Company information networks in the state of Oregon can have quick and affordable remote technical support from Progent's certified network security experts to fix complex security issues. The cost is competitive, billing is per minute, sign-up is fast, and support is unbeatable. Progent also offers help for long-term projects that requires the knowledge of seasoned security consultants with high-level industry credentials.

In case your Oregon office is away from larger metropolitan areas such as Portland, Salem, Eugene, Gresham, or Beaverton, help from local accredited network security engineers is often limited when you have a crisis. This can result in a drop in income for your company, angry clients, idle employees, and defocused executives. By contacting Progent, you can get in touch with a certified security professional who can deliver assistance whenever you have to have it to keep your system operating and recover your information.

Progent can assist you at any level in your efforts to guard your network with services that ranges from network security checks to creating a comprehensive security strategy. Progent offers economical support to assist small and midsize companies to configure and maintain secure IT environments powered by Microsoft Windows and Cisco products and that may include servers and desktops running UNIX, Linux, Solaris, or Apple Mac OS X operating systems as well as mobile clients with Apple handhelds or Google Android or Windows Phone devices.

Progent can also show you how to outsource spam filtering and protection from e-mail-based security threats. Email Guard is Progent's email security platform that incorporates the services and infrastructure of leading data security vendors to deliver web-based management and world-class protection for your email traffic. The hybrid structure of Email Guard managed service integrates cloud-based filtering with a local security gateway appliance to offer advanced defense against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. The Cloud Protection Layer serves as a first line of defense and blocks most unwanted email from reaching your network firewall. This reduces your vulnerability to external threats and saves system bandwidth and storage. ProSight Email Guard's onsite gateway device provides a further level of analysis for incoming email. For outgoing email, the local security gateway offers anti-virus and anti-spam filtering, protection against data leaks, and encryption. The onsite security gateway can also help Exchange Server to track and protect internal email that stays within your security perimeter.

Progent's certified consultants are available remotely or on site to provide a range of urgent or longer-term computer security services such as:

  • Run thorough network security audits
  • Recuperate promptly after virus and worm attacks
  • Configure firewalls from multiple vendors
  • Configure safe techniques for offsite and mobile access
  • Install advanced solutions for protection against viruses, spam and DHAs
  • Help create a company-wide security plan with 24x7 network monitoring
  • Offer outsourced Help Desk Support
  • Create an effective network backup and disaster recovery plan centered on Microsoft Data Protection Manager backup technology
If your company has an immediate need for IT security support, refer to Progent's Emergency Remote Network Support.

Progent's consultants provide advanced services in vital facets of system protection that include auditing, firewall and VPN expertise, and advanced security consulting.

Security Assessment
Progent's expert security engineers can assess the effectiveness of your existing network security systems by performing comprehensive remote automated analysis via advanced software tools and proven procedures. Progent's skill in this service saves you time and money and offers an accurate picture of gaps. The knowledge your business is provided can be used as the foundation of a network protection plan that will allow your network to run safely and react quickly to new threats.

Automated Network Vulnerability Evaluation
Progent provides consulting in the application of security evaluation packages including MBSA and GFI LANguard for affordably running a variety of programmed network auditing checks to uncover possible security holes. Progent has extensive experience with other security analysis products such as NMAP, AMAP Application Scanner, eEye, plus utilities such as Metasploit Framework, Hydra, and Nikto. Progent can show you how to understand testing reports and respond effectively.

Progent can help you design security into your company operations, install scanning tools, plan and deploy a secure network architecture, and recommend procedures to maximize the security of your network. Progent's security consultants are available to show you how to configure a firewall, implement secure remote access to email and business applications, and install virtual private network. Learn additional information concerning Progent's automated security assessment.

