Business networks in the state ofOregoncan now get quick and affordable remote help from Progent's qualified security support specialists to assist with critical security problems. The cost is reasonable, billing is per minute, sign-up is quick, and service is world class. Progent also provides help for long-term projects that requires the knowledge of senior security engineers with high-level industry credentials.
In case yourOregonbusiness is situated away from more populated metropolitan neighborhoods such asPortland, Salem, Eugene, Gresham, or Beaverton, help from nearby qualified security support specialists may be problematic when you have an emergency. This can cause a loss of income for your company, upset customers, idle employees, and defocused management. By contacting Progent, you have access to a Certified security professional ready to offer expertise whenever you have to have it to keep your system operating and restore your data.
Progent can help you in a variety of ways in your initiatives to protect your information system with support ranging from security assessments to developing a company-wide security plan. Progent provides economical service to help small and midsize companies to design and maintain secure networks based on Windows and Cisco products and that may include servers and desktops running UNIX, Linux, Sun Solaris, or Mac OS X platforms as well as BYOD users with Apple iOS iPhones and iPads or Google Android or Windows Phone devices.
Progent can also help you outsource spam blocking and protection from email-borne assaults. Email Guard is Progent's email filtering and encryption solution that uses the services and infrastructure of leading information security vendors to deliver web-based control and world-class protection for your inbound and outbound email. The powerful structure of Email Guard managed service integrates a Cloud Protection Layer with a local gateway appliance to provide advanced defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. The cloud filter acts as a preliminary barricade and keeps most unwanted email from reaching your network firewall. This decreases your vulnerability to inbound attacks and saves network bandwidth and storage. ProSight Email Guard's on-premises security gateway appliance provides a further layer of analysis for inbound email. For outbound email, the onsite security gateway provides anti-virus and anti-spam protection, protection against data leaks, and encryption. The local security gateway can also help Exchange Server to track and protect internal email traffic that stays inside your security perimeter.
Progent's security consultants are available remotely or on premises to offer a range of emergency or project-based network security services including:
If your network has an urgent need for computer security support, refer to Progent's Emergency Online Network Help.
- Run automated network security audits
- Clean up quickly after serious security breaches
- Set up hardware and software firewalls
- Configure safe methods for offsite and mobile access
- Deploy effective utilities for defense against spam and DHAs
- Develop a company-wide security strategy with 24x7 monitoring
- Provide outsourced Call Center Services
- Help Create an effective data backup and disaster recovery solution centered on Microsoft Data Protection Manager automated backup capability
Progent's consultants provide advanced services in vital fields of computer protection including auditing, firewall/VPN support, and high-level security planning.
System Security Evaluation
Progent's certified security consultants can evaluate the effectiveness of your existing computer protection implementation through exhaustive remote automated testing based on advanced utilities and proven procedures. Progent's experience in administering this service saves your company time and money and assures a detailed picture of system vulnerability. The information your business is provided can form the basis of a security strategy that can permit your information system to operate safely and adapt rapidly to future risks.
Automated Vulnerability Audits
Progent offers expertise in the application of security testing packages such as Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard NSS for economically performing a variety of programmed system testing checks to identify potential security vulnerabilities. Progent has extensive knowledge of other security auditing tools including NMAP, AMAP Application Scanner, eEye, as well as tools like Metasploit, Hydra, and Nikto. Progent can show you how to understand testing reports and react effectively.
Progent can help you design protection into your company operations, install auditing software, plan and implement a secure network environment, and suggest policies to maximize the security of your IT system. Progent's security engineers are able to assist you to set up a firewall, implement safe remote connectivity to email and business applications, and integrate virtual private network. Learn more concerning Progent's network security evaluation.
