Company information networks in the state of Washington can now get quick and economical online technical support from Progent's certified network security experts to assist with the toughest security problems. Rates are reasonable, charges are per minute, sign-up is immediate, and support is world class. Progent also provides help for long-term engagements that demand the expertise of seasoned security engineers with top security certifications.

If your Washington organization is based some distance from larger urban areas like Seattle, Spokane, Tacoma, Bellevue, or Vancouver, contact with nearby accredited security consultants is often limited during an emergency. This can cause lost productivity for your company, upset clients, unproductive workers, and distracted management. By contacting Progent, you can get in touch with a certified security engineer who can offer expertise when you require it to get your information system on line and salvage your data.

Progent can help you in a variety of ways in your initiatives to defend your information system with services that ranges from security checks to developing a company-wide security plan. Progent offers affordable service to help companies of any size to configure and manage secure IT environments powered by Windows and Cisco products and that can include computers based on UNIX or Linux operating systems plus BYOD clients with Apple handhelds or Android or Windows Phone smart phones and tablets.

Progent can also assist you to outsource spam filtering and protection from email-borne attacks. Email Guard is Progent's email filtering and encryption solution that incorporates the services and infrastructure of top information security companies to deliver centralized management and world-class protection for your email traffic. The hybrid structure of Email Guard managed service combines a Cloud Protection Layer with a local security gateway device to offer complete protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. The cloud filter serves as a preliminary barricade and keeps the vast majority of unwanted email from reaching your security perimeter. This decreases your exposure to inbound attacks and saves network bandwidth and storage space. ProSight Email Guard's on-premises security gateway appliance provides a further layer of analysis for inbound email. For outbound email, the local security gateway offers AV and anti-spam filtering, DLP, and encryption. The onsite security gateway can also enable Microsoft Exchange Server to monitor and safeguard internal email traffic that stays within your security perimeter.

Progent's security consultants are accessible online or on premises to offer a variety of urgent or longer-term computer security services such as:

If your company has an immediate requirement for computer security support, refer to Progent's Emergency Online Technical Support.

Progent's support professionals provide advanced services in key fields of system protection that include analysis, firewall and VPN expertise, and high-level security consulting.

System Security Assessment
Progent's expert security consultants can evaluate the strength of your existing network protection environment through exhaustive remote automated testing based on sophisticated software tools and tested procedures. Progent's experience in administering this service saves your company consulting fees and offers a detailed portrayal of gaps. The information your IT organization gains can form the foundation of a security strategy that can allow your network to run safely and respond rapidly to new threats.

Automated Vulnerability Audits
Progent provides consulting in the use of security auditing products including Microsoft Baseline Security Analyzer and GFI LANguard Network Security Scanner for affordably performing a set of automatic network auditing checks to identify potential security weaknesses. Progent has broad experience with additional security auditing utilities including NMAP, AMAP Application Scanner, eEye Vulnerability Scanner, plus utilities such as Metasploit, Hydra, and Nikto. Progent can help you to understand testing reports and react effectively.

Progent can show you how to design protection into your business processes, configure scanning applications, plan and deploy a protected system environment, and suggest policies to maximize the safety of your network. Progent's security professionals are available to show you how to configure a firewall, implement safe remote access to email and business applications, and install virtual private network. Find out more on Progent's network security evaluation.

Security Inventory and Evaluation Packages for Small Businesses
Progent offers two low-cost security inventory service bundles designed to enable small companies to get an impartial security evaluation from an accredited security engineer. With Progent's External Security Inventory Checkup, a security expert administers a comprehensive test of your network from outside your firewalled perimeter to determine possible weaknesses in the security posture you expose to the outside world. With Progent's Internal Security Inventory Scan, a security expert executes a system scan from an authorized machine within your company firewall to assess your exposure to inside assaults. The two security inventory services are set up and run from a protected remote site. The process is overseen by a consultant who has earned top security credentials and who generates a report that details and interprets the data captured by the security scan and proposes practical improvements if called for.