Security Inventory and Evaluation Bundles for Small Companies
Progent offers two low-cost security inventory and evaluation packages intended to enable small companies to receive a professional security assessment from a qualified security specialist. With Progent's External Network Security Inventory Scan, a security engineer administers a comprehensive examination of your IT infrastructure from outside your firewalled perimeter to determine possible risks in the security posture you present to the public. With Progent's Internal Security Inventory Checkup, a security expert runs a network scan from a secure machine inside your company firewall to determine the risk to inside assaults. Both security inventory services are configured and run from a protected external site. The process is overseen by an engineer who has earned top security credentials and who produces a report that summarizes and interprets the information captured by the security scan and proposes cost-effective remediation where called for.

Network Security Penetration Analysis Consulting
Stealth intrusion checking is a key part of any serious IT system security strategy. Progentís security experts can perform thorough penetration checks without the awareness of your company's in-house network support resources. Unannounced penetration testing uncovers whether current security monitoring tools such as intrusion detection warnings and event log analysis are correctly configured and actively monitored. Learn more on Progent's network penetration analysis support services.

Firewalls and VPN Solutions
Progent's background in network security technology includes in-depth field work with major firewalls and Virtual Private Network (VPN) technology offered by multiple companies such as Cisco, Microsoft, and CheckPoint. Progent can provide the services of consultants with key industry certifications such as Cisco Certified Internetwork Expert and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Configuration and Troubleshooting
The current ASA 5500-X Family Next-Generation Firewalls with Firepower Services offer significantly more performance than Cisco's previous firewalls and have replaced the ASA 5500 and PIX 500 security appliances for new installations. Since Cisco's purchase of Sourcefire, the whole family of Cisco ASA 5500-X firewalls can be provisioned to support Firepower Services, based on Sourcefire's Snort product, which is the world's most deployed intrusion protection system. Firepower services provide enhanced capabilities including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network experts can assist you to manage your current PIX or ASA 5500 security appliances or upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises support for ASA 5500-X firewalls with Firepower Services and can help your organization to design, deploy, optimize, manage and debug firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. Read additional details about Cisco ASA 5500-X Firewalls with Firepower Services configuration and troubleshooting services.

Cisco Security and VPN Consulting Expertise
Cisco's security and offsite connection technology provide a comprehensive range of easy-to-administer security products to help protect your wired and wireless network infrastructure. Cisco's Virtual Private Network product family features routers, firewalls, intrusion detection systems and Virtual Private Network appliances. Progent's expert staff of consultants includes field-proven specialists with Cisco's CCIE and Cisco Certified Network Professional qualifications who can assist your company to select Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security solutions that align best with your company objectives. Read more information about Progent's Support Services for Cisco Security and Virtual Private Network Products.

Engineering Services for Other Firewall and VPN Technology
Progent provides small and mid-size organizations expert support for Intrusion Protection Systems and IPsec VPN technology from leading firewall and Virtual Private Network security vendors such as Check Point Software, Juniper, and Symantec. Progent can help you design a comprehensive security plan and select appropriate technologies from multiple suppliers to achieve your security goals while sticking within your budget limits.

Progent's Fixed-price Managed Services for Information Security
Progent's low-cost ProSight family of managed services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that utilizes cutting edge behavior machine learning tools to defend endpoints and physical and virtual servers against modern malware assaults like ransomware and email phishing, which easily get by legacy signature-based AV tools. ProSight ASM safeguards on-premises and cloud resources and provides a single platform to manage the complete malware attack progression including protection, identification, containment, cleanup, and forensics. Key features include one-click rollback with Windows Volume Shadow Copy Service and real-time network-wide immunization against new threats. Learn more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware defense.

ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Security
Progent's ProSight Enhanced Security Protection (ESP) services offer ultra-affordable in-depth security for physical servers and virtual machines, workstations, mobile devices, and Exchange Server. ProSight ESP utilizes contextual security and advanced heuristics for round-the-clock monitoring and responding to cyber assaults from all attack vectors. ProSight ESP offers two-way firewall protection, intrusion alerts, device management, and web filtering through cutting-edge technologies incorporated within a single agent accessible from a unified control. Progent's security and virtualization experts can assist you to plan and implement a ProSight ESP deployment that meets your organization's unique needs and that allows you achieve and demonstrate compliance with legal and industry data security standards. Progent will assist you define and configure security policies that ProSight ESP will enforce, and Progent will monitor your network and react to alarms that require immediate attention. Progent's consultants can also help your company to install and test a backup and restore solution like ProSight Data Protection Services (DPS) so you can get back in business rapidly from a potentially disastrous cyber attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint protection and Exchange email filtering.

