Small business IT networks in the state of Washington now have prompt and economical online access to Progent's accredited security professionals to fix critical security problems. The cost is competitive, billing is per minute, sign-up is quick, and support is unbeatable. Progent also offers assistance for complex projects that demand the knowledge of seasoned security consultants with high-level security credentials.

In case your Washington company is based far from larger metropolitan neighborhoods including Seattle, Spokane, Tacoma, Bellevue, or Vancouver, support from local accredited security engineers is often limited when you have an urgent situation. This can result in lost income for your business, angry clients, unproductive employees, and defocused management. By calling Progent's remote support, you can get in touch with a qualified security professional who can offer assistance when you have to have it to get your information system running and salvage your information.

Progent can help you at any level in your efforts to defend your network with support services that can range from security checks to creating a company-wide security strategy. Progent provides affordable support to help small and midsize companies to configure and maintain secure networks powered by Windows and Cisco technology and that can include computers based on UNIX, Linux, Sun Solaris, or Mac OS X operating systems as well as BYOD clients with Apple handhelds or Google Android or Windows Phone smart phones and tablets.

Progent can also assist you to outsource spam filtering and protection from e-mail-based assaults. Email Guard is Progent's email security solution that incorporates the services and infrastructure of top data security companies to provide centralized control and world-class protection for your inbound and outbound email. The powerful structure of Progent's Email Guard managed service combines a Cloud Protection Layer with a local security gateway device to provide advanced defense against spam, viruses, Denial of Service Attacks, DHAs, and other email-based malware. The cloud filter acts as a preliminary barricade and keeps most unwanted email from reaching your security perimeter. This decreases your exposure to inbound attacks and conserves system bandwidth and storage. ProSight Email Guard's on-premises gateway device adds a deeper layer of inspection for incoming email. For outgoing email, the on-premises security gateway offers anti-virus and anti-spam protection, protection against data leaks, and encryption. The onsite security gateway can also help Exchange Server to monitor and safeguard internal email that originates and ends within your security perimeter.

Progent's certified engineers are available remotely or on premises to offer a variety of emergency or project-based network security services which include:

If your business has an emergency requirement for IT security support, go to Progent's Emergency Remote Technical Help.

Progent's support professionals provide advanced support in key facets of system protection that include security evaluation, firewalls and VPN, and advanced security planning.

System Security Evaluation
Progent's expert security consultants can assess the vulnerability of your current network protection environment through comprehensive remote automated analysis via sophisticated software tools and proven procedures. Progent's skill in administering this testing saves your company money and assures an objective picture of security holes. The information your business is provided can make up the basis of a network protection strategy that will allow your network to run safely and adapt quickly to future threats.

Automated Network Security Audits
Progent offers consulting in the application of security analysis packages such as Microsoft Baseline Security Analyzer and GFI LANguard NSS for economically performing a set of automatic network testing checks to uncover potential security gaps. Progent has broad knowledge of additional network analysis utilities such as NMAP Port Scanner, AMAP Application Scanner, eEye, plus tools like SolarWinds, Netcat, Socat, and Nikto. Progent can show you how to make sense of testing reports and react effectively.

Progent can show you how to build protection into your business processes, configure scanning tools, plan and implement a secure network environment, and suggest policies to maximize the security of your IT system. Progent's security consultants are ready to show you how to set up a firewall, implement safe remote access to email and business applications, and integrate virtual private network. Find out more about Progent's network security evaluation.

Security Inventory and Evaluation Packages for Small Companies
Progent has put together two ultra-affordable security inventory service bundles intended to enable small businesses to receive an objective security evaluation from an accredited security consultant. With Progent's External Network Security Inventory Checkup, a security expert administers an extensive test of your IT infrastructure from beyond your company firewall to uncover possible risks in the security profile you present to the outside world. With Progent's Internal Network Security Inventory Scan, a certified security professional executes a system scan from a secure computer inside your firewall to assess your exposure to inside assaults. The two security inventory packages are set up and executed from a secured external location. The process is overseen by an engineer who has earned top security accreditations and who generates a report that summarizes and interprets the data captured by the scan and suggests cost-effective improvements where called for.

