Company networks in Oregon can now get quick and economical remote help from Progent's certified security experts to help with the toughest security problems. Rates are reasonable, charges are by the minute, engagement is quick, and support is world class. Progent also provides help for complex engagements that requires the expertise of senior security consultants with top security certifications.
In case your Oregon network is based some distance from larger urban neighborhoods including Portland, Salem, Eugene, Gresham, or Beaverton, help from nearby certified security experts may be problematic when there's an urgent situation. This can result in a drop in income for your company, upset clients, unproductive employees, and distracted management. By contacting Progent's remote support, you have access to a Certified security professional ready to offer help when you have to have it to keep your computer network operating and salvage your information.
Progent can help you at any level in your initiatives to guard your IT environment with services that can range from network security checks to creating a comprehensive security plan. Progent offers economical service to help small and midsize companies to configure and manage secure networks powered by Microsoft Windows and Cisco products and that may include servers and desktops running UNIX or Linux platforms as well as mobile users with Apple iOS iPhones and iPads or Google Android or Windows Phone handsets.
Progent can also help you outsource spam blocking and protection from email-borne attacks. Email Guard is Progent's email security solution that uses the services and infrastructure of top information security companies to provide web-based control and comprehensive security for all your email traffic. The hybrid structure of Email Guard managed service integrates cloud-based filtering with an on-premises security gateway appliance to offer advanced defense against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. The cloud filter serves as a first line of defense and keeps the vast majority of threats from reaching your network firewall. This decreases your vulnerability to inbound threats and saves network bandwidth and storage. ProSight Email Guard's on-premises gateway appliance provides a further level of analysis for incoming email. For outbound email, the onsite security gateway offers anti-virus and anti-spam protection, DLP, and email encryption. The on-premises gateway can also enable Exchange Server to monitor and safeguard internal email traffic that originates and ends within your corporate firewall.
Progent's security professionals are available remotely or in person to offer a range of emergency or longer-term network security services such as:
If your business has an immediate requirement for IT security help, go to Progent's Urgent Remote Technical Support.
- Perform extensive security audits
- Clean up promptly after virus and worm attacks
- Configure hardware and software firewalls
- Implement secure techniques for offsite and mobile access
- Deploy effective solutions for automatic defense against viruses, spam and directory harvest attacks
- Help create a company-wide security strategy with 24x7 monitoring
- Provide comprehensive Help Desk Support
- Create a practical data backup and recovery solution built around Data Protection Manager (DPM) backup/restore technology
Progent's security experts provide world-class support in vital facets of computer security including auditing, firewalls and VPN, and high-level security consulting.
Progent's expert security engineers can assess the strength of your current computer protection implementation by performing exhaustive remote automated analysis based on sophisticated utilities and tested procedures. Progent's skill in administering this service saves your company time and money and offers an objective portrayal of gaps. The information your company gains can be used as the basis of a security strategy that will allow your information system to run dependably and adapt quickly to future risks.
Automated Network Security Audits
Progent offers consulting in the application of security analysis products including Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard NSS for economically performing a variety of automatic system auditing checks to identify potential security problems. Progent has extensive knowledge of additional security analysis utilities such as NMAP Port Scanner, AMAP Application Scanner, eEye Vulnerability Scanner, plus utilities like Metasploit, Netcat, Socat, and Nikto. Progent can show you how to understand testing reports and react appropriately.
Progent can show you how to design protection into your business processes, install auditing tools, plan and deploy a secure network environment, and suggest policies to maximize the security of your network. Progent's security engineers are ready to assist you to set up a firewall, design secure remote access to email and data, and install virtual private network. Find out more about Progent's automated security evaluation.
Security Inventory Packages for Small Companies
Progent has put together two low-cost security inventory and evaluation packages designed to enable small businesses to get an independent security assessment from an accredited security expert. With Progent's External Security Inventory Checkup, an engineer runs an extensive examination of your IT infrastructure from outside your company firewall to uncover possible weaknesses in the security posture you expose to the outside world. With Progent's Internal Security Inventory Scan, a security engineer runs a system scan from a secure computer within your firewall to determine your exposure to internal threats. Both security inventory services are set up and run from a secured remote location. The project is directed by an engineer with high-level security accreditations and who generates a report that summarizes and analyzes the information collected by the scan and suggests cost-effective improvements if called for.