ProSight DPS: Managed Backup and Recovery
ProSight Data Protection Services from Progent offer small and mid-sized organizations a low cost and fully managed solution for secure backup/disaster recovery (BDR). For a low monthly cost, ProSight Data Protection Services automates your backup activities and allows rapid recovery of critical files, applications and virtual machines that have become unavailable or damaged as a result of hardware failures, software bugs, disasters, human error, or malware attacks like ransomware. ProSight Data Protection Services can help you protect, recover and restore files, folders, apps, system images, as well as Hyper-V and VMware images. Critical data can be protected on the cloud, to an on-promises device, or to both. Progent's BDR consultants can deliver world-class support to set up ProSight DPS to to comply with government and industry regulatory standards such as HIPPA, FIRPA, PCI and Safe Harbor and, whenever necessary, can help you to recover your critical data. Read more about ProSight Data Protection Services Managed Cloud Backup and Recovery.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering service that uses the technology of leading data security vendors to deliver web-based control and world-class protection for your email traffic. The hybrid structure of Email Guard managed service combines cloud-based filtering with an on-premises security gateway appliance to offer advanced protection against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-borne threats. The Cloud Protection Layer serves as a first line of defense and keeps the vast majority of threats from reaching your security perimeter. This reduces your vulnerability to inbound attacks and saves network bandwidth and storage space. Email Guard's on-premises gateway device provides a deeper level of inspection for inbound email. For outbound email, the on-premises gateway provides AV and anti-spam protection, DLP, and email encryption. The local security gateway can also assist Microsoft Exchange Server to track and protect internal email that originates and ends inside your corporate firewall. For more information, visit Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size organization can have its critical servers and apps hosted in a protected Tier III data center on a fast virtual host configured and maintained by Progent's IT support professionals. With the ProSight Virtual Hosting service model, the client retains ownership of the data, the operating system platforms, and the apps. Because the environment is virtualized, it can be ported easily to an alternate hosting environment without requiring a time-consuming and difficult configuration process. With ProSight Virtual Hosting, you are not tied a single hosting provider. Learn more about ProSight Virtual Hosting services.

ProSight IT Asset Management: Infrastructure Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, update, retrieve and protect information related to your IT infrastructure, procedures, business apps, and services. You can instantly find passwords or IP addresses and be alerted about impending expirations of SSLs or domains. By updating and organizing your network documentation, you can eliminate up to half of time thrown away trying to find vital information about your network. ProSight IT Asset Management features a common repository for storing and collaborating on all documents required for managing your network infrastructure such as standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also offers advanced automation for collecting and relating IT data. Whether youíre planning enhancements, performing maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the information you require when you need it. Learn more about ProSight IT Asset Management service.

Expert Security Consulting
Any company ought to develop a thoroughly thought out security program that incorporates both proactive processes and reaction planning. The proactive strategy is a collection of procedures that help to reduce security weaknesses. The post-attack strategy assists your company's IT security engineers to assess the impact caused by a security penetration, repair the damage, record the event, and get business functions restored as quickly as possible.

Progent's expert IS security engineers can to help your company to perform a full risk assessment and define a company-wide security plan to establish security processes and controls to reduce future attacks and threats.

CISM Qualified Network Security Support Assistance
The CISM committee describes the basic capabilities and worldwide standards of performance that IT security managers are required to master. It gives business management the assurance that those who have earned their CISM credential have the experience and capability to provide effective security management and consulting consulting. Progent can provide the services of CISM qualified security consultants to help businesses with:

  • IS Security Processes
  • Vulnerability Analysis
  • Information Security Implementation Management
  • IS Security Administration
  • Response Planning
Find out additional details about Progent's CISM Qualified Security Consulting Services.

