Business networks in the state of Washington can depend on quick and economical online technical support from Progent's certified security experts to fix urgent security issues. The cost is reasonable, billing is per minute, sign-up is quick, and support is unbeatable. Progent also provides assistance for long-term projects that demand the services of senior security engineers with high-level security credentials.

If your Washington company is located away from major urban neighborhoods such as Seattle, Spokane, Tacoma, Bellevue, or Vancouver, the availability of local accredited security professionals may be problematic during a crisis. This could mean a drop in productivity for your business, angry clients, idle workers, and distracted executives. By calling Progent's online services, you can get in touch with a certified security engineer ready to offer assistance whenever you need it to get your network operating and restore your data.

Progent can help you in a variety of ways in your initiatives to defend your information system with support services that ranges from network security checks to creating a comprehensive security strategy. Progent offers economical support to help businesses of all sizes to design and maintain secure IT environments based on Microsoft Windows and Cisco technology and that may include computers running UNIX or Linux operating systems plus BYOD clients with Apple iOS iPhones and iPads or Google Android or Windows Phone smart phones and tablets.

Progent can also assist you to outsource spam filtering and protection from email-borne assaults. Email Guard is Progent's email filtering and encryption platform that uses the technology of leading data security vendors to provide web-based management and world-class protection for your inbound and outbound email. The hybrid structure of Email Guard managed service integrates a Cloud Protection Layer with a local security gateway device to provide advanced defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-based malware. ProSight Email Guard's Cloud Protection Layer serves as a preliminary barricade and blocks the vast majority of unwanted email from making it to your security perimeter. This reduces your vulnerability to inbound threats and saves network bandwidth and storage. ProSight Email Guard's onsite security gateway appliance provides a deeper layer of inspection for inbound email. For outgoing email, the onsite security gateway offers AV and anti-spam filtering, protection against data leaks, and email encryption. The onsite gateway can also help Exchange Server to monitor and protect internal email traffic that stays inside your security perimeter.

Progent's certified engineers are available remotely or on premises to offer a variety of emergency or project-based network security services such as:

If your company has an emergency need for computer security help, refer to Progent's Urgent Remote Technical Help.

Progent's support professionals can deliver world-class support in key fields of computer security including security evaluation, firewall and VPN solutions, and advanced security consulting.

System Security Evaluation
Progent's expert security consultants can evaluate the strength of your current computer protection implementation through exhaustive remote automated analysis based on advanced utilities and proven procedures. Progent's experience in this testing saves you time and money and assures a detailed picture of security holes. The information your business is provided can make up the basis of a security strategy that will permit your network to run safely and adapt quickly to new risks.

Automated Security Audits
Progent provides expertise in the use of security testing packages including Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard Network Security Scanner for affordably running a set of programmed system auditing scans to identify possible security problems. Progent has broad experience with other network auditing products such as NMAP, AMAP Application Scanner, eEye, plus utilities such as Metasploit, Netcat, Hydra, and Nikto. Progent can help you to understand testing reports and respond effectively.

Progent can help you build security into your company operations, install scanning tools, define and deploy a protected network environment, and suggest procedures to optimize the security of your IT system. Progent's security professionals are available to assist you to configure a firewall, design safe remote connectivity to email and data, and install virtual private network. Learn additional information on Progent's network security evaluation.

Security Inventory Scanning Packages for Small Companies
Progent has put together two low-cost security inventory and evaluation bundles intended to enable small companies to get a professional security assessment from a qualified security specialist. With Progent's External Security Inventory Checkup, an engineer runs a comprehensive test of your IT infrastructure from outside your firewall to determine potential risks in the security profile you expose to the public. With Progent's Internal Security Inventory Scan, an engineer executes a network scan from an authorized computer inside your company firewall to uncover the risk to inside assaults. The two security inventory services are configured and executed from a secured external site. The project is overseen by a consultant with high-level security credentials and who produces a document that details and interprets the data collected by the scan and suggests cost-effective improvements if appropriate.

