Company information networks in the state of Washington can depend on quick and affordable remote access to Progent's qualified network security consultants to assist with complex security problems. The cost is competitive, billing is by the minute, sign-up is immediate, and support is world class. Progent also provides assistance for complex engagements that demand the expertise of senior security engineers with high-level industry credentials.

If your Washington organization is situated away from more populated metropolitan areas such as Seattle, Spokane, Tacoma, Bellevue, or Vancouver, access to nearby accredited security consultants could be problematic when you have a security disaster. This could mean a drop in revenue for your company, angry clients, idle workers, and distracted executives. By contacting Progent's remote support, you have access to a qualified security professional who can deliver assistance whenever you have to have it to keep your computer network on line and recover your information.

Progent can help you in your initiatives to defend your IT environment with services that can range from security audits to developing a company-wide security strategy. Progent offers affordable support to assist small and midsize companies to set up and maintain protected IT environments based on Windows and Cisco products and that may include servers and desktops based on UNIX, Linux, Sun Solaris, or Mac OS X platforms as well as BYOD clients with Apple iOS handhelds or Android or Windows Phone smart phones and tablets.

Progent can also show you how to outsource spam filtering and defense against e-mail-based security threats. Email Guard is Progent's email security solution that uses the services and infrastructure of leading data security vendors to deliver web-based management and comprehensive protection for all your email traffic. The powerful structure of Email Guard combines cloud-based filtering with an on-premises security gateway appliance to offer advanced protection against spam, viruses, Dos Attacks, DHAs, and other email-based threats. The cloud filter serves as a preliminary barricade and keeps most unwanted email from making it to your security perimeter. This decreases your vulnerability to external attacks and conserves system bandwidth and storage space. Email Guard's on-premises security gateway appliance adds a deeper level of inspection for incoming email. For outbound email, the on-premises gateway offers AV and anti-spam protection, DLP, and email encryption. The local security gateway can also enable Microsoft Exchange Server to monitor and safeguard internal email traffic that stays within your security perimeter.

Progent's security professionals are accessible remotely or in person to offer a range of emergency or project-based computer security services including:

  • Run extensive security audits
  • Recuperate promptly after virus and worm attacks
  • Configure and troubleshoot firewalls
  • Implement secure methods for offsite and mobile access
  • Deploy effective software for protection against spam and directory harvest attacks
  • Develop a company-wide security plan with 24x7 monitoring
  • Provide comprehensive Call Center Services
  • Develop a practical backup and recovery strategy built around Microsoft DPM backup/restore capability
If your business has an urgent requirement for IT security help, refer to Progent's Emergency Online Network Support.

Progent's consultants offer advanced services in vital facets of computer protection including analysis, firewall/VPN support, and advanced security consulting.

Security Assessment
Progent's expert security consultants can assess the vulnerability of your existing computer protection systems by performing comprehensive remote automated analysis via advanced software tools and tested techniques. Progent's experience in this testing saves your company money and offers an objective picture of system vulnerability. The information your company is provided can be used as the basis of a security strategy that can permit your network to operate dependably and respond rapidly to new risks.

Automated Network Vulnerability Audits
Progent offers expertise in the use of security evaluation products including Microsoft Baseline Security Analyzer and GFI LANguard Network Security Scanner for economically performing a set of programmed network testing scans to uncover potential security problems. Progent has broad experience with additional security analysis utilities such as NMAP Port Scanner, AMAP, eEye, plus utilities such as Metasploit Framework, Netcat, Socat, and Nikto. Progent can show you how to make sense of audit reports and react appropriately.

Progent can show you how to design protection into your company processes, configure auditing applications, plan and deploy a protected system architecture, and recommend procedures to maximize the security of your network. Progent's security professionals are available to assist you to configure a firewall, design secure remote access to email and business applications, and install virtual private network. Learn more about Progent's network security assessment.

Security Inventory Packages for Small Companies
Progent offers two ultra-affordable security inventory scanning packages intended to allow small companies to get an independent security evaluation from a certified security engineer. With Progent's External Security Inventory Scan, an engineer runs an extensive test of your network from beyond your firewall to determine potential risks in the security posture you expose to the outside world. With Progent's Internal Network Security Inventory Scan, a security expert executes a system scan from a secure computer inside your company firewall to evaluate vulnerabilities to inside assaults. The two security inventory packages are configured and run from a secured remote location. The process is managed by an engineer who has earned high-level security credentials and who produces a document that details and analyzes the information collected by the scan and proposes cost-effective improvements where called for.

Network Intrusion Analysis Support Services
Stealth intrusion testing is an important part of any successful IT system security strategy. Progentís security professionals can perform thorough intrusion tests without the knowledge of your organization's in-house network support resources. Unannounced penetration testing uncovers whether existing security monitoring tools such as intrusion incident warnings and event history analysis are properly set up and consistently checked. Learn additional information about Progent's network penetration analysis consulting.