Security Inventory Service Packages for Small Businesses
Progent has put together two ultra-affordable security inventory and evaluation bundles designed to enable small companies to get an impartial network security assessment from a certified security specialist. With Progent's External Network Security Inventory Scan, a security expert administers a comprehensive examination of your network from outside your company firewall to determine possible risks in the security posture you present to the outside world. With Progent's Internal Security Inventory Scan, a certified security professional executes a network scan from an authorized computer inside your company firewall to uncover the risk to internal threats. The two security inventory services are set up and executed from a protected remote location. The process is directed by a consultant who has earned high-level security accreditations and who generates a report that summarizes and analyzes the information collected by the scan and proposes cost-effective remediation if appropriate.
Network Penetration Analysis Consulting
Stealth penetration testing is a key component of any comprehensive network security plan. Progentís security professionals can perform extensive intrusion checks without the knowledge of your company's in-house IT resources. Stealth penetration checking uncovers whether existing security monitoring systems such as intrusion detection alerts and event history analysis are correctly set up and consistently checked. Find out additional information on Progent's stealth penetration analysis support services.
Progent's expertise in network security technology encompasses extensive field work with major firewalls and Virtual Private Network products from a variety of vendors such as Cisco, Microsoft, and CheckPoint. Progent can provide the services of engineers with important industry accreditations including Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Integration and Debugging
The current Cisco ASA 5500-X Series of firewalls with Firepower Services deliver substantially more performance than Cisco's legacy firewalls and have superseded the ASA 5500 and PIX firewalls for new deployments. Following Cisco's purchase of Sourcefire, the entire family of Cisco ASA 5500-X firewalls can be configured to enable Firepower Services, based on Sourcefire's Snort product, which is the market's most popular intrusion protection system (IPS). Firepower services bring powerful new capabilities including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-premier CCIE network consultants can assist you to maintain your legacy PIX or Cisco ASA 5500 firewalls and migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist you to design, deploy, optimize, manage and troubleshoot firewall environments based on Cisco ASA 5500-X firewalls with Firepower Services. Learn additional information about Cisco ASA Firewalls with Firepower Services configuration and debugging support.
Cisco Security and Virtual Private Network Support Services
Cisco's network security and remote connection technology offer a complete range of easy-to-administer security products to help safeguard your local and remote network infrastructure. Cisco's Virtual Private Network product family includes switches, firewalls, intrusion detection systems and VPN concentrators. Progent's expert consulting staff includes field-proven specialists with Cisco's Certified Internetwork Expert and Cisco Certified Network Professional qualifications who can assist your company to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security solutions that align most closely with your company objectives. Find out more details concerning Progent's Consulting Expertise for Cisco Security and VPN Products.
Consulting Services for Additional Firewall and Virtual Private Network Products
Progent offers small and medium size companies professional consulting for Intrusion Protection Systems and IPsec VPN technology from major firewall and Virtual Private Network security vendors including Check Point Software, Juniper Networks, and Symantec. Progent can show you how to create a comprehensive security plan and choose appropriate technologies from multiple vendors to achieve your security goals while sticking within your budget limits.
Progent's Low-Cost Managed Services for Information Security
Progent's value-priced ProSight line of network management outsourcing services is designed to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. Managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that utilizes cutting edge behavior analysis technology to defend endpoint devices and physical and virtual servers against modern malware assaults like ransomware and email phishing, which easily get by legacy signature-matching AV tools. ProSight ASM safeguards on-premises and cloud-based resources and offers a single platform to manage the entire malware attack progression including protection, detection, containment, remediation, and post-attack forensics. Top features include one-click rollback with Windows Volume Shadow Copy Service (VSS) and automatic network-wide immunization against newly discovered threats. Learn more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.
ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Security
Progent's ProSight Enhanced Security Protection (ESP) managed services offer affordable multi-layer security for physical servers and virtual machines, workstations, mobile devices, and Exchange Server. ProSight ESP utilizes adaptive security and advanced machine learning for continuously monitoring and reacting to security threats from all attack vectors. ProSight ESP provides two-way firewall protection, intrusion alarms, device management, and web filtering via cutting-edge tools packaged within a single agent accessible from a single console. Progent's data protection and virtualization experts can assist you to design and implement a ProSight ESP environment that meets your company's unique requirements and that helps you achieve and demonstrate compliance with legal and industry information protection standards. Progent will help you specify and configure policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alerts that call for urgent action. Progent's consultants can also assist your company to set up and test a backup and disaster recovery system like ProSight Data Protection Services (DPS) so you can recover quickly from a destructive cyber attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection unified endpoint protection and Exchange email filtering.
