Business information networks in the state of Oregon can now get quick and economical online help from Progent's accredited security engineers to help with the toughest security issues. The cost is competitive, charges are by the minute, engagement is quick, and support is world class. Progent also offers help for long-term projects that demand the services of seasoned security consultants with top industry credentials.
If your Oregon company is situated outside of major metropolitan neighborhoods such as Portland, Salem, Eugene, Gresham, or Beaverton, help from nearby qualified security support specialists may be limited during an emergency. This can result in a loss of income for your company, angry clients, unproductive employees, and defocused management. By utilizing Progent's online services, you can get in touch with a Premier security engineer ready to provide assistance whenever you need it to get your system on line and salvage your data.
Progent can assist you at any level in your efforts to protect your network with support services ranging from security audits to developing a company-wide security plan. Progent offers economical support to help businesses of all sizes to set up and manage protected networks based on Microsoft Windows and Cisco technology and that can include servers and desktops based on UNIX, Linux, Sun Solaris, or Mac OS X operating systems as well as BYOD clients with Apple iPhones and iPads or Google Android or Windows Phone smart phones and tablets.
Progent can also show you how to outsource spam blocking and protection from e-mail-based assaults. Email Guard is Progent's email security solution that incorporates the technology of top data security companies to deliver centralized management and world-class security for all your email traffic. The powerful architecture of Progent's Email Guard managed service combines cloud-based filtering with a local security gateway device to offer complete protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. The Cloud Protection Layer serves as a first line of defense and keeps the vast majority of unwanted email from making it to your network firewall. This decreases your exposure to external threats and conserves network bandwidth and storage space. ProSight Email Guard's on-premises security gateway device provides a deeper layer of analysis for inbound email. For outbound email, the local security gateway offers AV and anti-spam protection, protection against data leaks, and email encryption. The onsite security gateway can also help Exchange Server to track and safeguard internal email that stays within your security perimeter.
Progent's certified professionals are available remotely or on site to provide a range of urgent or project-based computer security services such as:
If your network has an immediate need for IT security help, go to Progent's Urgent Online Network Support.
- Run extensive network security audits
- Recuperate quickly after virus and worm attacks
- Configure effective firewalls
- Implement secure methods for remote and mobile connectivity
- Install effective applications for protection against viruses, spam and DHAs
- Develop a company-wide security plan with proactive network monitoring
- Offer outsourced Call Center Services
- Develop an effective data backup and disaster recovery solution based on Microsoft DPM automated backup capability
Progent's security experts provide advanced support in key facets of computer protection including analysis, firewall and VPN solutions, and high-level security consulting.
Progent's certified security engineers can evaluate the effectiveness of your existing network security implementation by performing exhaustive remote automated testing via sophisticated software tools and proven techniques. Progent's experience in this testing saves your company money and assures an accurate portrayal of system vulnerability. The knowledge your company gains can form the foundation of a network protection strategy that will permit your network to operate safely and adapt quickly to future threats.
Automated Vulnerability Analysis
Progent provides expertise in the use of security analysis products including Microsoft's MBSA and GFI LANguard for economically performing a set of programmed system auditing checks to uncover possible security vulnerabilities. Progent has extensive knowledge of other security auditing products such as NMAP Port Scanner, AMAP Application Scanner, eEye Vulnerability Scanner, plus tools such as SolarWinds, Netcat, Hydra, and Nikto. Progent can help you to understand audit reports and respond effectively.
Progent can show you how to design security into your company processes, configure auditing tools, define and deploy a protected system environment, and suggest procedures to maximize the safety of your network. Progent's security professionals are available to show you how to configure a firewall, implement secure remote access to email and business applications, and integrate VPN. Learn more concerning Progent's network security evaluation.
