Small business networks in Oregon can depend on quick and affordable online access to Progent's accredited security experts to fix urgent security issues. Rates are competitive, charges are per minute, engagement is immediate, and service is world class. Progent also provides help for complex engagements that requires the knowledge of senior security engineers with top security credentials.

In case your Oregon network is based far from more populated urban neighborhoods such as Portland, Salem, Eugene, Gresham, or Beaverton, help from nearby accredited network security consultants could be limited during an urgent situation. This can result in a drop in revenue for your business, angry customers, unproductive workers, and defocused executives. By contacting Progent's remote support, you have access to a certified security professional ready to offer help when you need it to get your information system running and recover your information.

Progent can assist you in your initiatives to defend your network with support services that can range from network security assessments to creating a company-wide security strategy. Progent offers economical service to help companies of any size to set up and manage secure IT environments based on Windows and Cisco products and that may include servers and desktops based on UNIX, Linux, Sun Solaris, or Mac OS X platforms plus BYOD users with Apple iPhones and iPads or Android or Windows Phone handsets.

Progent can also show you how to outsource spam filtering and defense against e-mail-based assaults. Email Guard is Progent's email filtering and encryption platform that uses the services and infrastructure of leading information security companies to deliver web-based management and world-class security for all your email traffic. The hybrid structure of Email Guard combines a Cloud Protection Layer with a local gateway appliance to offer complete defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne malware. ProSight Email Guard's Cloud Protection Layer acts as a first line of defense and keeps most unwanted email from making it to your security perimeter. This reduces your exposure to external threats and conserves system bandwidth and storage. ProSight Email Guard's onsite security gateway device provides a further layer of analysis for incoming email. For outgoing email, the local security gateway offers anti-virus and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The on-premises security gateway can also help Microsoft Exchange Server to track and safeguard internal email that stays within your corporate firewall.

Progent's security professionals are available remotely or in person to provide a variety of urgent or longer-term computer security services including:

  • Perform automated security evaluations
  • Recover quickly after serious security breaches
  • Set up effective firewalls
  • Configure secure methods for remote and mobile connectivity
  • Deploy advanced applications for automatic protection against viruses, spam and directory harvest attacks
  • Develop a company-wide security strategy with proactive security monitoring
  • Offer outsourced Call Center Support
  • Create a practical network backup and business continuity strategy centered on Data Protection Manager automated backup technology
If your company has an emergency requirement for IT security help, refer to Progent's Urgent Online Network Help.

Progent's consultants provide world-class support in vital fields of computer security that include security assessment, firewall/VPN support, and advanced security planning.

System Assessment
Progent's certified security consultants can evaluate the effectiveness of your current computer security systems by performing comprehensive remote automated analysis via sophisticated utilities and tested techniques. Progent's experience in this testing saves you consulting fees and offers an objective portrayal of security holes. The information your business is provided can be used as the basis of a security strategy that can permit your network to run dependably and react rapidly to future threats.

Automated Network Vulnerability Analysis
Progent provides expertise in the use of security auditing products including MBSA and GFI LANguard Network Security Scanner for affordably performing a variety of programmed network auditing checks to identify potential security gaps. Progent has broad knowledge of other security analysis utilities such as NMAP, AMAP, eEye Vulnerability Scanner, as well as tools like Metasploit Framework, Netcat, and Nikto. Progent can help you to understand testing reports and react effectively.

Progent can help you design protection into your company operations, install scanning tools, plan and deploy a protected network architecture, and suggest policies to optimize the safety of your IT system. Progent's security professionals are able to help you set up a firewall, implement secure remote connectivity to email and data, and integrate VPN. Find out more concerning Progent's network security assessment.