Network Security Penetration Testing Consulting
Stealth penetration testing is an important part of any serious IT system security plan. Progentís security professionals can perform thorough penetration tests without the awareness of your company's in-house network support resources. Stealth penetration checking uncovers whether existing security defense systems such as intrusion incident warnings and event history analysis are correctly set up and actively checked. Find out more about Progent's network penetration analysis consulting.
Progent's expertise in network security technology encompasses in-depth field work with leading firewalls and Virtual Private Network (VPN) technology from a variety of vendors including Cisco, Microsoft, and Juniper. Progent can provide the services of engineers with key industry accreditations such as Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Security Appliances Configuration and Debugging
The current Cisco ASA 5500-X Family of firewalls with Firepower Services provide substantially more performance than Cisco's previous firewalls and have replaced the ASA 5500 and PIX 500 security appliances for new deployments. Following Cisco's purchase of Sourcefire, the entire line of ASA 5500-X devices can be configured to enable Firepower Services, built on Sourcefire's Snort product, which is the world's most deployed intrusion protection system (IPS). Firepower services bring enhanced features such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-certified CCIE network consultants can help your company to maintain your existing PIX or Cisco ASA 5500 firewalls or migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist your business to plan, deploy, optimize, administer and debug firewall solutions based on Cisco ASA 5500-X firewalls with Firepower Services. Read more details about Cisco ASA 5500-X Firewalls with Firepower integration and troubleshooting support.
Cisco Network Security and Virtual Private Network Engineering Services
Cisco's network security and offsite access technology provide a comprehensive line of manageable security products to help protect your local and remote network infrastructure. Cisco's VPN line includes routers, firewalls, intrusion detection systems and VPN appliances. Progent's expert consulting staff includes experienced engineers with Cisco's CCIE and CCNP qualifications who are able to assist your company to select Cisco VPN, Cisco RADIUS Security, and additional Cisco security technologies that fit best with your company objectives. Read additional details concerning Progent's Consulting Services for Cisco Security Solutions and VPN Appliances.
Support Services for Other Firewall and VPN Products
Progent provides small and medium size companies expert support for Intrusion Protection Systems and IPsec VPN products from leading firewall and VPN security companies including Check Point Software, Juniper Networks, and Symantec. Progent can show you how to design a detailed security plan and select appropriate technologies from a variety of vendors to support your security objectives while sticking within your budget restraints.
Progent's Flat-rate Managed Services for Information Security
Progent's affordable ProSight line of network management outsourcing services is designed to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. Managed services offered by Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring is an endpoint protection (EPP) service that incorporates next generation behavior-based machine learning technology to guard endpoints as well as physical and virtual servers against new malware attacks like ransomware and file-less exploits, which routinely escape legacy signature-based AV products. ProSight Active Security Monitoring protects local and cloud-based resources and provides a unified platform to address the complete malware attack lifecycle including filtering, detection, containment, cleanup, and forensics. Top features include single-click rollback using Windows Volume Shadow Copy Service (VSS) and automatic system-wide immunization against newly discovered attacks. Find out more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.
ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Security
ProSight Enhanced Security Protection services deliver affordable multi-layer security for physical and virtual servers, desktops, mobile devices, and Microsoft Exchange. ProSight ESP uses adaptive security and advanced machine learning for continuously monitoring and reacting to cyber assaults from all attack vectors. ProSight ESP delivers firewall protection, penetration alarms, endpoint management, and web filtering through leading-edge technologies packaged within a single agent accessible from a single console. Progent's data protection and virtualization consultants can assist you to plan and implement a ProSight ESP environment that addresses your company's specific needs and that allows you prove compliance with government and industry information protection standards. Progent will help you define and configure policies that ProSight ESP will manage, and Progent will monitor your IT environment and react to alarms that call for immediate attention. Progent can also help your company to install and test a backup and restore system like ProSight Data Protection Services (DPS) so you can get back in business rapidly from a potentially disastrous cyber attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Microsoft Exchange filtering.