Security Inventory Bundles for Small Companies
Progent offers two low-cost security inventory scanning bundles intended to enable small businesses to get an objective security assessment from an accredited security engineer. With Progent's External Network Security Inventory Checkup, a security engineer runs a comprehensive examination of your IT infrastructure from beyond your firewalled perimeter to uncover potential risks in the security posture you present to the outside world. With Progent's Internal Security Inventory Checkup, a certified security professional executes a network scan from a secure computer inside your firewall to evaluate vulnerabilities to inside threats. Both security inventory services are configured and run from a protected remote location. The project is overseen by an engineer with top security credentials and who generates a document that summarizes and interprets the information collected by the scan and suggests practical remediation if called for.
Stealth Penetration Testing Support Services
Stealth intrusion checking is a key part of any serious network security strategy. Progentís security experts can perform extensive penetration tests without the knowledge of your company's in-house IT staff. Unannounced penetration checking shows whether current security defense tools such as intrusion detection warnings and event log monitoring are properly set up and actively checked. Learn additional information on Progent's stealth security penetration testing consulting.
Firewall And Virtual Private Network (VPN) Support
Progent's expertise in security solutions encompasses extensive field work with major firewalls and Virtual Private Network products offered by a variety of companies including Cisco, Microsoft, and CheckPoint. Progent offers the support of consultants who have earned important networking certifications including Cisco Certified Internetwork Expert and Microsoft MCSE.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Configuration and Debugging
The latest generation of Cisco ASA 5500-X Family Next-Generation Firewalls with Firepower Services offer significantly more performance than Cisco's legacy firewalls and have replaced the ASA 5500 and PIX security appliances for new deployments. After Cisco's acquisition of Sourcefire, the entire line of ASA 5500-X firewalls can be provisioned to support Firepower Services, based on Sourcefire's Snort product, which is the market's most popular intrusion protection system (IPS). Firepower services bring powerful new capabilities including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-premier CCIE network consultants can assist you to maintain your existing PIX or Cisco ASA 5500 firewalls and upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist your company to design, integrate, optimize, administer and troubleshoot firewall solutions based on Cisco ASA 5500-X firewalls with Firepower Services. Read more details about Cisco ASA 5500-X Firewalls with Firepower configuration and debugging services.
Cisco Security and VPN Consulting Expertise
Cisco's security and remote connection products offer a complete line of easy-to-administer security solutions to help protect your wired and wireless information system. Cisco's Virtual Private Network product family features switches, firewalls, intrusion detection devices and Virtual Private Network appliances. Progent's expert consulting staff includes experienced specialists with Cisco's CCIE and CCNP qualifications who can assist your company to select Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security technologies that fit best with your company goals. Find out additional information concerning Progent's Consulting Services for Cisco Security Solutions and Virtual Private Network Appliances.
Support Services for Additional Firewall and VPN Technology
Progent provides small and mid-size businesses professional support for Intrusion Protection products and IPsec VPN solutions from leading firewall and VPN security vendors such as Check Point Software, Juniper, and SonicWall. Progent can help you design a comprehensive security plan and select the right technologies from a variety of suppliers to achieve your security objectives while sticking within your spending limits.
Progent's Low-Cost Managed Services for Information Assurance
Progent's value-priced ProSight series of network monitoring and management services is intended to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all facets of information assurance. Managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that incorporates cutting edge behavior-based machine learning technology to defend endpoint devices as well as servers and VMs against new malware attacks like ransomware and file-less exploits, which routinely get by traditional signature-matching anti-virus products. ProSight Active Security Monitoring protects local and cloud resources and provides a unified platform to automate the complete threat progression including filtering, detection, containment, cleanup, and post-attack forensics. Key features include one-click rollback with Windows Volume Shadow Copy Service and real-time system-wide immunization against new attacks. Read more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense.
ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Protection
Progent's ProSight Enhanced Security Protection (ESP) services deliver economical multi-layer protection for physical and virtual servers, workstations, smartphones, and Exchange Server. ProSight ESP uses contextual security and modern behavior analysis for continuously monitoring and reacting to cyber threats from all vectors. ProSight ESP delivers firewall protection, intrusion alerts, endpoint control, and web filtering through cutting-edge technologies incorporated within a single agent managed from a single console. Progent's security and virtualization experts can assist you to design and configure a ProSight ESP deployment that addresses your company's unique requirements and that allows you demonstrate compliance with legal and industry information security standards. Progent will assist you specify and implement security policies that ProSight ESP will enforce, and Progent will monitor your IT environment and react to alarms that require urgent attention. Progent can also help your company to set up and verify a backup and restore solution like ProSight Data Protection Services so you can get back in business rapidly from a potentially disastrous security attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint security and Exchange filtering.
ProSight Data Protection Services: Managed Cloud Backup
ProSight Data Protection Services from Progent offer small and mid-sized organizations a low cost and fully managed solution for reliable backup/disaster recovery. For a low monthly price, ProSight Data Protection Services automates your backup processes and allows fast recovery of critical files, apps and VMs that have become lost or corrupted as a result of hardware breakdowns, software glitches, disasters, human mistakes, or malware attacks like ransomware. ProSight Data Protection Services can help you protect, recover and restore files, folders, apps, system images, as well as Hyper-V and VMware virtual machine images. Important data can be backed up on the cloud, to a local storage device, or to both. Progent's BDR consultants can deliver advanced support to configure ProSight DPS to be compliant with regulatory standards such as HIPPA, FIRPA, and PCI and, when necessary, can assist you to restore your business-critical information. Find out more about ProSight DPS Managed Cloud Backup and Recovery.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that incorporates the technology of top data security companies to deliver centralized control and world-class protection for all your inbound and outbound email. The powerful structure of Progent's Email Guard managed service combines a Cloud Protection Layer with a local gateway device to offer advanced defense against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-borne threats. The Cloud Protection Layer serves as a preliminary barricade and blocks the vast majority of threats from reaching your security perimeter. This decreases your exposure to external attacks and saves system bandwidth and storage. Email Guard's onsite gateway appliance provides a further level of inspection for inbound email. For outbound email, the onsite security gateway offers anti-virus and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The local security gateway can also assist Microsoft Exchange Server to monitor and safeguard internal email that originates and ends within your security perimeter. For more information, visit Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small business can have its key servers and applications hosted in a protected Tier III data center on a high-performance virtual machine host set up and managed by Progent's network support professionals. Under Progent's ProSight Virtual Hosting service model, the client retains ownership of the data, the operating system platforms, and the applications. Since the environment is virtualized, it can be moved easily to an alternate hardware environment without a lengthy and difficult configuration process. With ProSight Virtual Hosting, your business is not locked into one hosting provider. Find out more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, maintain, retrieve and protect data related to your IT infrastructure, processes, applications, and services. You can quickly find passwords or serial numbers and be warned about upcoming expirations of SSL certificates or warranties. By cleaning up and organizing your IT infrastructure documentation, you can save up to half of time spent trying to find critical information about your network. ProSight IT Asset Management includes a centralized location for storing and sharing all documents required for managing your network infrastructure such as standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also offers advanced automation for collecting and associating IT data. Whether youíre making enhancements, performing regular maintenance, or responding to a crisis, ProSight IT Asset Management delivers the knowledge you need as soon as you need it. Find out more about ProSight IT Asset Management service.
Certified Network Security Consulting
Every business should have a carefully considered security program that includes both pre-attack procedures and response plans. The proactive plan is a set of mechanisms that help to minimize security weaknesses. The reactive plan helps your network security personnel to evaluate the impact resulting from an attack, repair the system, document the experience, and get the IT network operational as quickly as possible.
Progent's expert IS security engineers can to assist your company to run a complete risk evaluation and define a company-wide security strategy to implement security processes and mechanisms to reduce future assaults and threats.
CISM Certified System Security Support Expertise
The CISM committee defines the basic capabilities and global standards of performance that IT security professionals are required to master. It gives executive management the assurance that consultants who have earned their CISM certification have the background and capability to provide efficient security administration and consulting services. Progent offers the expertise of CISM Certified security professionals to help businesses with:
Find out additional information concerning Progent's CISM Network Security Engineering Professionals.