Stealth Penetration Testing Consulting
Stealth penetration testing is an important part of any comprehensive IT system security plan. Progentís security experts can run thorough penetration tests without the knowledge of your organization's internal IT resources. Unannounced penetration checking shows whether current security defense systems such as intrusion incident warnings and event history monitoring are correctly set up and actively monitored. Learn more on Progent's stealth security penetration analysis consulting.

Firewalls and VPN Support
Progent's expertise in network security technology includes extensive familiarity with leading firewalls and VPN technology from a variety of vendors including Cisco, Microsoft, and Juniper. Progent can provide the support of consultants with key industry accreditations such as CCIE and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Configuration and Troubleshooting
The new Cisco ASA 5500-X Series of firewalls with Firepower Services deliver significantly more bang for the buck than Cisco's previous PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX firewalls for new deployments. After Cisco's acquisition of Sourcefire, the entire family of Cisco ASA 5500-X devices can be provisioned to support Firepower Services, built on Sourcefire's Snort product, which is the world's most deployed intrusion protection system (IPS). Firepower services provide enhanced features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-certified CCIE network consultants can help your company to manage your current PIX or Cisco ASA 5500 firewalls and upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite support for ASA 5500-X firewalls with Firepower Services and can help your business to plan, deploy, tune, manage and debug firewall solutions based on Cisco ASA 5500-X firewalls with Firepower Services. See additional details about ASA 5500-X Firewalls with Firepower Services integration and debugging services.

Cisco Security and Virtual Private Network Support Services
Cisco's security and offsite connection products provide a comprehensive range of manageable security solutions to help protect your local and remote network infrastructure. Cisco's Virtual Private Network line includes routers, firewalls, intrusion detection systems and Virtual Private Network concentrators. Progent's professional staff of consultants includes field-proven engineers with Cisco's CCIE and Cisco Certified Network Professional certifications who can help your business to select Cisco VPN, Cisco RADIUS Security, and other Cisco security solutions that align most closely with your business objectives. Learn more information concerning Progent's Engineering Expertise for Cisco Security Technology and Virtual Private Network Appliances.

Support Services for Other Firewall and VPN Products
Progent provides small and medium size organizations expert consulting for Intrusion Protection products and IPsec VPN technology from leading firewall and VPN security companies such as WatchGuard, Juniper, and Symantec. Progent can show you how to design a comprehensive security strategy and choose the right technologies from multiple suppliers to achieve your security objectives while sticking within your spending limits.

Progent's Low-Cost Managed Services for Information Security
Progent's value-priced ProSight family of network monitoring and management services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance. Managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that utilizes next generation behavior-based machine learning technology to guard endpoints and servers and VMs against modern malware attacks such as ransomware and email phishing, which easily get by legacy signature-based AV products. ProSight ASM protects local and cloud resources and offers a single platform to address the entire malware attack progression including filtering, identification, mitigation, cleanup, and forensics. Top capabilities include single-click rollback with Windows Volume Shadow Copy Service and automatic system-wide immunization against new threats. Find out more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense.

ProSight Enhanced Security Protection (ESP): Unified Endpoint Protection
Progent's ProSight Enhanced Security Protection managed services offer ultra-affordable in-depth security for physical servers and virtual machines, workstations, smartphones, and Exchange Server. ProSight ESP utilizes contextual security and modern behavior analysis for continuously monitoring and responding to security assaults from all vectors. ProSight ESP provides two-way firewall protection, intrusion alerts, device management, and web filtering via cutting-edge tools packaged within a single agent accessible from a single console. Progent's security and virtualization experts can help you to design and implement a ProSight ESP deployment that addresses your organization's unique needs and that helps you prove compliance with government and industry information protection standards. Progent will help you specify and configure security policies that ProSight ESP will enforce, and Progent will monitor your network and respond to alarms that require urgent action. Progent's consultants can also assist your company to set up and verify a backup and restore solution like ProSight Data Protection Services (DPS) so you can recover quickly from a destructive security attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint security and Microsoft Exchange email filtering.

