Company computer networks in Washington now have quick and economical remote technical support from Progent's certified network security support specialists to resolve the toughest security issues. Rates are reasonable, charges are by the minute, sign-up is fast, and service is unbeatable. Progent also offers assistance for complex projects that requires the expertise of senior security engineers with high-level security certifications.

If your Washington office is located far from major metropolitan areas such as Seattle, Spokane, Tacoma, Bellevue, or Vancouver, help from local accredited network security professionals could be problematic when you have a security disaster. This could mean lost revenue for your business, angry customers, idle employees, and distracted management. By utilizing Progent's remote support, you have access to a qualified security engineer who can offer assistance when you have to have it to get your network running and restore your data.

Progent can help you at any level in your efforts to defend your network with services that ranges from network security checks to creating a comprehensive security strategy. Progent provides economical support to help small and midsize companies to design and manage protected networks based on Windows and Cisco products and that can include computers based on UNIX, Linux, Sun Solaris, or Mac OS X platforms as well as BYOD clients with Apple iOS handhelds or Google Android or Windows Phone devices.

Progent can also assist you to outsource spam blocking and defense against email-borne attacks. Email Guard is Progent's email security platform that uses the services and infrastructure of top data security vendors to deliver web-based management and world-class security for your inbound and outbound email. The hybrid architecture of Email Guard integrates a Cloud Protection Layer with an on-premises gateway appliance to offer complete defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. ProSight Email Guard's cloud filter acts as a first line of defense and keeps most threats from making it to your network firewall. This reduces your vulnerability to inbound attacks and saves network bandwidth and storage space. ProSight Email Guard's onsite gateway device provides a deeper layer of analysis for incoming email. For outgoing email, the local security gateway provides anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and encryption. The local security gateway can also enable Exchange Server to track and safeguard internal email that originates and ends inside your security perimeter.

Progent's certified engineers are accessible remotely or in person to offer a variety of urgent or project-based network security services such as:

If your business has an immediate requirement for IT security support, go to Progent's Urgent Remote Technical Support.

Progent's support professionals provide world-class services in vital areas of system protection including security evaluation, firewall and VPN solutions, and high-level security consulting.

System Security Evaluation
Progent's certified security consultants can evaluate the vulnerability of your existing computer security environment through exhaustive remote automated testing via advanced utilities and tested procedures. Progent's experience in this testing saves you time and money and offers an objective picture of weaknesses. The knowledge your business is provided can make up the basis of a security strategy that can permit your network to run dependably and respond quickly to new risks.

Automated Vulnerability Audits
Progent offers expertise in the use of security testing software such as Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard for economically running a set of programmed system auditing checks to identify potential security holes. Progent has extensive knowledge of other network auditing tools such as NMAP, AMAP Application Scanner, eEye, as well as tools like Metasploit, Netcat, and Nikto. Progent can help you to make sense of audit reports and respond effectively.

Progent can help you build security into your business processes, install auditing software, plan and deploy a secure network architecture, and recommend procedures to optimize the safety of your network. Progent's security professionals are available to help you set up a firewall, implement safe remote access to email and data, and integrate VPN. Find out additional information on Progent's network security audits.

Security Inventory Packages for Small Businesses
Progent offers two low-cost security inventory and evaluation packages designed to allow small businesses to receive an impartial security evaluation from an accredited security specialist. With Progent's External Security Inventory Scan, a security engineer administers a comprehensive test of your network from beyond your firewall to uncover potential weaknesses in the security profile you present to the public. With Progent's Internal Network Security Inventory Scan, a security engineer runs a system scan from an authorized computer inside your company firewall to evaluate your exposure to inside threats. The two security inventory packages are set up and executed from a secured external site. The project is managed by a consultant who has earned high-level security credentials and who generates a report that summarizes and analyzes the data collected by the security scan and suggests cost-effective improvements if called for.

Network Security Penetration Testing Consulting
Stealth penetration testing is an important component of any serious network security plan. Progentís security experts can run extensive penetration checks without the awareness of your organization's in-house IT resources. Stealth penetration testing uncovers whether existing security monitoring tools such as intrusion detection alerts and event history monitoring are correctly configured and actively checked. Find out more concerning Progent's stealth security penetration analysis consulting.

