Business computer networks in the state of Washington can depend on quick and affordable online help from Progent's accredited security experts to help with the toughest security problems. Rates are reasonable, charges are per minute, engagement is fast, and support is world class. Progent also provides help for long-term engagements that demand the knowledge of senior security consultants with top industry credentials.

If your Washington company is located outside of more populated metropolitan neighborhoods including Seattle, Spokane, Tacoma, Bellevue, or Vancouver, the availability of local certified security professionals may be problematic when there's an urgent situation. This could mean a loss of revenue for your company, angry customers, idle workers, and defocused management. By utilizing Progent's remote support, you can get in touch with a certified security professional ready to offer assistance whenever you need it to keep your network running and restore your information.

Progent can assist you in all your efforts to guard your information system with support that ranges from network security audits to creating a comprehensive security plan. Progent provides affordable service to help businesses of all sizes to design and maintain safe networks powered by Microsoft Windows and Cisco products and that may include computers based on UNIX, Linux, Sun Solaris, or Mac OS X platforms plus mobile users with Apple handhelds or Google Android or Windows Phone handsets.

Progent can also show you how to outsource spam blocking and protection from email-borne security threats. Email Guard is Progent's email security solution that uses the technology of top data security vendors to provide web-based management and comprehensive protection for your email traffic. The hybrid structure of Progent's Email Guard combines cloud-based filtering with an on-premises gateway device to offer advanced defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. The Cloud Protection Layer acts as a first line of defense and blocks the vast majority of unwanted email from making it to your network firewall. This decreases your exposure to external attacks and saves network bandwidth and storage space. ProSight Email Guard's onsite security gateway device provides a deeper layer of inspection for incoming email. For outgoing email, the local gateway provides anti-virus and anti-spam filtering, protection against data leaks, and email encryption. The onsite security gateway can also help Microsoft Exchange Server to monitor and safeguard internal email traffic that stays within your corporate firewall.

Progent's security engineers are accessible remotely or on premises to offer a variety of urgent or project-based network security services including:

  • Run comprehensive security evaluations
  • Recuperate quickly after attacks
  • Configure hardware and software firewalls
  • Configure safe methods for offsite and mobile access
  • Install effective software for automatic defense against spam and directory harvest attacks
  • Help create a comprehensive security plan with round-the-clock network monitoring
  • Provide outsourced Help Desk Call Center Support
  • Help Create an effective network backup and business continuity solution built around Microsoft DPM backup capability
If your network has an emergency need for IT security support, go to Progent's Urgent Online Network Help.

Progent's security experts offer world-class services in key areas of system protection that include analysis, firewall and VPN solutions, and high-level security planning.

System Audits
Progent's certified security consultants can evaluate the effectiveness of your current network security environment by performing exhaustive remote automated analysis based on advanced utilities and tested techniques. Progent's experience in administering this testing saves your company money and assures an accurate portrayal of security holes. The information your business gains can be used as the foundation of a security strategy that will permit your information system to operate safely and adapt rapidly to future threats.

Automated Security Evaluation
Progent offers consulting in the use of security auditing products including Microsoft Baseline Security Analyzer and GFI LANguard Network Security Scanner for economically performing a variety of automatic system testing scans to identify possible security holes. Progent has broad knowledge of additional network analysis utilities including NMAP, AMAP Application Scanner, eEye, as well as tools like SolarWinds, Hydra, and Nikto. Progent can help you to understand audit reports and react appropriately.

Progent can help you design protection into your company processes, install scanning tools, plan and deploy a protected network architecture, and suggest policies to maximize the security of your IT system. Progent's security consultants are able to assist you to configure a firewall, implement safe remote access to email and business applications, and install virtual private network. Find out more concerning Progent's network security analysis.

Security Inventory Packages for Small Businesses
Progent has put together two ultra-affordable security inventory scanning bundles intended to allow small companies to get a professional network security evaluation from a certified security specialist. With Progent's External Security Inventory Scan, a security engineer administers a comprehensive examination of your network from outside your company firewall to uncover potential risks in the security posture you expose to the public. With Progent's Internal Security Inventory Checkup, a certified security professional runs a system scan from an authorized computer within your company firewall to uncover vulnerabilities to inside assaults. The two security inventory services are configured and executed from a secured external site. The project is directed by an engineer with high-level security accreditations and who produces a report that details and interprets the information captured by the security scan and suggests cost-effective improvements if called for.

Stealth Intrusion Testing Consulting
Stealth penetration checking is a key component of any comprehensive IT system security plan. Progentís security experts can run extensive penetration tests without the awareness of your company's internal network support resources. Unannounced penetration testing uncovers whether existing security defense systems such as intrusion detection alerts and event log analysis are correctly configured and consistently checked. Learn more concerning Progent's network penetration analysis support services.

