Company information networks in Washington can depend on quick and economical online help from Progent's certified security professionals to help with the toughest security problems. Rates are reasonable, billing is per minute, sign-up is quick, and service is unbeatable. Progent also provides help for complex projects that requires the knowledge of seasoned security consultants with high-level security certifications.

In case your Washington business is far from larger urban areas including Seattle, Spokane, Tacoma, Bellevue, or Vancouver, support from nearby qualified security consultants may be problematic when there's a security disaster. This can result in a drop in income for your company, angry clients, unproductive employees, and defocused executives. By calling Progent's remote support, you have access to a qualified security engineer who can provide assistance when you require it to get your information system operating and recover your information.

Progent can assist you in all your initiatives to protect your information system with support services that ranges from security assessments to creating a comprehensive security plan. Progent offers affordable support to assist businesses of all sizes to set up and manage secure networks based on Microsoft Windows and Cisco technology and that can include computers running UNIX, Linux, Solaris, or Apple Mac OS X operating systems plus BYOD users with Apple iPhones and iPads or Android or Windows Phone devices.

Progent can also help you outsource spam blocking and protection from email-borne assaults. Email Guard is Progent's email security solution that uses the technology of leading information security companies to provide web-based control and comprehensive protection for all your inbound and outbound email. The powerful architecture of Email Guard managed service integrates a Cloud Protection Layer with a local security gateway appliance to provide advanced defense against spam, viruses, Dos Attacks, DHAs, and other email-based threats. The Cloud Protection Layer serves as a preliminary barricade and keeps the vast majority of unwanted email from making it to your network firewall. This reduces your vulnerability to inbound threats and conserves system bandwidth and storage. Email Guard's on-premises security gateway appliance provides a further layer of analysis for inbound email. For outgoing email, the local security gateway offers anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and encryption. The on-premises gateway can also assist Microsoft Exchange Server to track and protect internal email that originates and ends within your security perimeter.

Progent's certified engineers are available online or in person to offer a variety of emergency or project-based IT security services such as:

  • Run thorough network security audits
  • Recover quickly after virus and worm attacks
  • Install firewalls from multiple vendors
  • Configure secure solutions for remote and mobile access
  • Deploy advanced applications for defense against spam and directory harvest attacks
  • Help create a comprehensive security plan with round-the-clock monitoring
  • Offer outsourced Help Desk Support
  • Help Create a practical data backup and business continuity plan centered on Microsoft Data Protection Manager technology
If your network has an emergency need for IT security support, refer to Progent's Urgent Online Network Help.

Progent's engineers can deliver advanced services in vital areas of network security including auditing, firewall and VPN expertise, and advanced security planning.

Security Audits
Progent's certified security engineers can evaluate the effectiveness of your current computer security environment through exhaustive remote automated testing based on sophisticated utilities and tested techniques. Progent's skill in this testing saves you money and offers a detailed picture of security holes. The information your business is provided can make up the foundation of a security plan that will permit your information system to operate safely and respond rapidly to future risks.

Automated Network Security Evaluation
Progent offers consulting in the use of security testing utilities such as Microsoft Baseline Security Analyzer and GFI LANguard for economically running a set of automatic system auditing checks to uncover potential security weaknesses. Progent has broad experience with other network auditing tools such as NMAP, AMAP, eEye, as well as utilities like Metasploit Framework, Netcat, Socat, and Nikto. Progent can show you how to understand audit reports and react effectively.

Progent can show you how to build security into your company operations, install scanning software, plan and implement a protected system architecture, and recommend policies to optimize the security of your IT system. Progent's security professionals are ready to show you how to set up a firewall, implement secure remote connectivity to email and business applications, and install virtual private network. Find out additional information on Progent's automated security analysis.