Stealth Intrusion Analysis Support Services
Stealth intrusion checking is an important part of any successful network security strategy. Progentís security experts can run extensive penetration tests without the knowledge of your company's in-house IT resources. Unannounced penetration checking uncovers whether current security monitoring systems such as intrusion detection warnings and event history monitoring are correctly configured and consistently monitored. Learn additional information concerning Progent's stealth security penetration testing support services.

Firewall And Virtual Private Network (VPN) Support
Progent's expertise in network security technology encompasses extensive field work with major firewalls and VPN products from a variety of companies such as Cisco, Microsoft, and Symantec. Progent can provide the services of engineers who have earned key networking accreditations such as CCIE and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Configuration and Troubleshooting
The latest generation of Cisco ASA 5500-X Family of firewalls with Firepower Services provide significantly more value than Cisco's previous PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 security appliances for new installations. After Cisco's purchase of Sourcefire, the whole line of ASA 5500-X firewalls can be configured to support Firepower Services, based on Sourcefire's Snort technology, which is the market's most deployed intrusion protection system (IPS). Firepower services bring powerful new capabilities including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-qualified CCIE network experts can assist you to manage your legacy PIX or ASA 5500 firewalls and migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite help with ASA 5500-X firewalls with Firepower Services and can help your business to plan, configure, optimize, administer and debug firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. Find out more information about Cisco ASA Firewalls with Firepower configuration and debugging services.

Cisco Network Security and Virtual Private Network Support Services
Cisco's security and offsite connection technology represent a full range of manageable security solutions to help safeguard your wired and wireless information system. Cisco's Virtual Private Network line features switches, firewalls, intrusion detection devices and Virtual Private Network appliances. Progent's expert consulting staff includes field-proven engineers with Cisco Certified Internetwork Expert and Cisco Certified Network Professional qualifications who can help your business to evaluate Cisco VPN, Cisco RADIUS Security, and additional Cisco security technologies that fit best with your business goals. Find out additional details about Progent's Support Services for Cisco Security Solutions and Virtual Private Network Appliances.

Support Expertise for Other Firewall and Virtual Private Network Solutions
Progent provides small and medium size companies professional consulting for Intrusion Protection products and IPsec VPN technology from leading firewall and Virtual Private Network security companies including WatchGuard, Juniper Networks, and Symantec. Progent can show you how to design a detailed security strategy and select appropriate technologies from multiple vendors to achieve your security goals while sticking within your spending restraints.

Progent's Low-Cost Managed Services for Information Security
Progent's value-priced ProSight family of network management outsourcing services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance and compliance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection service that utilizes cutting edge behavior-based analysis tools to defend endpoints as well as physical and virtual servers against modern malware attacks like ransomware and file-less exploits, which routinely escape traditional signature-matching AV products. ProSight ASM protects on-premises and cloud resources and offers a single platform to automate the complete malware attack progression including filtering, identification, mitigation, cleanup, and forensics. Top features include one-click rollback with Windows Volume Shadow Copy Service (VSS) and real-time network-wide immunization against new attacks. Read more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware defense.

ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Security
Progent's ProSight Enhanced Security Protection services offer affordable in-depth protection for physical servers and virtual machines, desktops, smartphones, and Microsoft Exchange. ProSight ESP uses contextual security and modern behavior analysis for continuously monitoring and responding to cyber assaults from all attack vectors. ProSight ESP delivers firewall protection, intrusion alerts, endpoint control, and web filtering via leading-edge technologies incorporated within one agent accessible from a unified console. Progent's security and virtualization consultants can assist your business to design and implement a ProSight ESP deployment that meets your company's specific needs and that helps you demonstrate compliance with government and industry information protection regulations. Progent will assist you define and implement policies that ProSight ESP will enforce, and Progent will monitor your network and react to alarms that call for urgent attention. Progent's consultants can also help you to set up and verify a backup and disaster recovery system such as ProSight Data Protection Services (DPS) so you can recover rapidly from a destructive cyber attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint protection and Exchange filtering.