ProSight DPS: Managed Backup and Recovery
ProSight Data Protection Services provide small and mid-sized organizations a low cost end-to-end solution for secure backup/disaster recovery. Available at a low monthly cost, ProSight Data Protection Services automates your backup activities and enables rapid restoration of vital files, applications and VMs that have become unavailable or damaged due to component failures, software bugs, natural disasters, human mistakes, or malicious attacks like ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, applications, system images, plus Microsoft Hyper-V and VMware images. Critical data can be protected on the cloud, to a local storage device, or to both. Progent's cloud backup consultants can provide advanced support to set up ProSight DPS to to comply with government and industry regulatory standards like HIPPA, FIRPA, and PCI and, when needed, can help you to restore your critical information. Read more about ProSight DPS Managed Backup.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering service that uses the technology of top information security vendors to provide web-based control and comprehensive protection for all your email traffic. The hybrid architecture of Progent's Email Guard managed service integrates cloud-based filtering with an on-premises gateway device to provide advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. The cloud filter acts as a first line of defense and blocks most threats from making it to your network firewall. This reduces your exposure to inbound threats and saves network bandwidth and storage. Email Guard's on-premises security gateway appliance provides a further level of analysis for incoming email. For outgoing email, the local security gateway provides AV and anti-spam protection, protection against data leaks, and email encryption. The local gateway can also help Exchange Server to monitor and safeguard internal email traffic that stays within your security perimeter. For more details, see ProSight Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small business can have its key servers and apps hosted in a secure fault tolerant data center on a fast virtual host configured and managed by Progent's network support professionals. With the ProSight Virtual Hosting model, the customer retains ownership of the data, the operating system software, and the apps. Because the environment is virtualized, it can be ported easily to a different hardware environment without a lengthy and technically risky configuration process. With ProSight Virtual Hosting, your business is not tied one hosting service. Find out more details about ProSight Virtual Hosting services.

ProSight IT Asset Management: Infrastructure Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, update, find and safeguard information related to your network infrastructure, processes, business apps, and services. You can instantly find passwords or IP addresses and be alerted about upcoming expirations of SSLs ,domains or warranties. By updating and organizing your IT documentation, you can save as much as 50% of time thrown away trying to find vital information about your IT network. ProSight IT Asset Management features a common repository for holding and collaborating on all documents required for managing your network infrastructure like recommended procedures and How-To's. ProSight IT Asset Management also offers advanced automation for gathering and relating IT information. Whether youíre making enhancements, performing maintenance, or responding to a crisis, ProSight IT Asset Management delivers the data you need when you need it. Find out more details about ProSight IT Asset Management service.

Expert Security Planning
Every business ought to have a thoroughly thought out security program that includes both proactive processes and response planning. The proactive strategy is a collection of procedures designed to minimize vulnerabilities. The reactive plan helps your IT security personnel to evaluate the impact resulting from a security penetration, fix the system, record the event, and get the IT network running as rapidly as possible.

Progent's expert IT security engineers are available to help your company to perform a comprehensive vulnerability evaluation and define a network security strategy to establish security policies and controls to reduce ongoing attacks and dangers.

CISM Accredited Information Security Engineering Expertise
The Certified Information Security Manager (CISM) organization describes the core competencies and global standards of skill that information security managers are required to learn. CISM provides business management the assurance that consultants who have qualified for their CISM credential possess the experience and capability to provide effective security management and consulting consulting. Progent offers the services of CISM certified security professionals to help companies with:

  • Information Security Governance
  • Vulnerability Management
  • Information Security Program Management
  • Information Security Administration
  • Recovery Planning
Read additional details concerning Progent's CISM Qualified Security Support Expertise.