ProSight DPS: Managed Cloud Backup
ProSight Data Protection Services from Progent offer small and mid-sized organizations an affordable and fully managed service for secure backup/disaster recovery. Available at a fixed monthly rate, ProSight DPS automates and monitors your backup activities and allows fast restoration of critical data, applications and virtual machines that have become unavailable or damaged due to component breakdowns, software bugs, disasters, human mistakes, or malicious attacks like ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, applications, system images, as well as Microsoft Hyper-V and VMware virtual machine images. Important data can be backed up on the cloud, to a local storage device, or mirrored to both. Progent's BDR specialists can deliver advanced expertise to set up ProSight Data Protection Services to to comply with government and industry regulatory requirements such as HIPPA, FINRA, and PCI and, whenever necessary, can assist you to recover your critical information. Read more about ProSight Data Protection Services Managed Backup and Recovery.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering service that uses the technology of top information security companies to provide centralized control and world-class protection for your inbound and outbound email. The hybrid structure of Email Guard integrates a Cloud Protection Layer with a local gateway device to provide advanced defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-borne threats. The Cloud Protection Layer acts as a first line of defense and keeps the vast majority of unwanted email from making it to your network firewall. This reduces your vulnerability to inbound attacks and saves network bandwidth and storage space. Email Guard's on-premises security gateway appliance adds a deeper layer of analysis for incoming email. For outgoing email, the on-premises gateway provides anti-virus and anti-spam filtering, protection against data leaks, and email encryption. The local security gateway can also assist Exchange Server to monitor and protect internal email traffic that stays within your security perimeter. For more details, visit ProSight Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size business can have its critical servers and apps hosted in a protected fault tolerant data center on a high-performance virtual machine host set up and maintained by Progent's network support experts. Under the ProSight Virtual Hosting service model, the client owns the data, the OS platforms, and the applications. Because the environment is virtualized, it can be ported immediately to a different hardware solution without a time-consuming and difficult reinstallation procedure. With ProSight Virtual Hosting, you are not locked into a single hosting provider. Find out more about ProSight Virtual Hosting services.
ProSight IT Asset Management: IT Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, maintain, retrieve and protect information related to your network infrastructure, procedures, business apps, and services. You can quickly find passwords or IP addresses and be warned about upcoming expirations of SSL certificates ,domains or warranties. By updating and managing your network documentation, you can eliminate as much as 50% of time thrown away searching for critical information about your network. ProSight IT Asset Management includes a centralized repository for holding and sharing all documents related to managing your business network like standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also supports a high level of automation for collecting and relating IT information. Whether youíre making improvements, doing regular maintenance, or responding to an emergency, ProSight IT Asset Management delivers the knowledge you need the instant you need it. Find out more details about ProSight IT Asset Management service.
Expert Security Design
Any company should have a thoroughly thought out security strategy that incorporates both pre-attack procedures and response planning. The pre-attack plan is a collection of procedures designed to reduce security weaknesses. The reactive strategy helps your company's network security engineers to evaluate the damage resulting from a security penetration, fix the system, record the event, and get the IT network running as rapidly as possible.
Progent's certified IT security consultants can to assist your business to run a full risk assessment and create a company-wide security plan to implement security policies and controls to mitigate ongoing attacks and dangers.
CISM Qualified System Security Support Expertise
The CISM committee defines the core competencies and worldwide standards of skill that IT security professionals are expected to master. CISM gives business management the assurance that those who have earned their CISM credential have the experience and capability to deliver efficient security administration and support services. Progent offers the services of CISM Premier security consultants to assist companies with:
Learn more details about Progent's CISM Accredited Network Security Engineering Services.