ProSight DPS: Managed Cloud Backup and Recovery
ProSight Data Protection Services from Progent offer small and medium-sized businesses a low cost and fully managed service for reliable backup/disaster recovery. Available at a fixed monthly cost, ProSight Data Protection Services automates and monitors your backup processes and enables rapid restoration of critical data, applications and virtual machines that have become unavailable or corrupted as a result of hardware breakdowns, software bugs, disasters, human mistakes, or malware attacks like ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, apps, system images, plus Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to a local storage device, or mirrored to both. Progent's BDR consultants can deliver advanced expertise to configure ProSight DPS to to comply with regulatory requirements such as HIPPA, FIRPA, PCI and Safe Harbor and, whenever necessary, can assist you to recover your critical information. Read more about ProSight DPS Managed Cloud Backup and Recovery.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that incorporates the infrastructure of top data security vendors to provide web-based control and world-class security for all your email traffic. The powerful structure of Progent's Email Guard integrates cloud-based filtering with an on-premises security gateway appliance to offer complete protection against spam, viruses, Dos Attacks, DHAs, and other email-based malware. Email Guard's cloud filter acts as a first line of defense and keeps the vast majority of threats from making it to your security perimeter. This reduces your vulnerability to external threats and saves system bandwidth and storage. Email Guard's onsite gateway appliance provides a deeper layer of analysis for incoming email. For outbound email, the local gateway provides AV and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The onsite gateway can also assist Exchange Server to monitor and protect internal email traffic that stays within your corporate firewall. For more information, see ProSight Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size business can have its critical servers and apps hosted in a secure fault tolerant data center on a high-performance virtual host set up and maintained by Progent's network support experts. Under the ProSight Virtual Hosting model, the client owns the data, the operating system software, and the apps. Since the environment is virtualized, it can be moved easily to an alternate hardware environment without requiring a time-consuming and difficult reinstallation process. With ProSight Virtual Hosting, your business is not tied one hosting service. Find out more details about ProSight Virtual Hosting services.

ProSight IT Asset Management: Infrastructure Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to capture, update, find and protect information about your IT infrastructure, processes, applications, and services. You can quickly locate passwords or IP addresses and be warned about upcoming expirations of SSLs or warranties. By updating and organizing your network documentation, you can eliminate as much as half of time thrown away searching for critical information about your IT network. ProSight IT Asset Management includes a common repository for holding and collaborating on all documents required for managing your network infrastructure like standard operating procedures and self-service instructions. ProSight IT Asset Management also offers advanced automation for collecting and associating IT information. Whether youíre planning enhancements, doing regular maintenance, or reacting to an emergency, ProSight IT Asset Management delivers the knowledge you require the instant you need it. Learn more details about ProSight IT Asset Management service.

Expert Security Planning
Every business ought to develop a thoroughly considered security strategy that incorporates both preventive processes and response plans. The proactive strategy is a set of mechanisms intended to minimize vulnerabilities. The post-attack strategy helps your security engineers to evaluate the damage caused by a security penetration, fix the system, record the event, and get business functions operational as soon as feasible.

Progent's certified IT security engineers are available to help your company to perform a comprehensive vulnerability assessment and create a network security plan to implement security processes and controls to mitigate ongoing attacks and threats.

CISM Qualified Network Security Engineering Assistance
The Certified Information Security Manager (CISM) organization defines the core competencies and worldwide standards of performance that information security managers are expected to learn. CISM provides executive management the assurance that consultants who have earned their CISM credential have the experience and capability to provide effective security management and support consulting. Progent can provide the support of CISM certified security professionals to assist businesses with:

  • Information Security Processes
  • Vulnerability Management
  • IS Security Implementation Management
  • Network Security Management
  • Recovery Planning
Read more details about Progent's CISM Network Security Engineering Professionals.