Firewall and Virtual Private Network Solutions
Progent's background in security technology encompasses in-depth familiarity with major firewalls and Virtual Private Network products from a variety of vendors including Cisco, Microsoft, and CheckPoint. Progent can provide the support of engineers who have earned key networking accreditations including Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Configuration and Troubleshooting
The latest generation of ASA 5500-X Series of firewalls with Firepower Services deliver substantially more value than Cisco's earlier PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX firewalls for new deployments. Following Cisco's purchase of Sourcefire, the whole line of Cisco ASA 5500-X firewalls can be provisioned to support Firepower Services, built on Sourcefire's Snort technology, which is the market's most popular intrusion protection system (IPS). Firepower services bring enhanced capabilities including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can assist you to maintain your existing PIX or ASA 5500 firewalls or migrate efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist your organization to plan, integrate, optimize, manage and troubleshoot firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services. Find out more details about ASA Firewalls with Firepower integration and debugging services.

Cisco Network Security and Virtual Private Network Engineering Expertise
Cisco's security and remote access products provide a full range of manageable security products to help protect your wired and wireless network infrastructure. Cisco's VPN product family includes switches, firewalls, intrusion detection systems and VPN appliances. Progent's expert consulting staff includes experienced specialists with Cisco CCIE and Cisco Certified Network Professional qualifications who can help your organization to evaluate Cisco VPN, Cisco RADIUS Security, and other Cisco security solutions that align most closely with your company goals. Find out more information about Progent's Support Services for Cisco Security and Virtual Private Network Appliances.

Support Services for Other Firewall and Virtual Private Network Solutions
Progent offers small and mid-size businesses expert consulting for Intrusion Protection products and IPsec VPN solutions from leading firewall and Virtual Private Network security companies such as WatchGuard, Juniper, and SonicWALL. Progent can show you how to create a comprehensive security strategy and choose the right products from a variety of suppliers to support your security objectives while staying within your spending restraints.

Progent's Flat-rate Managed Services for Information Security
Progent's value-priced ProSight line of outsourced network management services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance and compliance. Managed services available from Progent include:
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's email security solution that uses the services and infrastructure of top data security vendors to provide centralized control and comprehensive protection for your email traffic. The hybrid architecture of Progent's Email Guard managed service integrates a Cloud Protection Layer with an on-premises gateway device to offer complete protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. ProSight Email Guard's Cloud Protection Layer acts as a preliminary barricade and blocks the vast majority of unwanted email from making it to your security perimeter. This decreases your vulnerability to external threats and saves system bandwidth and storage. ProSight Email Guard's onsite security gateway device adds a further level of analysis for incoming email. For outgoing email, the local gateway provides anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and encryption. The local gateway can also help Exchange Server to monitor and protect internal email traffic that stays inside your corporate firewall. Learn more about Progent's ProSight Email Guard Spam Filtering, Virus Defense, Content Filtering and Data Loss Prevention.

ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring is an endpoint protection (EPP) solution that incorporates cutting edge behavior-based analysis technology to guard endpoint devices and physical and virtual servers against modern malware attacks such as ransomware and file-less exploits, which easily escape traditional signature-based anti-virus tools. ProSight Active Security Monitoring protects local and cloud-based resources and provides a unified platform to address the complete malware attack lifecycle including filtering, infiltration detection, mitigation, cleanup, and forensics. Top capabilities include single-click rollback with Windows Volume Shadow Copy Service (VSS) and real-time system-wide immunization against newly discovered threats. Read more about Progent's ProSight Active Security Monitoring (ASM) Next-Generation Endpoint Protection and Ransomware Defense.

ProSight Data Protection Services: Managed Cloud Backup
ProSight Data Protection Services offer small and medium-sized businesses a low cost end-to-end service for secure backup/disaster recovery (BDR). For a low monthly rate, ProSight DPS automates your backup activities and allows rapid recovery of critical files, applications and VMs that have become lost or damaged due to component failures, software glitches, disasters, human error, or malicious attacks like ransomware. ProSight Data Protection Services can help you protect, recover and restore files, folders, apps, system images, as well as Microsoft Hyper-V and VMware images. Critical data can be protected on the cloud, to a local device, or to both. Progent's backup and recovery consultants can provide advanced expertise to set up ProSight DPS to to comply with government and industry regulatory standards such as HIPPA, FINRA, PCI and Safe Harbor and, when needed, can help you to restore your critical information. Read more about ProSight Data Protection Services Managed Cloud Backup.

Expert Network Security Design
Any business should develop a carefully considered security strategy that includes both proactive processes and response plans. The proactive plan is a set of steps that help to reduce security weaknesses. The post-attack strategy assists your company's IT security engineers to evaluate the impact caused by an attack, repair the network, document the event, and get business functions restored as soon as feasible.