Firewalls and VPN Expertise
Progent's expertise in security solutions includes extensive field work with major firewalls and Virtual Private Network (VPN) technology offered by multiple companies including Cisco, Microsoft, and Juniper. Progent offers the services of engineers with important networking certifications such as Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Configuration and Debugging
The current Cisco ASA 5500-X Family Next-Generation Firewalls with Firepower Services deliver substantially more value than Cisco's earlier firewalls and have superseded the ASA 5500 and PIX firewalls for new installations. Following Cisco's acquisition of Sourcefire, the whole family of ASA 5500-X firewalls can be provisioned to support Firepower Services, based on Sourcefire's Snort product, which is the market's most popular intrusion protection system (IPS). Firepower services provide powerful new features including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-qualified CCIE network consultants can assist your company to maintain your existing PIX or Cisco ASA 5500 firewalls and migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite help with ASA 5500-X firewalls with Firepower Services and can assist your organization to design, deploy, tune, manage and troubleshoot firewall environments based on Cisco ASA 5500-X firewalls with Firepower Services. Learn additional details about Cisco ASA Firewalls with Firepower Services integration and troubleshooting services.

Cisco Network Security and VPN Engineering Services
Cisco's security and remote connection technology provide a comprehensive line of manageable security products to help protect your wired and wireless network infrastructure. Cisco's VPN line features routers, firewalls, intrusion detection devices and Virtual Private Network appliances. Progent's expert consulting staff includes field-proven engineers with Cisco's CCIE and Cisco Certified Network Professional certifications who are able to help your business to select Cisco VPN, Cisco RADIUS Security, and other Cisco security technologies that fit best with your business objectives. Find out more information concerning Progent's Support Services for Cisco Security Solutions and VPN Appliances.

Consulting Services for Additional Firewall and VPN Solutions
Progent provides small and medium size organizations expert support for Intrusion Protection products and IPsec VPN solutions from major firewall and VPN security companies such as Check Point Software, Juniper Networks, and Symantec. Progent can show you how to create a comprehensive security plan and select the right products from a variety of vendors to support your security goals while staying within your budget restraints.

Progent's Fixed-price Managed Services for Information Security
Progent's low-cost ProSight series of network management outsourcing services is intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. Managed services offered by Progent include:
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that uses the technology of leading information security companies to deliver centralized control and comprehensive security for all your email traffic. The powerful architecture of Progent's Email Guard integrates cloud-based filtering with an on-premises gateway device to provide complete defense against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. Email Guard's cloud filter serves as a preliminary barricade and blocks the vast majority of unwanted email from making it to your network firewall. This decreases your exposure to inbound attacks and conserves network bandwidth and storage. Email Guard's on-premises security gateway appliance provides a deeper level of inspection for incoming email. For outgoing email, the local gateway provides AV and anti-spam filtering, DLP, and email encryption. The on-premises security gateway can also assist Exchange Server to track and protect internal email traffic that stays within your corporate firewall. For more information, visit Email Guard spam and content filtering.

ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that incorporates cutting edge behavior analysis tools to defend endpoints as well as physical and virtual servers against new malware assaults like ransomware and email phishing, which easily escape traditional signature-based anti-virus tools. ProSight Active Security Monitoring safeguards on-premises and cloud resources and offers a unified platform to manage the entire threat lifecycle including protection, infiltration detection, containment, cleanup, and forensics. Top features include one-click rollback with Windows VSS and automatic system-wide immunization against new attacks. Learn more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware defense.

ProSight DPS: Managed Backup
ProSight Data Protection Services from Progent offer small and medium-sized businesses a low cost and fully managed service for reliable backup/disaster recovery (BDR). For a low monthly price, ProSight DPS automates your backup activities and allows rapid recovery of critical data, apps and VMs that have become lost or damaged due to component breakdowns, software glitches, natural disasters, human error, or malicious attacks like ransomware. ProSight DPS can help you back up, retrieve and restore files, folders, apps, system images, as well as Microsoft Hyper-V and VMware images. Important data can be protected on the cloud, to a local device, or mirrored to both. Progent's cloud backup consultants can deliver advanced support to configure ProSight Data Protection Services to to comply with regulatory standards like HIPPA, FIRPA, and PCI and, whenever necessary, can help you to restore your business-critical data. Read more about ProSight DPS Managed Backup and Recovery.

ProSight IT Asset Management: Infrastructure Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to capture, update, retrieve and safeguard information about your IT infrastructure, processes, applications, and services. You can quickly find passwords or IP addresses and be alerted automatically about impending expirations of SSL certificates ,domains or warranties. By updating and managing your IT documentation, you can eliminate as much as half of time wasted looking for critical information about your IT network. ProSight IT Asset Management features a centralized location for holding and collaborating on all documents related to managing your network infrastructure like standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also supports advanced automation for collecting and relating IT information. Whether youíre planning enhancements, doing maintenance, or reacting to an emergency, ProSight IT Asset Management delivers the knowledge you need as soon as you need it. Learn more details about ProSight IT Asset Management service.