Firewall and Virtual Private Network Expertise
Progent's background in security technology encompasses in-depth field work with leading firewalls and VPN technology from a variety of vendors such as Cisco, Microsoft, and Juniper. Progent can provide the support of engineers who have earned key industry certifications including Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Configuration and Troubleshooting
The latest generation of ASA 5500-X Family of firewalls with Firepower Services provide significantly more performance than Cisco's previous firewalls and have replaced the ASA 5500 and PIX security appliances for new deployments. Following Cisco's acquisition of Sourcefire, the entire line of ASA 5500-X firewalls can be configured to enable Firepower Services, built on Sourcefire's Snort product, which is the world's most deployed network intrusion protection system. Firepower services provide enhanced capabilities including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-certified CCIE network experts can help you to maintain your legacy PIX or Cisco ASA 5500 security appliances and upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and onsite help with ASA 5500-X firewalls with Firepower Services and can help your business to design, deploy, optimize, administer and debug firewall solutions based on Cisco ASA 5500-X firewalls with Firepower Services. See additional details about Cisco ASA 5500-X Firewalls with Firepower configuration and troubleshooting support.

Cisco Network Security and Virtual Private Network Consulting Services
Cisco's security and offsite access technology represent a complete range of easy-to-administer security solutions to help protect your wired and wireless information system. Cisco's Virtual Private Network product family features switches, firewalls, intrusion detection systems and VPN appliances. Progent's professional staff of consultants includes field-proven engineers with Cisco Certified Internetwork Expert and CCNP certifications who are able to assist your company to evaluate Cisco VPN, Cisco RADIUS Security, and other Cisco security solutions that align most closely with your business objectives. Find out more details about Progent's Consulting Services for Cisco Security Technology and Virtual Private Network Products.

Engineering Services for Other Firewall and VPN Technology
Progent offers small and medium size organizations professional support for Intrusion Protection Systems and IPsec VPN technology from major firewall and VPN security vendors including Check Point Software, Juniper, and SonicWALL. Progent can show you how to create a detailed security plan and select appropriate products from multiple vendors to support your security goals while sticking within your spending limits.

Progent's Fixed-price Managed Services for Information Assurance
Progent offers a portfolio of low-cost, set-price monthly services designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance. Managed services offered by Progent include:
Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
Email Guard is Progent's email filtering and encryption platform that incorporates the technology of leading data security vendors to provide web-based management and comprehensive security for your inbound and outbound email. The powerful architecture of Progent's Email Guard managed service combines cloud-based filtering with a local security gateway appliance to provide complete protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-based threats. The cloud filter serves as a first line of defense and keeps the vast majority of threats from making it to your network firewall. This decreases your vulnerability to inbound threats and conserves system bandwidth and storage. Email Guard's on-premises security gateway appliance adds a deeper level of analysis for incoming email. For outgoing email, the on-premises gateway offers AV and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The onsite gateway can also help Microsoft Exchange Server to monitor and protect internal email that stays inside your corporate firewall. Find out more about Progent's Email Guard Spam Filtering, Virus Defense, Content Filtering and Data Loss Prevention.

ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection service that incorporates cutting edge behavior-based machine learning tools to defend endpoints and physical and virtual servers against new malware attacks such as ransomware and file-less exploits, which routinely evade legacy signature-based AV tools. ProSight ASM safeguards on-premises and cloud-based resources and offers a single platform to manage the entire malware attack progression including blocking, identification, mitigation, cleanup, and forensics. Key capabilities include single-click rollback using Windows VSS and automatic system-wide immunization against new attacks. Read more about Progent's ProSight Active Security Monitoring Next-Generation Endpoint Protection and Ransomware Recovery.

ProSight DPS: Managed Cloud Backup and Recovery
ProSight Data Protection Services provide small and mid-sized businesses a low cost end-to-end service for reliable backup/disaster recovery (BDR). Available at a fixed monthly price, ProSight Data Protection Services automates and monitors your backup processes and enables rapid recovery of critical files, applications and virtual machines that have become unavailable or corrupted as a result of hardware breakdowns, software bugs, natural disasters, human mistakes, or malicious attacks such as ransomware. ProSight Data Protection Services can help you protect, recover and restore files, folders, apps, system images, as well as Hyper-V and VMware images. Important data can be protected on the cloud, to a local storage device, or mirrored to both. Progent's cloud backup specialists can provide advanced expertise to set up ProSight DPS to be compliant with government and industry regulatory requirements like IPPA, FIRPA, and PCI and, when needed, can assist you to recover your business-critical data. Learn more about ProSight Data Protection Services Managed Cloud Backup.