ProSight Data Protection Services: Managed Backup and Recovery
ProSight Data Protection Services provide small and mid-sized organizations a low cost and fully managed solution for secure backup/disaster recovery (BDR). For a fixed monthly cost, ProSight DPS automates your backup processes and allows fast recovery of vital data, applications and virtual machines that have become lost or damaged as a result of hardware failures, software glitches, disasters, human error, or malicious attacks such as ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, apps, system images, plus Microsoft Hyper-V and VMware images/. Important data can be backed up on the cloud, to a local device, or to both. Progent's cloud backup consultants can deliver world-class support to configure ProSight DPS to to comply with government and industry regulatory requirements such as HIPAA, FIRPA, PCI and Safe Harbor and, when necessary, can assist you to recover your critical data. Find out more about ProSight Data Protection Services Managed Cloud Backup.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering and email encryption service that incorporates the infrastructure of leading data security companies to deliver web-based management and comprehensive protection for all your inbound and outbound email. The powerful structure of Progent's Email Guard managed service integrates cloud-based filtering with an on-premises security gateway device to provide advanced defense against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-based malware. The cloud filter serves as a preliminary barricade and blocks most unwanted email from reaching your network firewall. This reduces your vulnerability to inbound attacks and saves network bandwidth and storage. Email Guard's onsite gateway appliance adds a deeper level of inspection for inbound email. For outgoing email, the local gateway provides AV and anti-spam protection, protection against data leaks, and email encryption. The on-premises gateway can also help Microsoft Exchange Server to track and protect internal email traffic that originates and ends within your corporate firewall. For more information, see ProSight Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small business can have its key servers and apps hosted in a protected Tier III data center on a high-performance virtual machine host set up and managed by Progent's IT support experts. Under the ProSight Virtual Hosting service model, the customer owns the data, the OS software, and the apps. Since the environment is virtualized, it can be ported immediately to a different hosting environment without requiring a time-consuming and difficult configuration procedure. With ProSight Virtual Hosting, your business is not tied a single hosting service. Find out more about ProSight Virtual Hosting services.
ProSight IT Asset Management: Network Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, maintain, find and safeguard information related to your network infrastructure, procedures, applications, and services. You can quickly locate passwords or IP addresses and be warned about impending expirations of SSL certificates ,domains or warranties. By updating and managing your IT infrastructure documentation, you can save as much as half of time spent looking for critical information about your IT network. ProSight IT Asset Management includes a common location for holding and sharing all documents required for managing your network infrastructure such as recommended procedures and How-To's. ProSight IT Asset Management also offers advanced automation for gathering and associating IT information. Whether youíre making improvements, performing maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the information you require when you need it. Learn more details about ProSight IT Asset Management service.
Expert Network Security Consulting
Any business ought to develop a thoroughly thought out security strategy that incorporates both preventive procedures and response planning. The proactive strategy is a set of mechanisms designed to reduce vulnerabilities. The post-attack strategy helps your company's IT security engineers to assess the impact caused by a security penetration, fix the network, record the event, and get business functions running as rapidly as possible.
Progent's certified information security engineers can to assist you to perform a comprehensive vulnerability evaluation and create a computer security plan to implement security policies and controls to mitigate ongoing assaults and dangers.
CISM Accredited Network Security Support Services
The CISM committee defines the core competencies and global standards of performance that IT security professionals are required to master. CISM gives executive management the confidence that those who have qualified for their CISM credential have the experience and knowledge to provide efficient security administration and consulting consulting. Progent can provide the expertise of CISM Premier security consultants to help companies with:
Learn additional information about Progent's CISM Certified Network Security Engineering Expertise.