Network Penetration Testing Support Services
Stealth penetration checking is a key part of any successful IT system security plan. Progentís security professionals can run extensive intrusion checks without the knowledge of your organization's internal network support resources. Unannounced penetration testing shows whether current security defense tools such as intrusion detection warnings and event history analysis are properly set up and consistently checked. Learn more about Progent's network penetration testing consulting.

Firewall And Virtual Private Network (VPN) Expertise
Progent's expertise in network security solutions includes extensive familiarity with leading firewalls and VPN technology from a variety of vendors such as Cisco, Microsoft, and CheckPoint. Progent offers the support of engineers with key networking accreditations such as Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Configuration and Troubleshooting
The current Cisco ASA 5500-X Series of firewalls with Firepower Services offer significantly more bang for the buck than Cisco's earlier firewalls and have superseded the ASA 5500 and PIX security appliances for all new installations. Since Cisco's acquisition of Sourcefire, the whole family of Cisco ASA 5500-X firewalls can be provisioned to support Firepower Services, built on Sourcefire's Snort product, which is the market's most popular intrusion protection system. Firepower services bring enhanced features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can help your company to manage your existing PIX or ASA 5500 firewalls and migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist your business to design, deploy, tune, administer and debug firewall environments built around Cisco ASA 5500-X firewalls with Firepower Services. Find out more information about Cisco ASA Firewalls with Firepower Services configuration and debugging services.

Cisco Security and VPN Consulting Services
Cisco's security and remote access products offer a complete line of manageable security products to help safeguard your wired and wireless network infrastructure. Cisco's VPN product family features routers, firewalls, intrusion detection devices and VPN concentrators. Progent's professional staff of consultants includes experienced engineers with Cisco's Certified Internetwork Expert and CCNP qualifications who can help your company to select Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security solutions that fit best with your company goals. Read additional information concerning Progent's Engineering Services for Cisco Security Solutions and Virtual Private Network Products.

Engineering Services for Other Firewall and VPN Solutions
Progent offers small and medium size companies expert consulting for Intrusion Protection products and IPsec VPN solutions from leading firewall and Virtual Private Network security vendors including WatchGuard, Juniper, and SonicWALL. Progent can help you create a comprehensive security plan and select appropriate products from a variety of suppliers to achieve your security objectives while sticking within your spending restraints.

Progent's Fixed-price Managed Services for Information Assurance
Progent's value-priced ProSight series of managed services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance. Managed services available from Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection service that utilizes next generation behavior analysis tools to guard endpoints as well as physical and virtual servers against new malware assaults like ransomware and email phishing, which easily evade legacy signature-matching anti-virus tools. ProSight ASM protects local and cloud-based resources and provides a unified platform to manage the complete threat progression including blocking, detection, containment, remediation, and forensics. Top capabilities include single-click rollback using Windows Volume Shadow Copy Service and automatic network-wide immunization against new threats. Find out more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.

ProSight Enhanced Security Protection (ESP): Unified Endpoint Security
ProSight Enhanced Security Protection (ESP) managed services offer ultra-affordable multi-layer protection for physical servers and virtual machines, desktops, smartphones, and Microsoft Exchange. ProSight ESP utilizes adaptive security and modern behavior analysis for continuously monitoring and reacting to cyber threats from all vectors. ProSight ESP delivers two-way firewall protection, intrusion alarms, endpoint management, and web filtering through leading-edge tools packaged within one agent accessible from a single control. Progent's security and virtualization experts can help you to design and implement a ProSight ESP deployment that meets your company's specific requirements and that helps you demonstrate compliance with legal and industry data security standards. Progent will assist you specify and configure policies that ProSight ESP will manage, and Progent will monitor your IT environment and respond to alerts that require immediate attention. Progent's consultants can also assist you to install and test a backup and restore solution such as ProSight Data Protection Services (DPS) so you can get back in business rapidly from a destructive cyber attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint security and Exchange email filtering.