CISSP Qualified Security Consulting Support
CISSP recognizes expertise with a worldwide standard for information security. ANSI has awarded the CISSP credential accreditation in the area of data protection stipulated by ISO 17024. Progent offers access to of security professionals who have earned CISSP accreditation. Progent can provide a CISSP-certified expert to help your company in a variety security areas including:

  • Security Administration Procedures
  • Security Architecture and Paradigms
  • Access Control Solutions and Methodology
  • Applications Development Security
  • Secure Operations
  • Site Security
  • Cryptography Mechanisms
  • Telecom, Network and WAN Security
  • Business Continuity Planning
Learn more information concerning Progent's CISSP Accredited Information Security Consulting Professionals.

CISSP-ISSAP Qualified Secure IT Architecture Engineering Services
Progent's CISSP-ISSAP certified system architecture engineers are consultants who have been awarded ISSAP status through thorough testing and extensive work with network security design. The ISSAP credential indicates proven competence in the more in-depth demands of IS security architecture within the wider field of information system security expertise needed for CISSP certification. Progent's ISSAP-qualified security experts can help your business with all aspects of secure network architecture such as.

  • Access Control Systems and Methodologies
  • Telecommunications and Network Protection
  • Data Encryption Options
  • Requirements Evaluation and Security Guidelines
  • Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)
  • Physical Security
Find out additional information about Progent's ISSAP Accredited Secure IT Architecture Consulting Services.

CISA Qualified Information System Security Auditing Engineering Services
The Certified Information Systems Auditor (CISA) accreditation is a prestigious qualification that represents expertise in IS security audit and control. Accredited by the American National Standards Institute, the CISA credential has candidates pass an extensive examination administered by the ISACA international professional association. Progent's CISA-qualified network security audit specialists are available to assist your IT organization in the areas of:

  • IS Audit Services
  • Information Technology Governance
  • Network Assets and Architecture Lifecycle Planning
  • Information Technology Support
  • Safeguarding Data Resources
  • Disaster Recovery Preparedness
Read additional information about Progent's CISA Certified Network Security Auditing Engineering Support.

CRISC Consultants
The CRISC certification program was established by ISACA in 2010 to verify an IT professional's skills to plan, deploy, and support information system controls to reduce network risk. Progent can provide the services of a CRISC-certified consultant to help you to create and carry out a workplace continuity or disaster recovery strategy based on industry best practices identified by CRISC and crafted to match your organization's risk tolerance, business objectives, and IT budget. Progent's CRISC-certified network risk management consultants can provide a range of risk evaluation services including:

  • Gather information and review documentation to identify major vulnerabilities
  • Inventory legal, industry, and business mandates and organizational standards related to your information system to assess their potential impact on your business objectives
  • Point out potential threats for your operational processes to assist in evaluating your enterprise risk
  • Develop a risk awareness initiative and provide seminars to make sure your stakeholders appreciate information system risk so they can assist with your risk management process
  • Connect identified risk scenarios to your associated operational procedures to help assign risk responsibility
  • Validate risk appetite with executive management and major stakeholders to make sure they match
Find out more details about Progent's CRISC Risk Management Consultants.

GIAC Accredited Security Engineering Services
GIAC (Global Information Assurance Certification) was founded in 1999 to validate the knowledge of information technology security engineers. GIAC's goal is to verify that a certified professional has the skills needed to deliver support in key categories of system, information, and program security. GIAC certifications are recognized by businesses and institutions throughout the world including and the United States National Security Agency. Progent's GIAC-certified security audit consultants can assist your business in the areas of:

Find out additional details concerning Progent's GIAC Information Assurance Services.

Talk to a Security Specialist
To learn how to contact a certified security consultant for online or on-premises assistance in Washington, phone 1-800-993-9400 or visit Online Network Help.

© 2002- 2019 Progent Corporation. All rights reserved.