- Information Security Processes
- Vulnerability Management
- IS Security Implementation Management
- IS Security Management
- Response Planning
CISSP Certified Security Consulting Services
CISSP denotes expertise with an international standard for information security. ANSI (American National Standards Institute) has awarded certification recognition in the area of data protection stipulated by ISO/IEC 17024. Progent can provide the services of security professionals who have earned CISSP certification. Progent can provide a CISSP-certified expert to help your enterprise in a variety security areas including:
Learn more details concerning Progent's CISSP Cybersecurity Support Expertise.
- Security Management Practices
- Security Infrastructure and Models
- Access Management Solutions and Methodology
- Applications Development Security
- Secure Operations
- Site Security
- Cryptography Mechanisms
- Telecommunications, LAN and Internet Security
- Business Continuity Planning
CISSP-ISSAP Qualified Secure IT Architecture Consulting Support
Progent's CISSP-ISSAP Premier network architecture engineers are consultants who have earned ISSAP Certification through rigorous examination and extensive work with information security design. The Information System Security Architecture Professional (ISSAP) certification indicates proven skill in the more challenging requirements of information system security architecture within the broader scope of information system security expertise required for CISSP accreditation. Progent's ISSAP-premier security experts can help your business with all phases of secure network architecture including.
Find out additional details about Progent's ISSAP Certified Secure IT Architecture Consulting Services.
- Access Control Systems and Methodologies
- Phone System and Network Infrastructure Security
- Cryptography Options
- Requirements Analysis and Security Standards
- Business Continuity Planning and DRP
- Site Security
CISA Qualified Network Security Auditing Consulting Support
The Certified Information Systems Auditor (CISA) accreditation is a recognized qualification that indicates expertise in network security auditing. Accredited by ANSI, the CISA credential requires that candidates undergo an extensive test administered by the ISACA professional group. Progent's CISA network security audit specialists are available to assist your business with:
Learn more information concerning Progent's CISA Qualified IS Security Auditing Consulting Support.
- IS Audit Process
- IT Governance
- Network Assets and Infrastructure Lifecycle Planning
- Information Technology Service Delivery
- Safeguarding Data Resources
- Disaster Recovery Preparedness
Certified in Risk and Information Systems Control (CRISC) Consultants
The Certified in Risk and Information Systems Control (CRISC) program was established by ISACA to validate a consultant's ability to plan, deploy, and maintain information system control mechanisms to reduce risk. Progent can provide the services of a CRISC-certified consultant to assist your company to develop and carry out a business continuity or disaster recovery plan that follows industry best practices promoted by CRISC and geared to match your company's risk tolerance, business goals, and budgetary guidelines. Progent's CRISC IT risk mitigation consultants can provide a variety of risk identification services including:
Find out additional details about Progent's CRISC Risk Management Consultants.
- Collect information and review documentation to evaluate major vulnerabilities
- Identify legal, regulatory, and contractual mandates and company standards associated with your information system to determine their potential influence on your business objectives
- Point out potential threats for your business workflows to assist in analyzing your corporate risk
- Develop a risk awareness initiative and provide training to ensure your stakeholders understand IS risk so they can contribute to your risk management process
- Match key risk vectors to your associated business procedures to help assign risk ownership
- Validate risk tolerance with executive leadership and major stakeholders to make sure they match
GIAC Qualified IS Security Consulting Expertise
GIAC was established in 1999 to certify the skill of IT security engineers. GIAC's goal is to assure that a certified security consultant has the knowledge needed to deliver services in critical areas of network, information, and program security. GIAC certifications are recognized by companies and institutions around the world including and the United States National Security Agency. Progent's GIAC network security audit consultants are available to help your business with:
Learn more information about Progent's GIAC Information Assurance Support.
- Auditing Perimeters
- Incident Response
- Intrusion Detection
- Web-based Services Security
- SIEM solutions
Talk to a Progent Security Engineer
To see how to contact a Progent security consultant for remote or on-premises help in Oregon, phone 1-800-993-9400 or visit Online Computer Help.