ProSight DPS: Managed Cloud Backup and Recovery
ProSight Data Protection Services offer small and medium-sized organizations a low cost and fully managed service for secure backup/disaster recovery (BDR). For a fixed monthly cost, ProSight DPS automates your backup activities and allows rapid recovery of critical files, applications and virtual machines that have become lost or corrupted due to component breakdowns, software bugs, disasters, human mistakes, or malware attacks such as ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, apps, system images, as well as Microsoft Hyper-V and VMware virtual machine images. Important data can be protected on the cloud, to an on-promises device, or to both. Progent's backup and recovery consultants can deliver world-class support to set up ProSight Data Protection Services to be compliant with regulatory requirements like HIPPA, FIRPA, and PCI and, whenever needed, can assist you to recover your business-critical data. Find out more about ProSight Data Protection Services Managed Backup.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering service that incorporates the infrastructure of top data security vendors to deliver web-based control and comprehensive protection for all your email traffic. The powerful structure of Email Guard combines cloud-based filtering with a local security gateway device to offer advanced protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. The cloud filter serves as a preliminary barricade and blocks the vast majority of threats from making it to your network firewall. This decreases your exposure to external threats and saves network bandwidth and storage space. Email Guard's on-premises gateway appliance adds a deeper layer of analysis for inbound email. For outgoing email, the on-premises security gateway offers AV and anti-spam protection, protection against data leaks, and email encryption. The onsite gateway can also assist Exchange Server to track and protect internal email traffic that originates and ends inside your security perimeter. For more information, visit ProSight Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size organization can have its critical servers and applications hosted in a protected fault tolerant data center on a high-performance virtual host configured and managed by Progent's network support experts. With the ProSight Virtual Hosting service model, the customer retains ownership of the data, the OS platforms, and the apps. Because the environment is virtualized, it can be ported easily to a different hardware environment without requiring a lengthy and technically risky reinstallation process. With ProSight Virtual Hosting, your business is not tied a single hosting provider. Find out more details about ProSight Virtual Hosting services.

ProSight IT Asset Management: Network Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, maintain, find and protect information about your network infrastructure, procedures, business apps, and services. You can quickly locate passwords or serial numbers and be alerted about upcoming expirations of SSLs or warranties. By updating and managing your IT documentation, you can eliminate up to 50% of time wasted searching for critical information about your IT network. ProSight IT Asset Management includes a common location for storing and collaborating on all documents related to managing your network infrastructure such as recommended procedures and How-To's. ProSight IT Asset Management also supports advanced automation for collecting and associating IT information. Whether youíre planning improvements, doing regular maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the information you need as soon as you need it. Find out more about Progent's ProSight IT Asset Management service.

Expert Security Consulting
Every business should have a carefully thought out security program that incorporates both preventive processes and response planning. The pre-attack plan is a set of procedures intended to reduce vulnerabilities. The reactive strategy assists your security personnel to assess the impact resulting from an attack, fix the network, document the event, and get the IT network operational as rapidly as feasible.

Progent's expert IS security consultants can to assist your business to run a comprehensive vulnerability evaluation and create a computer security strategy to implement security processes and mechanisms to minimize future assaults and dangers.

CISM Accredited System Security Consulting Assistance
The CISM organization defines the core competencies and worldwide standards of performance that IT security managers are required to master. It provides business management the assurance that those who have qualified for their CISM certification have the background and capability to provide efficient security administration and support services. Progent can provide the support of CISM qualified security consultants to assist businesses with:

  • Network Security Processes
  • Risk Analysis
  • Information Security Implementation Management
  • Network Security Management
  • Recovery Planning
Find out additional information about Progent's CISM Security Consulting Services.