- IS Security Governance
- Vulnerability Analysis
- Information Security Implementation Management
- IS Security Management
- Recovery Management
CISSP Accredited Security Engineering Assistance
The CISSP credential denotes mastery of a worldwide standard for information security. The American National Standards Institute has awarded the CISSP credential accreditation in the area of information security defined by ISO/IEC 17024. Progent can provide the services of security consultants who have qualified for CISSP accreditation. Progent can provide a CISSP-certified professional to help your enterprise in a variety security fields including:
Find out more details about Progent's CISSP Security Support Services.
- Security Administration Practices
- Security Architecture and Paradigms
- Access Management Systems and Processes
- Applications Development Security
- Secure Operations
- Physical Security
- Cryptography Mechanisms
- Telecom, Network and Internet Security
- Disaster Recovery Planning
CISSP-ISSAP Qualified Secure Network Architecture Consulting Services
Progent's CISSP-ISSAP Premier IT architecture professionals are experts who have earned ISSAP status as a result of thorough testing and extensive work with network security design. The Information System Security Architecture Professional (ISSAP) certification indicates demonstrated mastery in the most challenging requirements of information security architecture bounded by the wider field of IS security expertise required for CISSP accreditation. Progent's ISSAP-certified security consultants can assist your business with all phases of architecture security including.
Read more details about Progent's ISSAP Certified Secure IT Architecture Consulting Professionals.
- Access Management Mechanisms and Methodologies
- Telecommunications and System Infrastructure Protection
- Cryptography Options
- Needs Analysis and Security Standards
- Business Continuity Planning and Disaster Recovery Planning
- Physical Security
CISA Qualified Information System Security Auditing Consulting Support
The CISA credential is a prestigious qualification that represents mastery in IS security audit and control. Certified by the American National Standards Institute (ANSI), the CISA accreditation has candidates pass a comprehensive examination administered by the ISACA professional association. Progent's CISA-qualified security audit consultants can help your IT organization in the areas of:
Learn additional details concerning Progent's CISA Qualified IS Security Auditing Engineering Services.
- Information Systems Audit Process
- IT Enforcement
- Network Assets and Infrastructure Lifecycle
- Information Technology Support
- Protecting Data Resources
- Disaster Recovery Planning
Certified in Risk and Information Systems Control (CRISC) Consultants
The Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA in 2010 to validate an IT professional's skills to plan, deploy, and maintain information system control mechanisms to reduce network risk. Progent can provide the expertise of a CRISC-certified consultant to assist you to create and carry out a workplace continuity strategy based on leading practices promoted by CRISC and crafted to align with your company's risk appetite, business objectives, and budgetary guidelines. Progent's CRISC-qualified network risk management specialists can provide a range of risk assessment services including:
Read more details concerning Progent's CRISC Risk Management Experts.
- Collect data and study documentation to help identify major risk scenarios
- Inventory statutory, regulatory, and contractual requirements and organizational standards related to your information system to assess their possible impact on your business goals
- Point out possible vulnerabilities for your business processes to help in analyzing your enterprise risk
- Create a risk awareness initiative and conduct seminars to make sure your stakeholders appreciate IS risk so they can contribute to your risk management process
- Connect identified risk scenarios to related operational processes to help assign risk ownership
- Validate risk tolerance with executive leadership and major stakeholders to ensure they match
GIAC Certified Security Engineering Expertise
Find out additional information about Progent's GIAC Information Assurance Expertise.
Global Information Assurance Certification was established in 1999 to certify the knowledge of information technology security engineers. GIAC's mission is to assure that an accredited professional has the skills necessary to deliver support in vital areas of network, information, and application security. GIAC accreditations are acknowledged by companies and government organizations throughout the world including and the U.S. National Security Agency. Progent's GIAC-qualified IS security audit specialists are available to assist your IT organization with:
Get in Touch with a Progent Security Specialist
To learn how to get in touch with a certified security consultant for remote or onsite expertise in Oregon, phone 1-800-993-9400 or go to Remote Computer Support.