CISSP Certified Security Consulting Services
The CISSP credential recognizes expertise with a global standard for network security. ANSI (American National Standards Institute) has awarded certification recognition in the field of information protection under ISO 17024. Progent offers access to of security consultants who have earned CISSP certification. Progent can provide a CISSP-certified expert to help your company in a variety security areas including:

  • Security Management Procedures
  • Security Infrastructure and Paradigms
  • Access Control Solutions and Methodology
  • Applications Development Security
  • Operations Security
  • Physical Security
  • Encryption/Decryption Technology
  • Telecommunications, LAN and Internet Security
  • Disaster Recovery Preparedness
Read more details concerning Progent's CISSP Qualified Security Support Services.

ISSAP Qualified Secure IT Architecture Engineering Services
Progent's ISSAP certified information system architecture engineers are experts who have earned ISSAP Certification through thorough testing and extensive work with network security design. The Information System Security Architecture Professional (ISSAP) certification indicates proven competence in the more complex requirements of information security architecture within the broader scope of information security knowledge required for CISSP certification. Progent's ISSAP-qualified security consultants can help your company with all aspects of secure network architecture such as.

  • Access Management Mechanisms and Techniques
  • Telecom and Network Security
  • Cryptography Solutions
  • Requirements Analysis and Security Standards
  • Business Continuity Planning and DRP
  • Hardware Security
Read additional information about Progent's ISSAP Qualified Secure Network Architecture Support Services.

CISA Accredited IS Security Auditing Engineering Assistance
The Certified Information Systems Auditor accreditation is a recognized qualification that indicates expertise in IS security audit and control. Certified by the American National Standards Institute, the CISA accreditation has consultants undergo an extensive test administered by the ISACA professional association. Progent's CISA-qualified IS security audit experts are available to help your company in the areas of:

  • IS Audit Process
  • IT Governance
  • Systems and Infrastructure Lifecycle
  • Information Technology Service Delivery
  • Protecting Data Assets
  • Business Continuity Planning
Get additional information concerning Progent's CISA Qualified Security Auditing Engineering Assistance.

Certified in Risk and Information Systems Control (CRISC) Experts
The CRISC program was initiated by ISACA to verify an IT professional's skills to design, deploy, and support IS control mechanisms to mitigate risk. Progent can provide the services of a CRISC-certified engineer to help you to develop and carry out a workplace continuity or disaster recovery plan based on leading practices promoted by CRISC and geared to match your company's risk tolerance, business objectives, and budgetary guidelines. Progent's CRISC-certified network risk mitigation consultants offer a range of risk assessment services such as:

  • Gather data and study documentation to evaluate significant vulnerabilities
  • Inventory statutory, industry, and contractual requirements and company policies related to your network to assess their potential impact on your business goals
  • Identify possible vulnerabilities for your business workflows to assist in evaluating your corporate risk
  • Develop a risk awareness initiative and provide training to make sure your organization appreciate IS risk so they can assist with your risk management process
  • Connect key risk scenarios to related operational processes to help determine risk responsibility
  • Validate risk appetite with your senior leadership and key stakeholders to ensure they match
Learn additional details concerning Progent's CRISC Consultants.

GIAC Qualified Information System Security Consulting Expertise
GIAC was established in 1999 to certify the skill of computer security experts. GIAC's mission is to verify that a certified professional possesses the knowledge appropriate to deliver services in key areas of system, information, and program security. GIAC accreditations are recognized by companies and government organizations around the world including and the United States NSA. Progent's GIAC network security audit experts can help your business with:

  • Assessing IT Infrastructure
  • Security Incident Response
  • Intrusion Detection
  • Web-based Application Security
  • SIEM solutions
Read additional information concerning Progent's GIAC Information Assurance Expertise.

Contact a Progent Security Expert
To see how to access a certified security engineer for remote or on-premises help in Washington, phone 1-800-993-9400 or go to Remote Computer Help.

© 2002- 2018 Progent Corporation. All rights reserved.