CISSP Certified Security Consulting Services
The CISSP credential recognizes expertise with a worldwide standard for information security. ANSI (American National Standards Institute) has granted the CISSP credential recognition in the area of data protection stipulated by ISO/IEC 17024. Progent offers the services of security experts who have qualified for CISSP accreditation. Progent can provide a CISSP-certified consultant to help your business in a broad range of security fields such as:

  • Security Management Procedures
  • Security Infrastructure and Models
  • Access Control Solutions and Processes
  • Software Development Security
  • Operations Security
  • Physical Security
  • Data Encryption Mechanisms
  • Telecommunications, Network and WAN Security
  • Disaster Recovery Planning
Learn more details concerning Progent's CISSP Accredited Information Security Engineering Services.

ISSAP Qualified Secure Network Architecture Consulting Support
Progent's ISSAP qualified system architecture engineers are consultants who have been awarded ISSAP status as a result of rigorous testing and significant experience with network security design. The ISSAP credential represents demonstrated competence in the most complex requirements of information system security architecture within the wider field of information security knowledge required for CISSP accreditation. Progent's ISSAP-certified security specialists can help your company with all phases of secure network architecture including.

  • Access Management Systems and Methodologies
  • Telecommunications and System Infrastructure Security
  • Data Encryption Options
  • Needs Analysis and Security Criteria
  • Business Continuity Planning and Disaster Recovery Planning (DRP)
  • Physical Security
Read more information about Progent's ISSAP Qualified Secure Information System Architecture Engineering Expertise.

CISA Certified IS Security Auditing Consulting Assistance
The Certified Information Systems Auditor (CISA) credential is a prestigious achievement that indicates expertise in information system security auditing. Accredited by the American National Standards Institute, the CISA credential requires that candidates pass an extensive examination given by the ISACA international professional group. Progent's CISA-qualified IS security audit consultants can help your business with:

  • Information Systems Audit Services
  • IT Enforcement
  • Network Assets and Infrastructure Lifecycle
  • IT Service Delivery
  • Protecting Information Resources
  • Business Continuity Planning
Learn additional information concerning Progent's CISA Certified Information System Security Auditing Consulting Assistance.

Certified in Risk and Information Systems Control (CRISC) Consultants
The Certified in Risk and Information Systems Control (CRISC) program was established by ISACA in 2010 to validate a consultant's ability to plan, deploy, and support IS control mechanisms to reduce network risk. Progent offers the services of a CRISC-certified consultant to assist your company to create and execute a workplace continuity strategy that follows industry best practices identified by CRISC and crafted to align with your company's risk appetite, business objectives, and IT budget. Progent's CRISC-certified network risk management engineers can provide a range of risk evaluation services including:

  • Collect information and study documentation to identify significant vulnerabilities
  • Inventory statutory, regulatory, and business requirements and company policies associated with your information system to determine their potential impact on your business goals
  • Point out potential vulnerabilities for your operational workflows to help in analyzing your enterprise risk
  • Develop a risk awareness program and conduct seminars to ensure your organization understand information system risk so they can assist with your risk management program
  • Match identified risk scenarios to your associated operational procedures to help determine risk responsibility
  • Validate risk tolerance with executive management and major stakeholders to make sure they are in agreement
Learn additional information concerning Progent's Certified in Risk and Information Systems Control (CRISC) Experts.

GIAC Certified Information System Security Engineering Services
Global Information Assurance Certification was founded in 1999 to validate the skill of IT security engineers. GIAC's mission is to ensure that a certified professional has the skills needed to provide support in vital categories of network, information, and program security. GIAC certifications are recognized by companies and institutions all over the world including and the U.S. National Security Agency (NSA). Progent's GIAC-certified security audit engineers can help your company in the areas of:

Learn additional details concerning Progent's GIAC Information Assurance Support.

Get in Touch with a Certified Progent Security Expert
To see how you can contact a security engineer for remote or onsite expertise in Washington, call 1-800-993-9400 or visit Remote Network Help.














© 2002- 2018 Progent Corporation. All rights reserved.