Progent's certified IS security engineers are available to help your business to run a comprehensive vulnerability assessment and create a computer security plan to implement security processes and mechanisms to mitigate ongoing attacks and threats.

CISM Certified Security Support Services
The CISM organization describes the core competencies and international standards of skill that information security managers are expected to learn. It provides business management the confidence that consultants who have earned their CISM credential possess the experience and capability to deliver effective security administration and support consulting. Progent can provide the support of CISM qualified security professionals to help businesses with:

  • IS Security Processes
  • Vulnerability Management
  • IS Security Program Management
  • IS Security Management
  • Recovery Planning
Learn more information concerning Progent's CISM Certified Security Consulting Services.

CISSP Certified Security Consulting Services
The CISSP credential recognizes expertise with a global standard for network security. The American National Standards Institute has awarded certification accreditation in the field of information protection stipulated by ISO 17024. Progent offers access to of security consultants who have earned CISSP accreditation. Progent can provide a CISSP-certified expert to help your company in a broad range of security areas including:

  • Security Administration Practices
  • Security Infrastructure and Paradigms
  • Access Control Solutions and Processes
  • Software Development Security
  • Operations Security
  • Site Security
  • Cryptography Mechanisms
  • Telecommunications, Network and WAN Security
  • Disaster Recovery Preparedness
Read more details about Progent's CISSP Qualified Network Security Consulting Expertise.

ISSAP Accredited Secure System Architecture Engineering Expertise
Progent's ISSAP certified network architecture professionals are experts who have earned ISSAP Certification through thorough testing and extensive experience with information security design. The ISSAP credential indicates proven mastery in the more in-depth requirements of information security architecture within the broader scope of information system security expertise required for CISSP certification. Progent's ISSAP-certified security consultants can assist your company with all aspects of secure network architecture such as.

  • Access Management Mechanisms and Techniques
  • Telecommunications and Network Security
  • Data Encryption Solutions
  • Requirements Analysis and Security Standards
  • BCP and Disaster Recovery Planning (DRP)
  • Site Security
Find out additional details concerning Progent's ISSAP Accredited Secure System Architecture Engineering Expertise.

CISA Certified Network Security Auditing Engineering Assistance
The Certified Information Systems Auditor accreditation is a recognized achievement that represents mastery in IS security audit and control. Accredited by the American National Standards Institute (ANSI), the CISA accreditation has consultants pass an extensive examination administered by the ISACA professional group. Progent's CISA information security audit specialists can assist your IT organization with:

  • IS Audit Services
  • Information Technology Enforcement
  • Network Assets and Infrastructure Lifecycle
  • IT Support
  • Protecting Information Assets
  • Disaster Recovery Planning
Learn additional details concerning Progent's CISA Qualified IS Security Auditing Consulting Support.

CRISC Experts
The Certified in Risk and Information Systems Control (CRISC) program was established by ISACA to validate a consultant's skills to plan, deploy, and maintain IS control mechanisms to mitigate risk. Progent offers the expertise of a CRISC-certified engineer to assist you to develop and carry out a workplace continuity plan based on industry best practices promoted by CRISC and crafted to match your company's risk tolerance, business goals, and IT budget. Progent's CRISC IT risk mitigation specialists offer a variety of risk assessment services such as:

  • Gather information and review documentation to help identify significant vulnerabilities
  • Inventory legal, industry, and business mandates and company standards associated with your information system to assess their possible impact on your strategic goals
  • Point out potential vulnerabilities for your business processes to help in analyzing your enterprise risk
  • Develop a risk awareness program and conduct seminars to make sure your organization understand IT risk so they can assist with your risk management program
  • Match identified risk vectors to related operational procedures to help assign risk responsibility
  • Validate risk tolerance with your senior leadership and key stakeholders to make sure they are in agreement
Learn the details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Experts.

GIAC Certified IS Security Engineering Assistance
Global Information Assurance Certification was established in 1999 to certify the knowledge of information technology security experts. GIAC's goal is to make sure that an accredited security consultant possesses the knowledge necessary to deliver support in critical areas of system, data, and application program security. GIAC accreditations are recognized by companies and government organizations all over the world including and the U.S. National Security Agency (NSA). Progent's GIAC-certified security audit consultants are available to help your company with:

Learn more details concerning Progent's GIAC Information Assurance Expertise.

Get in Touch with a Security Engineer
To learn how to contact a Progent security consultant for remote or onsite help in Washington, call 1-800-993-9400 or visit Remote Computer Help.

© 2002- 2018 Progent Corporation. All rights reserved.