Certified Network Security Design
Every business should develop a thoroughly considered security strategy that incorporates both pre-attack procedures and response plans. The proactive strategy is a set of procedures that help to minimize vulnerabilities. The post-attack plan helps your security personnel to evaluate the impact caused by an attack, repair the system, document the event, and get business functions operational as rapidly as possible.

Progent's expert IT security consultants can to help your company to perform a comprehensive risk assessment and define a company-wide security strategy to implement security policies and mechanisms to minimize future assaults and threats.

CISM Certified System Security Engineering Services
The CISM committee defines the core competencies and international standards of skill that information security professionals are required to master. It gives executive management the confidence that those who have earned their CISM certification possess the background and capability to provide effective security administration and support consulting. Progent can provide the services of CISM qualified security consultants to help businesses with:

  • Network Security Governance
  • Risk Management
  • Information Security Implementation Management
  • IS Security Management
  • Response Management
Find out more information concerning Progent's CISM IS Security Support Expertise.

CISSP Accredited Security Engineering Services
CISSP denotes mastery of a worldwide standard for information security. The American National Standards Institute has granted the CISSP credential accreditation in the field of data protection defined by ISO/IEC 17024. Progent can provide access to of security experts who have qualified for CISSP accreditation. Progent can give you access to a CISSP-certified expert to help your company in a broad range of security areas including:

  • Security Management Procedures
  • Security Infrastructure and Paradigms
  • Access Control Systems and Processes
  • Applications Development Security
  • Secure Operations
  • Site Security
  • Cryptography Technology
  • Telecommunications, LAN and WAN Security
  • Business Continuity Preparedness
Find out additional details concerning Progent's CISSP-certified IS Security Engineering Expertise.

ISSAP Qualified Secure Information System Architecture Engineering Support
Progent's ISSAP certified information system architecture engineers are experts who have earned ISSAP status as a result of rigorous testing and extensive work with network security architecture. The Information System Security Architecture Professional (ISSAP) certification represents proven skill in the most challenging demands of IS security architecture bounded by the broader field of information security knowledge needed for CISSP accreditation. Progent's ISSAP-certified security specialists can assist your company with all phases of secure network architecture including.

  • Access Management Mechanisms and Techniques
  • Telecom and Network Infrastructure Security
  • Encryption/Decryption Options
  • Requirements Evaluation and Security Criteria
  • BCP and Disaster Recovery Planning (DRP)
  • Hardware Security
Read additional information concerning Progent's ISSAP Qualified Secure Network Architecture Consulting Professionals.

CISA Accredited Security Auditing Engineering Services
The Certified Information Systems Auditor accreditation is a globally recognized qualification that indicates expertise in network security auditing. Certified by ANSI, the CISA credential requires that candidates undergo a comprehensive examination given by the ISACA professional association. Progent's CISA information security audit engineers are available to help your business in the areas of:

  • IS Audit Services
  • Information Technology Governance
  • Network Assets and Architecture Lifecycle Planning
  • IT Support
  • Protecting Data Resources
  • Disaster Recovery Planning
Read the details concerning Progent's CISA Certified Security Auditing Consulting Support.

CRISC Consultants
The Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA to verify a consultant's skills to design, deploy, and support information system control mechanisms to mitigate network risk. Progent can provide the expertise of a CRISC-certified engineer to help you to develop and execute a business continuity plan that follows industry best practices promoted by CRISC and geared to align with your company's risk tolerance, business goals, and IT budget. Progent's CRISC-certified network risk management specialists can provide a range of risk assessment services including:

  • Gather data and review documentation to evaluate major risk scenarios
  • Inventory legal, industry, and contractual requirements and company policies associated with your information system to determine their possible influence on your business objectives
  • Identify possible threats for your business workflows to assist in analyzing your corporate risk
  • Develop a risk awareness program and provide training to ensure your organization understand information system risk so they can assist with your risk management program
  • Match key risk vectors to related business processes to help determine risk responsibility
  • Validate risk appetite with your senior leadership and major stakeholders to make sure they match
Find out additional details about Progent's CRISC Consultants.

GIAC Accredited Information System Security Engineering Services
GIAC was established in 1999 to validate the skill of information technology security engineers. GIAC's mission is to ensure that an accredited professional has the skills appropriate to provide support in vital categories of network, information, and application software security. GIAC certifications are acknowledged by companies and government organizations around the world including and the U.S. National Security Agency. Progent's GIAC-qualified IS security audit engineers can help your company in the areas of:

Learn more information concerning Progent's GIAC Information Assurance Support.

Get in Touch with a Certified Security Specialist
To find out how to access a security consultant for online or onsite support in Washington, call 1-800-993-9400 or visit Online Network Support.

© 2002- 2018 Progent Corporation. All rights reserved.