Certified Network Security Design
Every company ought to have a thoroughly thought out security program that incorporates both preventive procedures and response planning. The pre-attack plan is a set of procedures intended to reduce security weaknesses. The post-attack plan assists your IT security personnel to assess the impact caused by an attack, fix the damage, document the event, and get business functions running as soon as possible.

Progent's certified IT security consultants are available to help your company to perform a complete risk evaluation and create a company-wide security plan to establish security processes and controls to reduce ongoing attacks and dangers.

CISM Certified System Security Consulting Services
The Certified Information Security Manager (CISM) organization describes the core capabilities and international standards of skill that information security professionals are expected to master. CISM gives business management the assurance that consultants who have qualified for their CISM certification possess the experience and knowledge to provide efficient security management and consulting services. Progent can provide the expertise of CISM qualified security professionals to help businesses with:

  • Network Security Strategies
  • Vulnerability Management
  • Network Security Implementation Management
  • Information Security Administration
  • Response Management
Read more information concerning Progent's CISM Qualified Network Security Consulting Professionals.

CISSP Qualified Security Engineering Support
The CISSP credential denotes expertise with an international standard for information security. ANSI (American National Standards Institute) has granted the CISSP credential recognition in the field of data protection under ISO 17024. Progent offers the services of security professionals who have qualified for CISSP accreditation. Progent can provide a CISSP-certified expert to help your business in a broad range of security fields such as:

  • Security Administration Procedures
  • Security Architecture and Paradigms
  • Access Management Systems and Processes
  • Applications Development Security
  • Secure Operations
  • Physical Security
  • Data Encryption Technology
  • Telecommunications, Network and WAN Security
  • Business Continuity Planning
Learn more information about Progent's CISSP-certified Security Consulting Services.

ISSAP Accredited Secure System Architecture Consulting Assistance
Progent's ISSAP qualified information system architecture engineers are experts who have earned ISSAP Certification as a result of thorough testing and extensive experience with information security architecture. The Information System Security Architecture Professional (ISSAP) certification represents demonstrated skill in the most challenging demands of information security architecture bounded by the broader field of IS security knowledge needed for CISSP certification. Progent's ISSAP-certified security experts can assist your company with all phases of secure network architecture including.

  • Access Management Systems and Methodologies
  • Phone System and System Infrastructure Protection
  • Cryptography Solutions
  • Requirements Analysis and Security Criteria
  • Business Continuity Planning (BCP) and DRP
  • Physical Security
Learn more details concerning Progent's ISSAP Certified Secure IT Architecture Consulting Expertise.

CISA Accredited Network Security Auditing Engineering Services
The Certified Information Systems Auditor accreditation is a prestigious achievement that indicates mastery in information system security auditing. Certified by the American National Standards Institute, the CISA accreditation has consultants pass an extensive examination administered by the ISACA professional association. Progent's CISA-qualified IS security audit experts are available to help your company in the areas of:

  • IS Audit Services
  • IT Administration
  • Systems and Architecture Planned Useful Life
  • Information Technology Service Delivery
  • Safeguarding Information Resources
  • Business Continuity Planning
Find out additional information concerning Progent's CISA Accredited IS Security Auditing Engineering Expertise.

CRISC Experts
The Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA in 2010 to validate a consultant's skills to design, implement, and support information system control mechanisms to mitigate risk. Progent offers the expertise of a CRISC-certified engineer to assist you to create and carry out a business continuity or disaster recovery plan that follows industry best practices promoted by CRISC and geared to match your company's risk tolerance, business goals, and IT budget. Progent's CRISC-qualified network risk management engineers can provide a variety of risk assessment services including:

  • Collect information and study documentation to evaluate major risk scenarios
  • Inventory statutory, regulatory, and contractual requirements and company policies associated with your network to determine their potential influence on your business objectives
  • Identify potential threats for your business workflows to help in analyzing your enterprise risk
  • Develop a risk awareness initiative and provide seminars to ensure your organization understand information system risk so they can assist with your risk management program
  • Connect identified risk scenarios to related business processes to help assign risk ownership
  • Validate risk appetite with executive leadership and key stakeholders to ensure they match
Find out the details about Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Qualified Network Security Engineering Assistance
GIAC was established in 1999 to validate the skill of information technology security experts. GIAC's goal is to ensure that an accredited security consultant has the knowledge necessary to provide services in key categories of system, information, and software security. GIAC certifications are acknowledged by companies and institutions around the world including and the U.S. National Security Agency (NSA). Progent's GIAC-qualified network security audit consultants can help your company in the areas of:

Learn additional details concerning Progent's GIAC Information Assurance Expertise.

Get in Touch with a Security Expert
To see how to access a certified security consultant for online or onsite support in Washington, call 1-800-993-9400 or go to Remote Computer Support.














© 2002- 2017 Progent Corporation. All rights reserved.