Company computer networks in Oregon can now get fast and affordable online help from Progent's certified security professionals to resolve complex security problems. Rates are reasonable, charges are per minute, sign-up is quick, and support is world class. Progent also offers help for complex projects that requires the services of senior security consultants with high-level industry credentials.

If your Oregon company is based far from major urban neighborhoods like Portland, Salem, Eugene, Gresham, or Beaverton, contact with nearby certified security consultants may be limited when there's a security disaster. This can cause a drop in revenue for your business, upset customers, unproductive workers, and distracted management. By contacting Progent's remote support, you can get in touch with a certified security professional who can deliver assistance whenever you need it to keep your system on line and salvage your data.

Progent can help you in your efforts to defend your IT environment with support services that ranges from security audits to developing a company-wide security strategy. Progent offers affordable service to help small and midsize companies to design and manage secure networks based on Windows and Cisco technology and that can include servers and desktops based on UNIX, Linux, Solaris, or Apple Mac OS X operating systems plus mobile clients with Apple iOS handhelds or Android or Windows Phone smart phones and tablets.

Progent can also help you outsource spam blocking and defense against email-borne security threats. Email Guard is Progent's email security solution that uses the services and infrastructure of top data security vendors to deliver web-based management and comprehensive protection for all your inbound and outbound email. The hybrid structure of Email Guard combines a Cloud Protection Layer with a local gateway device to offer advanced protection against spam, viruses, Denial of Service Attacks, DHAs, and other email-borne malware. The Cloud Protection Layer serves as a preliminary barricade and blocks the vast majority of unwanted email from reaching your security perimeter. This decreases your vulnerability to inbound attacks and conserves system bandwidth and storage. Email Guard's onsite security gateway device provides a deeper level of inspection for incoming email. For outgoing email, the on-premises security gateway provides anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The local security gateway can also help Microsoft Exchange Server to monitor and protect internal email traffic that stays inside your corporate firewall.

Progent's security professionals are available remotely or in person to offer a range of urgent or project-based IT security services such as:

  • Perform comprehensive network security evaluations
  • Recover quickly after virus and worm attacks
  • Set up and troubleshoot firewalls
  • Implement secure methods for remote and mobile access
  • Install effective solutions for automatic protection against spam and directory harvest attacks
  • Develop a comprehensive security plan with round-the-clock monitoring
  • Offer comprehensive Call Center Services
  • Develop a practical backup and disaster recovery plan based on Microsoft DPM high-availability technology
If your network has an emergency requirement for computer security help, refer to Progent's Emergency Online Network Support.

Progent's consultants offer world-class support in vital fields of network security that include analysis, firewall and VPN expertise, and high-level security consulting.

System Security Assessment
Progent's expert security consultants can assess the effectiveness of your existing computer protection environment through exhaustive remote automated testing based on advanced utilities and tested procedures. Progent's experience in this testing saves you consulting fees and offers an objective portrayal of gaps. The information your business gains can make up the basis of a security plan that can permit your network to operate dependably and respond rapidly to future threats.

Automated Network Security Analysis
Progent offers consulting in the use of security evaluation utilities such as MBSA and GFI LANguard Network Security Scanner for economically performing a variety of automatic network testing scans to identify potential security problems. Progent has extensive knowledge of other network auditing products such as NMAP, AMAP, eEye, plus tools like Metasploit, Netcat, and Nikto. Progent can help you to make sense of testing reports and react appropriately.

Progent can show you how to build protection into your business operations, install scanning applications, plan and deploy a secure network architecture, and recommend procedures to maximize the security of your IT system. Progent's security engineers are ready to show you how to configure a firewall, implement safe remote access to email and business applications, and install VPN. Learn more on Progent's automated security analysis.