Security Inventory Service Bundles for Small Companies
Progent has put together two low-cost security inventory service packages intended to enable small businesses to get an independent security assessment from a qualified security consultant. With Progent's External Security Inventory Checkup, a security engineer administers an extensive test of your IT infrastructure from outside your firewalled perimeter to uncover possible risks in the security profile you expose to the outside world. With Progent's Internal Network Security Inventory Checkup, a security engineer runs a system scan from a secure machine within your company firewall to determine vulnerabilities to inside assaults. Both security inventory services are set up and run from a protected remote site. The process is directed by a consultant who has earned high-level security accreditations and who produces a document that details and interprets the data collected by the security scan and proposes cost-effective remediation if appropriate.

Stealth Security Penetration Testing Consulting
Stealth intrusion checking is a key component of any successful IT system security plan. Progent’s security experts can run thorough intrusion checks without the awareness of your company's in-house network support resources. Unannounced penetration testing uncovers whether current security defense systems such as intrusion detection alerts and event history analysis are correctly configured and consistently checked. Learn more on Progent's network penetration testing support services.

Firewall and Virtual Private Network Support
Progent's expertise in network security technology encompasses extensive familiarity with major firewalls and VPN products from a variety of vendors such as Cisco, Microsoft, and Juniper. Progent offers the services of consultants who have earned key networking certifications such as Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Integration and Debugging
The current ASA 5500-X Family of firewalls with Firepower Services deliver substantially more value than Cisco's legacy PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX security appliances for all new installations. Since Cisco's acquisition of Sourcefire, the whole line of ASA 5500-X devices can be provisioned to enable Firepower Services, based on Sourcefire's Snort product, which is the world's most deployed network intrusion protection system (IPS). Firepower services provide powerful new capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-qualified CCIE network experts can help your company to maintain your existing PIX or Cisco ASA 5500 firewalls or upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist your organization to plan, integrate, optimize, administer and debug firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. Learn additional information about Cisco ASA 5500-X Firewalls with Firepower Services integration and troubleshooting support.

Cisco Network Security and VPN Consulting Expertise
Cisco's security and remote access products provide a complete range of easy-to-administer security solutions to help safeguard your wired and wireless network infrastructure. Cisco's VPN line features routers, firewalls, intrusion detection systems and VPN appliances. Progent's expert staff of consultants includes field-proven specialists with Cisco CCIE and CCNP certifications who are able to assist your company to evaluate Cisco VPN, Cisco RADIUS Security, and additional Cisco security solutions that fit best with your business goals. Read additional details concerning Progent's Engineering Services for Cisco Security Solutions and VPN Appliances.

Support Services for Additional Firewall and Virtual Private Network Products
Progent offers small and mid-size companies professional consulting for Intrusion Protection Systems and IPsec VPN technology from leading firewall and Virtual Private Network security companies such as Check Point Software, Juniper Networks, and SonicWALL. Progent can help you design a detailed security strategy and select appropriate products from a variety of vendors to support your security goals while sticking within your budget limits.

Progent's Flat-rate Managed Services for Information Security
Progent's affordable ProSight series of network monitoring and management services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance and compliance. Managed services offered by Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that utilizes next generation behavior-based analysis technology to guard endpoint devices as well as servers and VMs against modern malware attacks such as ransomware and file-less exploits, which easily evade traditional signature-based anti-virus products. ProSight Active Security Monitoring safeguards local and cloud-based resources and offers a single platform to automate the complete threat progression including protection, infiltration detection, containment, cleanup, and post-attack forensics. Top features include one-click rollback with Windows VSS and automatic network-wide immunization against new attacks. Find out more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware recovery.

ProSight Enhanced Security Protection (ESP): Unified Endpoint Security
ProSight Enhanced Security Protection services offer affordable multi-layer security for physical servers and virtual machines, workstations, smartphones, and Exchange Server. ProSight ESP utilizes contextual security and advanced heuristics for continuously monitoring and responding to security threats from all vectors. ProSight ESP offers two-way firewall protection, penetration alarms, endpoint control, and web filtering via cutting-edge technologies packaged within one agent accessible from a unified control. Progent's data protection and virtualization consultants can help you to plan and implement a ProSight ESP environment that addresses your organization's specific needs and that helps you prove compliance with government and industry data security regulations. Progent will assist you define and configure security policies that ProSight ESP will enforce, and Progent will monitor your network and react to alarms that require immediate action. Progent's consultants can also help you to install and test a backup and restore system such as ProSight Data Protection Services (DPS) so you can recover quickly from a potentially disastrous cyber attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Exchange filtering.