Security Inventory Bundles for Small Businesses
Progent offers two low-cost security inventory service bundles designed to enable small businesses to get an objective security evaluation from an accredited security consultant. With Progent's External Security Inventory Checkup, a security engineer administers a comprehensive examination of your IT infrastructure from outside your firewall to uncover possible weaknesses in the security posture you expose to the public. With Progent's Internal Network Security Inventory Scan, a certified security professional executes a network scan from a secure machine inside your company firewall to determine vulnerabilities to internal assaults. The two security inventory packages are set up and run from a secured external location. The process is directed by an engineer who has earned high-level security credentials and who generates a document that details and interprets the data collected by the security scan and suggests practical remediation where appropriate.

Stealth Penetration Analysis Support Services
Stealth intrusion checking is an important part of any successful network security strategy. Progentís security experts can run extensive penetration checks without the knowledge of your company's internal IT resources. Stealth penetration testing uncovers whether current security defense tools such as intrusion detection warnings and event log monitoring are correctly set up and actively monitored. Find out additional information about Progent's network security penetration testing support services.

Firewall and Virtual Private Network Solutions
Progent's expertise in network security solutions encompasses in-depth field work with major firewalls and Virtual Private Network (VPN) products offered by a variety of companies including Cisco, Microsoft, and Juniper. Progent offers the services of consultants with key networking accreditations such as CCIE and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Integration and Troubleshooting
The latest generation of Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services provide substantially more value than Cisco's earlier PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX firewalls for all new deployments. Following Cisco's purchase of Sourcefire, the whole line of Cisco ASA 5500-X devices can be provisioned to enable Firepower Services, based on Sourcefire's Snort technology, which is the world's most popular network intrusion protection system. Firepower services provide powerful new features such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-qualified CCIE network consultants can help you to maintain your existing PIX or ASA 5500 firewalls and migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite help with ASA 5500-X firewalls with Firepower Services and can assist you to plan, configure, tune, manage and debug firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. Learn more information about ASA 5500-X Firewalls with Firepower Services integration and debugging services.

Cisco Network Security and VPN Consulting Services
Cisco's network security and offsite connection technology provide a comprehensive range of easy-to-administer security products to help safeguard your local and remote information system. Cisco's Virtual Private Network product family includes switches, firewalls, intrusion detection systems and Virtual Private Network concentrators. Progent's expert staff of consultants includes experienced engineers with Cisco Certified Internetwork Expert and Cisco Certified Network Professional certifications who can assist your business to evaluate Cisco VPN, Cisco RADIUS Security, and additional Cisco security solutions that align best with your business goals. Find out additional details concerning Progent's Consulting Expertise for Cisco Security Technology and VPN Products.

Consulting Services for Other Firewall and Virtual Private Network Technology
Progent offers small and medium size organizations expert support for Intrusion Protection Systems and IPsec VPN technology from major firewall and VPN security vendors such as WatchGuard, Juniper Networks, and SonicWALL. Progent can help you create a detailed security strategy and select appropriate technologies from a variety of vendors to support your security goals while sticking within your budget limits.

Certified Network Security Planning
Every company ought to have a carefully considered security strategy that includes both pre-attack processes and response plans. The pre-attack plan is a set of procedures that help to reduce security weaknesses. The reactive strategy helps your IT security engineers to assess the impact resulting from a security penetration, fix the network, document the experience, and get the IT network running as rapidly as feasible.

Progent's expert information security consultants can to help you to perform a full vulnerability assessment and create a company-wide security plan to establish security policies and mechanisms to minimize future attacks and dangers.

CISM Qualified System Security Consulting Services
The Certified Information Security Manager (CISM) organization describes the core capabilities and international standards of skill that IT security managers are expected to learn. CISM gives executive management the assurance that those who have qualified for their CISM certification possess the experience and capability to provide efficient security administration and consulting services. Progent can provide the services of CISM certified security professionals to help companies with:

  • IS Security Governance
  • Risk Analysis
  • Network Security Implementation Management
  • IS Security Administration
  • Response Planning
Read additional information about Progent's CISM IS Security Engineering Professionals.