Security Inventory Packages for Small Companies
Progent has put together two low-cost security inventory scanning packages designed to allow small companies to receive an independent network security assessment from an accredited security engineer. With Progent's External Security Inventory Scan, a security engineer administers a comprehensive test of your network from beyond your firewall to determine potential risks in the security profile you present to the public. With Progent's Internal Security Inventory Checkup, a security expert executes a network scan from a secure computer inside your firewall to evaluate the risk to internal assaults. The two security inventory services are set up and run from a secured external location. The project is overseen by an engineer with high-level security accreditations and who produces a document that summarizes and interprets the data captured by the scan and suggests practical improvements if called for.

Stealth Intrusion Testing Consulting
Stealth penetration checking is a key component of any successful network security plan. Progentís security professionals can run thorough penetration tests without the awareness of your organization's internal network support staff. Stealth penetration testing shows whether existing security defense systems such as intrusion incident warnings and event log analysis are properly set up and consistently checked. Find out more concerning Progent's stealth security penetration testing support services.

Firewall And Virtual Private Network (VPN) Solutions
Progent's expertise in security solutions encompasses in-depth field work with major firewalls and VPN technology offered by multiple companies including Cisco, Microsoft, and Juniper. Progent offers the support of engineers with important networking accreditations including Cisco Certified Internetwork Expert and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Integration and Troubleshooting
The current Cisco ASA 5500-X Family of firewalls with Firepower Services offer substantially more bang for the buck than Cisco's legacy PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 firewalls for new deployments. Since Cisco's acquisition of Sourcefire, the whole family of ASA 5500-X devices can be configured to enable Firepower Services, built on Sourcefire's Snort product, which is the market's most popular intrusion protection system. Firepower services bring powerful new features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can assist you to manage your existing PIX or ASA 5500 firewalls or upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist you to plan, configure, tune, manage and troubleshoot firewall environments based on Cisco ASA 5500-X firewalls with Firepower Services. Find out additional information about Cisco ASA Firewalls with Firepower integration and troubleshooting support.

Cisco Security and VPN Engineering Expertise
Cisco's security and offsite access technology represent a complete range of easy-to-administer security solutions to help protect your local and remote information system. Cisco's VPN product family features switches, firewalls, intrusion detection systems and Virtual Private Network appliances. Progent's expert consulting staff includes experienced specialists with Cisco's Certified Internetwork Expert and CCNP qualifications who can help your organization to select Cisco VPN, Cisco RADIUS Security, and other Cisco security solutions that align most closely with your company objectives. Find out additional information about Progent's Engineering Expertise for Cisco Security Technology and Virtual Private Network Products.

Consulting Expertise for Other Firewall and Virtual Private Network Solutions
Progent offers small and medium size organizations expert support for Intrusion Protection Systems and IPsec VPN products from leading firewall and VPN security companies including Check Point Software, Juniper, and SonicWALL. Progent can help you design a detailed security strategy and select the right technologies from multiple vendors to achieve your security objectives while sticking within your spending restraints.

Expert Network Security Planning
Any business ought to develop a thoroughly thought out security strategy that includes both proactive processes and reaction plans. The proactive plan is a set of steps that help to minimize vulnerabilities. The post-attack strategy assists your IT security personnel to evaluate the damage caused by a security penetration, fix the system, record the experience, and get the IT network operational as rapidly as possible.

Progent's expert IT security consultants can to help you to run a comprehensive risk assessment and create a computer security plan to implement security processes and mechanisms to mitigate ongoing attacks and threats.

CISM Accredited Network Security Support Services
The Certified Information Security Manager (CISM) organization defines the core competencies and international standards of skill that IT security professionals are expected to learn. It gives executive management the assurance that consultants who have qualified for their CISM certification possess the experience and knowledge to deliver effective security management and support services. Progent offers the expertise of CISM qualified security professionals to help companies with:

  • Information Security Governance
  • Risk Management
  • IS Security Implementation Management
  • Information Security Administration
  • Response Planning
Read additional information concerning Progent's CISM IS Security Support Services.

