
The new Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services deliver significantly more performance than Cisco's previous PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 firewalls for new deployments. After Cisco's acquisition of Sourcefire, the entire line of ASA 5500-X firewalls can be provisioned to support Firepower Services, based on Sourcefire's Snort product, which is the market's most deployed intrusion protection system (IPS). Firepower services provide powerful new features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-qualified CCIE network experts can help you to manage your legacy PIX or ASA 5500 security appliances and upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite support for ASA 5500-X firewalls with Firepower Services and can help your organization to design, configure, optimize, administer and troubleshoot firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services. See more details about Cisco ASA 5500-X Firewalls with Firepower integration and debugging services.

Cisco Network Security and VPN Support Services
Cisco's security and remote access products offer a full range of easy-to-administer security solutions to help safeguard your local and remote network infrastructure. Cisco's Virtual Private Network line features routers, firewalls, intrusion detection systems and Virtual Private Network concentrators. Progent's professional consulting staff includes field-proven specialists with Cisco's CCIE and Cisco Certified Network Professional qualifications who are able to help your business to select Cisco VPN, Cisco RADIUS Security, and other Cisco security solutions that fit best with your company goals. Read additional information about Progent's Engineering Expertise for Cisco Security and Virtual Private Network Appliances.

Support Expertise for Additional Firewall and Virtual Private Network Solutions
Progent provides small and medium size organizations expert support for Intrusion Protection Systems and IPsec VPN products from leading firewall and VPN security companies such as Check Point Software, Juniper Networks, and Symantec. Progent can show you how to create a comprehensive security plan and choose appropriate technologies from a variety of suppliers to support your security goals while sticking within your spending limits.

Certified Security Planning
Any company should have a thoroughly thought out security program that includes both pre-attack procedures and reaction planning. The pre-attack strategy is a set of mechanisms designed to reduce vulnerabilities. The post-attack plan helps your security personnel to assess the impact resulting from an attack, repair the network, document the experience, and get business functions restored as rapidly as feasible.

Progent's certified IT security consultants are available to help you to perform a comprehensive risk assessment and create a network security strategy to establish security policies and controls to mitigate ongoing attacks and dangers.

CISM Certified Security Support Expertise
The Certified Information Security Manager (CISM) organization defines the core capabilities and global standards of skill that information security managers are expected to learn. It gives executive management the assurance that consultants who have earned their CISM certification have the background and capability to deliver efficient security administration and support services. Progent can provide the support of CISM certified security consultants to help companies with:

  • Network Security Strategies
  • Vulnerability Management
  • IS Security Implementation Management
  • Information Security Administration
  • Recovery Planning
Read more details concerning Progent's CISM Qualified Information Security Support Services.

CISSP Qualified Security Engineering Support
CISSP recognizes mastery of an international standard for network security. ANSI (American National Standards Institute) has awarded certification recognition in the field of data protection stipulated by ISO/IEC 17024. Progent can provide the services of security experts who have earned CISSP certification. Progent can give you access to a CISSP-certified expert to help your organization in a variety security areas including:

  • Security Administration Practices
  • Security Infrastructure and Models
  • Access Management Solutions and Methodology
  • Software Development Security
  • Secure Operations
  • Physical Security
  • Data Encryption Mechanisms
  • Telecom, LAN and WAN Security
  • Disaster Recovery Preparedness
Find out additional information concerning Progent's CISSP-certified Information Security Engineering Services.

ISSAP Certified Secure Information System Architecture Consulting Support
Progent's ISSAP certified IT architecture engineers are consultants who have been awarded ISSAP status as a result of thorough examination and significant experience with information security architecture. The ISSAP credential represents proven mastery in the most challenging demands of IS security architecture bounded by the wider field of information security expertise required for CISSP accreditation. Progent's ISSAP-qualified security experts can help your business with all phases of secure network architecture such as.

  • Access Management Mechanisms and Methodologies
  • Phone System and Network Infrastructure Security
  • Cryptography Options
  • Needs Analysis and Security Criteria
  • Business Continuity Planning and Disaster Recovery Planning
  • Hardware Security
Read additional details about Progent's ISSAP Accredited Secure IT Architecture Consulting Professionals.

CISA Certified Network Security Auditing Consulting Expertise
The CISA credential is an important achievement that signifies expertise in IS security auditing. Certified by ANSI, the CISA accreditation requires that consultants undergo a comprehensive examination given by the ISACA international professional association. Progent's CISA-certified information security audit experts are available to assist your business with:

  • IS Audit Services
  • IT Administration
  • Network Assets and Infrastructure Planned Useful Life
  • IT Service Delivery
  • Protecting Data Assets
  • Business Continuity Planning
Find out more details concerning Progent's CISA Accredited Security Auditing Consulting Assistance.

CRISC Consultants
The Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA to validate an IT professional's skills to plan, implement, and maintain information system control mechanisms to mitigate risk. Progent offers the expertise of a CRISC-certified engineer to help your company to develop and carry out a workplace continuity or disaster recovery strategy that follows leading practices promoted by CRISC and geared to match your organization's risk tolerance, business goals, and budgetary guidelines. Progent's CRISC network risk management experts can provide a range of risk assessment services such as:

  • Collect data and study documentation to identify major risk scenarios
  • Inventory legal, industry, and contractual requirements and organizational standards associated with your network to determine their possible influence on your business objectives
  • Point out possible threats for your operational workflows to help in analyzing your enterprise risk
  • Create a risk awareness program and provide seminars to ensure your stakeholders understand information system risk so they can assist with your risk management program
  • Connect key risk vectors to related operational processes to help assign risk responsibility
  • Determine risk appetite with executive leadership and major stakeholders to ensure they align
Learn the details about Progent's CRISC Experts.

GIAC Accredited Information System Security Consulting Expertise
GIAC (Global Information Assurance Certification) was established in 1999 to certify the knowledge of computer security professionals. GIAC's mission is to ensure that a certified security consultant possesses the skills necessary to deliver support in key areas of system, data, and application security. GIAC accreditations are acknowledged by companies and institutions all over the world including and the United States National Security Agency. Progent's GIAC-certified information security audit engineers can help your business in the areas of:

Read more details about Progent's GIAC Information Assurance Expertise.

Get in Touch with a Progent Security Specialist
To learn how you can access a Progent security engineer for online or onsite help in Oregon, phone 1-800-993-9400 or visit Online Computer Support.

© 2002- 2017 Progent Corporation. All rights reserved.