CISSP Accredited Security Consulting Support
The CISSP credential denotes mastery of an international standard for network security. ANSI has awarded the CISSP credential accreditation in the area of data protection stipulated by ISO 17024. Progent can provide access to of security consultants who have qualified for CISSP certification. Progent can provide a CISSP-certified consultant to help your enterprise in a broad range of security fields including:

  • Security Administration Procedures
  • Security Infrastructure and Paradigms
  • Access Management Solutions and Processes
  • Applications Development Security
  • Secure Operations
  • Physical Security
  • Cryptography Mechanisms
  • Telecommunications, Network and Internet Security
  • Disaster Recovery Preparedness
Learn additional information concerning Progent's CISSP Qualified Security Engineering Professionals.

ISSAP Accredited Secure Network Architecture Consulting Assistance
Progent's ISSAP qualified information system architecture engineers are experts who have been awarded ISSAP status through thorough testing and significant experience with network security design. The Information System Security Architecture Professional (ISSAP) credential represents demonstrated competence in the more challenging demands of IS security architecture bounded by the wider field of information system security knowledge needed for CISSP certification. Progent's ISSAP-certified security experts can assist your business with all phases of architecture security such as.

  • Access Control Systems and Techniques
  • Telecommunications and System Infrastructure Protection
  • Encryption/Decryption Options
  • Needs Evaluation and Security Standards
  • Business Continuity Planning (BCP) and Disaster Recovery Planning
  • Physical Security
Find out additional details concerning Progent's ISSAP Certified Secure IT Architecture Consulting Professionals.

CISA Qualified IS Security Auditing Engineering Services
The CISA credential is a recognized achievement that represents mastery in IS security audit and control. Accredited by the American National Standards Institute (ANSI), the CISA accreditation requires that consultants undergo an extensive examination administered by the ISACA professional group. Progent's CISA-certified IS security audit experts can assist your business with:

  • Information Systems Audit Services
  • Information Technology Enforcement
  • Systems and Infrastructure Lifecycle
  • IT Support
  • Safeguarding Information Resources
  • Disaster Recovery Planning
Read additional details about Progent's CISA Accredited Network Security Auditing Engineering Support.

Certified in Risk and Information Systems Control (CRISC) Consultants
The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA in 2010 to verify an IT professional's skills to design, deploy, and support IS controls to reduce network risk. Progent can provide the expertise of a CRISC-certified engineer to assist your company to develop and carry out a workplace continuity or disaster recovery plan based on industry best practices identified by CRISC and geared to match your organization's risk tolerance, business objectives, and budgetary guidelines. Progent's CRISC-certified IT risk management specialists can provide a range of risk assessment services including:

  • Collect information and study documentation to identify significant vulnerabilities
  • Identify legal, industry, and contractual mandates and company standards associated with your network to assess their potential influence on your strategic objectives
  • Identify possible vulnerabilities for your operational workflows to help in analyzing your corporate risk
  • Create a risk awareness initiative and conduct seminars to ensure your stakeholders understand information system risk so they can contribute to your risk control program
  • Connect key risk scenarios to related operational processes to help assign risk ownership
  • Determine risk appetite with your senior leadership and key stakeholders to make sure they are in agreement
Read the details about Progent's Certified in Risk and Information Systems Control (CRISC) Experts.

GIAC Accredited Network Security Engineering Support
GIAC was established in 1999 to certify the skill of computer security engineers. GIAC's mission is to assure that a certified security consultant possesses the skills needed to provide support in critical categories of network, data, and program security. GIAC accreditations are acknowledged by companies and institutions throughout the world including and the United States National Security Agency (NSA). Progent's GIAC-qualified network security audit experts are available to help your IT organization with:

  • Auditing Networks
  • Incident Response
  • Intrusion Detection
  • Web Services Security
  • SIEM solutions
Find out additional information about Progent's GIAC Information Assurance Services.

Contact a Certified Progent Security Expert
To find out how you can get in touch with a Progent security engineer for remote or on-premises help in Washington, phone 1-800-993-9400 or visit Remote Computer Support.














© 2002- 2017 Progent Corporation. All rights reserved.