CISSP Certified Security Consulting Expertise
CISSP certification recognizes expertise with a global standard for information security. ANSI (American National Standards Institute) has awarded certification accreditation in the field of data protection defined by ISO/IEC 17024. Progent offers access to of security experts who have earned CISSP certification. Progent can provide a CISSP-certified expert to help your enterprise in a variety security fields including:

  • Security Administration Practices
  • Security Infrastructure and Paradigms
  • Access Management Solutions and Methodology
  • Applications Development Security
  • Secure Operations
  • Site Security
  • Data Encryption Technology
  • Telecommunications, Network and WAN Security
  • Disaster Recovery Preparedness
Find out additional details about Progent's CISSP Qualified IS Security Consulting Services.

ISSAP Accredited Secure System Architecture Consulting Services
Progent's ISSAP qualified system architecture professionals are consultants who have earned ISSAP status as a result of rigorous testing and extensive work with information security design. The ISSAP credential indicates demonstrated mastery in the more complex demands of information system security architecture within the wider scope of information system security expertise needed for CISSP accreditation. Progent's ISSAP-certified security consultants can assist your business with all aspects of architecture security such as.

  • Access Management Mechanisms and Techniques
  • Telecom and System Infrastructure Protection
  • Cryptography Options
  • Needs Evaluation and Security Standards
  • Business Continuity Planning and Disaster Recovery Planning
  • Site Security
Read more details concerning Progent's ISSAP Certified Secure IT Architecture Support Services.

CISA Accredited Information System Security Auditing Engineering Expertise
The Certified Information Systems Auditor credential is a prestigious achievement that signifies mastery in network security audit and control. Accredited by ANSI, the CISA credential has candidates undergo an extensive examination administered by the ISACA international professional association. Progent's CISA-certified information security audit engineers are available to assist your company with:

  • IS Audit Services
  • IT Administration
  • Systems and Architecture Lifecycle Planning
  • IT Support
  • Safeguarding Information Assets
  • Disaster Recovery Planning
Find out more information concerning Progent's CISA Qualified Security Auditing Consulting Expertise.

Certified in Risk and Information Systems Control (CRISC) Consultants
The Certified in Risk and Information Systems Control (CRISC) program was established by ISACA to verify a consultant's ability to design, implement, and support IS control mechanisms to reduce risk. Progent offers the services of a CRISC-certified engineer to help you to create and carry out a workplace continuity or disaster recovery strategy that follows leading practices promoted by CRISC and geared to align with your company's risk tolerance, business goals, and budgetary guidelines. Progent's CRISC network risk management engineers offer a variety of risk evaluation services including:

  • Gather information and study documentation to help identify significant risk scenarios
  • Inventory legal, regulatory, and business requirements and organizational policies related to your network to determine their possible impact on your business objectives
  • Point out potential threats for your business processes to help in evaluating your corporate risk
  • Create a risk awareness initiative and provide training to make sure your organization appreciate information system risk so they can assist with your risk control process
  • Connect key risk vectors to your associated operational procedures to help assign risk responsibility
  • Validate risk tolerance with executive management and major stakeholders to ensure they are in agreement
Find out additional details about Progent's CRISC Consultants.

GIAC Qualified IS Security Engineering Assistance
Global Information Assurance Certification was established in 1999 to certify the knowledge of network security engineers. GIAC's mission is to verify that an accredited security consultant possesses the skills necessary to provide support in critical categories of system, information, and software security. GIAC accreditations are acknowledged by companies and institutions throughout the world including and the United States NSA. Progent's GIAC-certified security audit consultants can assist your company in the areas of:

  • Assessing Perimeters
  • Security Incident Handling
  • Traffic Analysis
  • Web Application Security
  • SIEM solutions
Read additional details concerning Progent's GIAC Information Assurance Services.

Contact a Certified Security Expert
To find out how you can access a Progent security engineer for remote or onsite expertise in Oregon, call 1-800-993-9400 or visit Online Computer Support.

© 2002- 2017 Progent Corporation. All rights reserved.