CISSP Certified Security Consulting Support
The CISSP credential denotes mastery of an international standard for data security. ANSI has awarded certification accreditation in the field of information security defined by ISO 17024. Progent offers access to of security professionals who have earned CISSP certification. Progent can give you access to a CISSP-certified professional to help your organization in a variety security areas such as:

  • Security Management Practices
  • Security Infrastructure and Paradigms
  • Access Management Solutions and Processes
  • Applications Development Security
  • Operations Security
  • Physical Security
  • Cryptography Technology
  • Telecommunications, Network and WAN Security
  • Business Continuity Preparedness
Learn more information concerning Progent's CISSP-certified Information Security Support Professionals.

ISSAP Qualified Secure Network Architecture Consulting Assistance
Progent's ISSAP qualified information system architecture professionals are experts who have been awarded ISSAP status through thorough examination and significant experience with information security design. The ISSAP certification indicates demonstrated skill in the most challenging requirements of IS security architecture bounded by the wider field of IS security knowledge needed for CISSP certification. Progent's ISSAP-qualified security experts can assist your business with all phases of architecture security including.

  • Access Control Mechanisms and Techniques
  • Phone System and System Infrastructure Protection
  • Cryptography Solutions
  • Requirements Analysis and Security Criteria
  • BCP and Disaster Recovery Planning
  • Physical Security
Read additional information about Progent's ISSAP Certified Secure Information System Architecture Consulting Services.

CISA Accredited Information System Security Auditing Engineering Expertise
The Certified Information Systems Auditor accreditation is a recognized qualification that represents mastery in information system security audit and control. Accredited by ANSI, the CISA accreditation has consultants undergo an extensive examination given by the ISACA professional group. Progent's CISA network security audit engineers are available to help your business with:

  • IS Audit Process
  • IT Administration
  • Systems and Infrastructure Lifecycle Planning
  • Information Technology Service Delivery
  • Safeguarding Data Resources
  • Disaster Recovery Preparedness
Find out more information concerning Progent's CISA Qualified IS Security Auditing Engineering Assistance.

Certified in Risk and Information Systems Control (CRISC) Experts
The Certified in Risk and Information Systems Control (CRISC) program was established by ISACA in 2010 to validate an IT professional's ability to plan, implement, and support IS control mechanisms to mitigate risk. Progent can provide the services of a CRISC-certified consultant to help your company to create and carry out a workplace continuity strategy that follows industry best practices identified by CRISC and crafted to align with your organization's risk tolerance, business objectives, and IT budget. Progent's CRISC network risk management engineers can provide a range of risk evaluation services such as:

  • Gather data and review documentation to help identify major vulnerabilities
  • Identify legal, industry, and contractual mandates and organizational standards associated with your information system to assess their possible influence on your business goals
  • Identify possible threats for your business processes to assist in evaluating your enterprise risk
  • Create a risk awareness initiative and conduct training to make sure your organization appreciate IT risk so they can contribute to your risk control process
  • Match identified risk vectors to related business processes to help assign risk ownership
  • Determine risk tolerance with executive leadership and key stakeholders to ensure they are in agreement
Read more information concerning Progent's CRISC Consultants.

GIAC Accredited Information System Security Engineering Expertise
Global Information Assurance Certification was founded in 1999 to certify the skill of network security engineers. GIAC's goal is to make sure that a certified security consultant possesses the knowledge appropriate to deliver services in important categories of network, information, and software security. GIAC certifications are recognized by companies and institutions all over the world including and the United States National Security Agency. Progent's GIAC-certified information security audit specialists can assist your business in the areas of:

Find out additional details concerning Progent's GIAC Information Assurance Support.

Get in Touch with a Progent Security Specialist
To learn how to contact a Progent security consultant for remote or on-premises help in Oregon, call 1-800-993-9400 or go to Online Computer Support.














© 2002- 2018 Progent Corporation. All rights reserved.