- Information Security Processes
- Vulnerability Analysis
- IS Security Program Management
- Network Security Management
- Recovery Planning
CISSP Certified Security Consulting Expertise
The CISSP credential denotes expertise with a worldwide standard for information security. The American National Standards Institute has granted the CISSP credential recognition in the field of data security defined by ISO 17024. Progent offers the services of security professionals who have qualified for CISSP accreditation. Progent can give you access to a CISSP-certified professional to help your company in a broad range of security fields including:
Learn more information concerning Progent's CISSP-certified Network Security Consulting Professionals.
- Security Management Procedures
- Security Infrastructure and Models
- Access Control Systems and Methodology
- Software Development Security
- Operations Security
- Physical Security
- Encryption/Decryption Mechanisms
- Telecom, LAN and WAN Security
- Business Continuity Planning
CISSP-ISSAP Qualified Secure Network Architecture Engineering Support
Progent's CISSP-ISSAP Certified information system architecture engineers are consultants who have earned ISSAP status as a result of rigorous testing and significant experience with network security architecture. The ISSAP certification represents demonstrated mastery in the more in-depth demands of IS security architecture bounded by the wider scope of information system security expertise needed for CISSP accreditation. Progent's ISSAP-certified security specialists can help your company with all aspects of secure network architecture including.
Learn additional information about Progent's ISSAP Certified Secure System Architecture Engineering Services.
- Access Management Systems and Techniques
- Telecommunications and Network Protection
- Data Encryption Solutions
- Needs Analysis and Security Criteria
- BCP and DRP
- Physical Security
CISA Certified Information System Security Auditing Engineering Assistance
The Certified Information Systems Auditor credential is a globally recognized qualification that indicates expertise in IS security audit and control. Accredited by ANSI, the CISA credential has consultants undergo a comprehensive test administered by the ISACA international professional association. Progent's CISA-certified IS security audit engineers can help your business in the areas of:
Read more details about Progent's CISA Qualified Network Security Auditing Consulting Services.
- IS Audit Services
- Information Technology Governance
- Systems and Architecture Lifecycle Planning
- IT Support
- Protecting Data Assets
- Business Continuity Preparedness
The CRISC program was established by ISACA to validate a consultant's skills to plan, implement, and maintain IS control mechanisms to mitigate risk. Progent offers the expertise of a CRISC-certified engineer to assist you to create and carry out a business continuity or disaster recovery plan based on leading practices identified by CRISC and geared to match your organization's risk appetite, business goals, and budgetary guidelines. Progent's CRISC-qualified IT risk management experts can provide a variety of risk assessment services such as:
Find out additional details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.
- Collect data and review documentation to evaluate major risk scenarios
- Identify statutory, industry, and contractual mandates and company standards related to your information system to determine their possible impact on your strategic goals
- Point out possible vulnerabilities for your business workflows to assist in evaluating your corporate risk
- Create a risk awareness program and conduct training to make sure your organization understand IT risk so they can assist with your risk control process
- Match key risk vectors to related operational procedures to help assign risk ownership
- Validate risk appetite with executive management and major stakeholders to ensure they align
GIAC Qualified Information System Security Consulting Assistance
Global Information Assurance Certification was established in 1999 to certify the knowledge of information technology security professionals. GIAC's goal is to verify that a certified professional has the knowledge necessary to provide services in critical areas of network, data, and application security. GIAC certifications are recognized by businesses and institutions around the world including and the United States NSA. Progent's GIAC-qualified network security audit engineers are available to assist your business with:
Find out more information about Progent's GIAC Information Assurance Services.
- Assessing IT Infrastructure
- Security Incident Response
- Intrusion Detection
- Web-based Application Security
- SIEM solutions
Contact a Progent Security Engineer
To find out how you can access a Progent security consultant for remote or on-premises support in Oregon, call 1-800-993-9400 or go to Remote Computer Help.