ProSight Data Protection Services: Managed Cloud Backup
ProSight Data Protection Services from Progent offer small and mid-sized organizations a low cost end-to-end service for reliable backup/disaster recovery. Available at a fixed monthly price, ProSight Data Protection Services automates and monitors your backup activities and enables fast recovery of critical data, apps and virtual machines that have become lost or damaged due to component failures, software bugs, disasters, human mistakes, or malware attacks such as ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, applications, system images, plus Hyper-V and VMware virtual machine images. Important data can be protected on the cloud, to an on-promises storage device, or to both. Progent's cloud backup specialists can provide advanced expertise to set up ProSight DPS to to comply with government and industry regulatory standards like HIPPA, FIRPA, PCI and Safe Harbor and, whenever needed, can assist you to recover your business-critical data. Read more about ProSight DPS Managed Backup and Recovery.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering and email encryption service that incorporates the infrastructure of top information security vendors to provide centralized management and comprehensive protection for your email traffic. The hybrid structure of Email Guard combines cloud-based filtering with a local security gateway appliance to offer advanced protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. The Cloud Protection Layer serves as a first line of defense and keeps most unwanted email from reaching your network firewall. This reduces your exposure to external threats and saves system bandwidth and storage space. Email Guard's onsite gateway appliance provides a deeper layer of analysis for incoming email. For outbound email, the local security gateway provides anti-virus and anti-spam filtering, DLP, and email encryption. The onsite security gateway can also help Microsoft Exchange Server to track and protect internal email traffic that stays inside your security perimeter. For more information, visit ProSight Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small business can have its key servers and applications hosted in a secure Tier III data center on a high-performance virtual machine host configured and maintained by Progent's network support experts. Under Progent's ProSight Virtual Hosting service model, the client owns the data, the operating system software, and the applications. Because the environment is virtualized, it can be ported immediately to a different hosting solution without requiring a time-consuming and technically risky configuration procedure. With ProSight Virtual Hosting, your business is not locked into one hosting provider. Find out more about ProSight Virtual Hosting services.

ProSight IT Asset Management: Network Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, update, retrieve and safeguard information about your IT infrastructure, procedures, business apps, and services. You can quickly find passwords or IP addresses and be warned automatically about upcoming expirations of SSL certificates or domains. By updating and managing your network documentation, you can eliminate as much as 50% of time spent trying to find vital information about your network. ProSight IT Asset Management features a centralized location for storing and sharing all documents related to managing your business network like recommended procedures and self-service instructions. ProSight IT Asset Management also offers a high level of automation for gathering and relating IT data. Whether you’re planning improvements, doing regular maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the data you need when you need it. Learn more about Progent's ProSight IT Asset Management service.

Certified Security Consulting
Any company ought to develop a carefully considered security program that includes both pre-attack procedures and reaction planning. The proactive plan is a collection of steps designed to reduce vulnerabilities. The reactive plan assists your company's network security engineers to assess the impact resulting from a security penetration, repair the network, document the event, and get the IT network operational as rapidly as feasible.

Progent's certified IS security engineers can to assist your company to run a complete risk evaluation and define a company-wide security strategy to implement security policies and mechanisms to minimize ongoing assaults and threats.

CISM Certified Information Security Engineering Services
The CISM committee describes the core capabilities and global standards of performance that information security professionals are required to master. It gives business management the confidence that consultants who have qualified for their CISM certification possess the background and knowledge to deliver effective security administration and support services. Progent offers the expertise of CISM qualified security professionals to help companies with:

  • Information Security Governance
  • Vulnerability Management
  • Network Security Program Management
  • Network Security Administration
  • Response Planning
Learn more details concerning Progent's CISM Certified Information Security Support Professionals.

CISSP Accredited Security Engineering Expertise
CISSP certification recognizes mastery of an international standard for data security. The American National Standards Institute has awarded the CISSP credential recognition in the area of data protection stipulated by ISO 17024. Progent offers the services of security experts who have earned CISSP accreditation. Progent can provide a CISSP-certified expert to help your company in a variety security fields such as:

  • Security Management Practices
  • Security Infrastructure and Paradigms
  • Access Management Solutions and Processes
  • Software Development Security
  • Secure Operations
  • Site Security
  • Data Encryption Mechanisms
  • Telecommunications, LAN and WAN Security
  • Business Continuity Preparedness
Learn additional information concerning Progent's CISSP-certified Security Consulting Expertise.

CISSP-ISSAP Qualified Secure System Architecture Engineering Expertise
Progent's CISSP-ISSAP certified information system architecture professionals are consultants who have earned ISSAP Certification through thorough examination and significant experience with information security architecture. The ISSAP credential indicates proven competence in the more challenging demands of information system security architecture within the broader field of information system security knowledge required for CISSP certification. Progent's ISSAP-certified security specialists can assist your business with all phases of architecture security including.

  • Access Management Systems and Methodologies
  • Telecom and Network Infrastructure Protection
  • Encryption/Decryption Solutions
  • Requirements Analysis and Security Criteria
  • Business Continuity Planning and Disaster Recovery Planning
  • Site Security
Read more details about Progent's ISSAP Qualified Secure Network Architecture Support Professionals.

CISA Qualified Information System Security Auditing Engineering Services
The Certified Information Systems Auditor accreditation is a prestigious qualification that signifies mastery in IS security auditing. Certified by the American National Standards Institute (ANSI), the CISA accreditation has candidates undergo an extensive test given by the ISACA professional group. Progent's CISA security audit consultants can help your business with:

  • IS Audit Process
  • Information Technology Administration
  • Network Assets and Infrastructure Lifecycle
  • IT Service Delivery
  • Protecting Data Resources
  • Disaster Recovery Planning
Get more details concerning Progent's CISA Certified IS Security Auditing Consulting Support.

Certified in Risk and Information Systems Control (CRISC) Consultants
The CRISC program was established by ISACA to verify a consultant's skills to design, implement, and maintain IS control mechanisms to reduce risk. Progent offers the expertise of a CRISC-certified consultant to assist your company to create and execute a workplace continuity or disaster recovery strategy based on leading practices identified by CRISC and geared to align with your company's risk appetite, business goals, and IT budget. Progent's CRISC-certified network risk management experts offer a range of risk evaluation services including:

  • Gather data and review documentation to evaluate major risk scenarios
  • Identify legal, regulatory, and contractual mandates and company standards associated with your network to determine their potential impact on your business objectives
  • Point out possible threats for your business processes to help in evaluating your corporate risk
  • Create a risk awareness initiative and conduct training to ensure your organization appreciate information system risk so they can contribute to your risk management program
  • Match key risk scenarios to related business procedures to help assign risk responsibility
  • Determine risk tolerance with executive leadership and major stakeholders to make sure they align
Read additional details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Qualified Information System Security Consulting Assistance
Global Information Assurance Certification was established in 1999 to certify the skill of IT security experts. GIAC's mission is to assure that a certified security consultant possesses the knowledge needed to provide services in vital areas of system, data, and software security. GIAC accreditations are acknowledged by businesses and government organizations all over the world including and the United States NSA. Progent's GIAC-certified information security audit specialists can assist your company in the areas of:

Learn more information concerning Progent's GIAC Information Assurance Support.

Get in Touch with a Certified Security Specialist
To learn how you can access a certified security consultant for remote or onsite assistance in Oregon, phone 1-800-993-9400 or go to Online Network Help.

© 2002- 2019 Progent Corporation. All rights reserved.