Small business information networks in Oregon can have fast and economical remote access to Progent's qualified network security consultants to assist with critical security problems. Rates are affordable, charges are by the minute, sign-up is fast, and service is unbeatable. Progent also offers help for complex projects that demand the knowledge of seasoned security consultants with high-level security credentials.
If your Oregon network is located far from larger metropolitan areas such as Portland, Salem, Eugene, Gresham, or Beaverton, help from nearby accredited network security engineers is often limited when there's a crisis. This can result in lost income for your company, angry customers, unproductive workers, and defocused management. By contacting Progent, you can get in touch with a Certified security consultant who can deliver expertise whenever you need it to get your computer network operating and recover your data.
Progent can assist you in your efforts to guard your information system with support services ranging from security audits to creating a comprehensive security strategy. Progent provides affordable support to assist businesses of all sizes to design and maintain secure IT environments powered by Windows and Cisco technology and that can include computers running UNIX, Linux, Sun Solaris, or Mac OS X operating systems as well as BYOD users with Apple handhelds or Android or Windows Phone devices.
Progent can also help you outsource spam filtering and protection from e-mail-based assaults. Email Guard is Progent's email security platform that incorporates the services and infrastructure of leading information security companies to deliver centralized management and world-class protection for your inbound and outbound email. The hybrid structure of Email Guard managed service integrates cloud-based filtering with an on-premises security gateway appliance to offer advanced defense against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-borne malware. ProSight Email Guard's cloud filter serves as a first line of defense and blocks most threats from reaching your security perimeter. This decreases your exposure to inbound attacks and conserves network bandwidth and storage. ProSight Email Guard's on-premises security gateway appliance adds a deeper level of analysis for incoming email. For outgoing email, the local security gateway offers anti-virus and anti-spam filtering, DLP, and encryption. The on-premises gateway can also help Exchange Server to track and safeguard internal email that stays inside your security perimeter.
Progent's security consultants are available online or in person to offer a range of urgent or longer-term IT security services including:
If your company has an emergency requirement for IT security support, go to Progent's Emergency Remote Network Support.
- Run automated security audits
- Clean up quickly after virus and worm attacks
- Configure hardware and software firewalls
- Configure secure techniques for remote and mobile connectivity
- Install advanced utilities for automatic protection against viruses, spam and DHAs
- Help create a comprehensive security strategy with 24x7 network monitoring
- Provide comprehensive Help Desk Services
- Develop an effective backup and recovery plan based on Data Protection Manager (DPM) backup/restore technology
Progent's engineers provide world-class services in vital facets of system protection including security evaluation, firewall and VPN expertise, and high-level security consulting.
Progent's expert security engineers can evaluate the vulnerability of your existing network security systems by performing exhaustive remote automated analysis via advanced software tools and tested techniques. Progent's skill in administering this testing saves you time and money and offers an accurate picture of system vulnerability. The knowledge your business is provided can make up the foundation of a network protection strategy that can allow your information system to operate dependably and react quickly to future threats.
Automated Network Security Analysis
Progent offers consulting in the use of security analysis products such as MBSA and GFI LANguard NSS for economically performing a variety of programmed network auditing checks to uncover potential security weaknesses. Progent has extensive knowledge of additional security analysis utilities including NMAP Port Scanner, AMAP, eEye, as well as utilities such as Metasploit, Netcat, Socat, and Nikto. Progent can show you how to make sense of testing reports and react effectively.
Progent can help you build protection into your business operations, configure scanning applications, define and deploy a secure network architecture, and recommend procedures to optimize the security of your network. Progent's security engineers are available to help you configure a firewall, design secure remote connectivity to email and business applications, and install VPN. Learn additional information about Progent's automated security evaluation.
Security Inventory Bundles for Small Companies
Progent has put together two low-cost security inventory packages intended to allow small companies to receive a professional security assessment from an accredited security consultant. With Progent's External Network Security Inventory Scan, a security engineer administers an extensive examination of your network from outside your firewalled perimeter to determine possible risks in the security profile you expose to the public. With Progent's Internal Network Security Inventory Checkup, a certified security professional executes a network scan from a secure computer inside your firewall to evaluate the risk to internal attacks. The two security inventory packages are set up and executed from a protected remote site. The process is managed by an engineer with top security credentials and who produces a document that details and analyzes the data captured by the scan and suggests practical remediation if called for.
Network Intrusion Testing Consulting
Stealth penetration testing is a key component of any comprehensive IT system security strategy. Progentís security experts can perform extensive penetration tests without the awareness of your company's in-house network support resources. Stealth penetration testing shows whether existing security defense tools such as intrusion detection warnings and event history analysis are correctly configured and consistently checked. Learn additional information concerning Progent's stealth penetration analysis support services.
Firewalls and VPN Support
Progent's expertise in security solutions includes in-depth familiarity with leading firewalls and VPN technology from multiple vendors including Cisco, Microsoft, and Juniper. Progent can provide the support of engineers who have earned important networking certifications including Cisco Certified Internetwork Expert (CCIE) and Microsoft MCSE.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Configuration and Debugging
The current ASA 5500-X Series Next-Generation Firewalls with Firepower Services offer substantially more performance than Cisco's previous PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 firewalls for all new deployments. After Cisco's acquisition of Sourcefire, the whole line of Cisco ASA 5500-X firewalls can be configured to support Firepower Services, based on Sourcefire's Snort product, which is the market's most deployed intrusion protection system. Firepower services provide enhanced features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network experts can help you to manage your existing PIX or ASA 5500 security appliances and upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and onsite support for ASA 5500-X firewalls with Firepower Services and can assist your organization to plan, deploy, optimize, manage and troubleshoot firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. See more details about ASA 5500-X Firewalls with Firepower integration and troubleshooting support.
Cisco Security and VPN Engineering Services
Cisco's security and remote connection technology provide a comprehensive range of manageable security solutions to help protect your wired and wireless information system. Cisco's VPN product family features routers, firewalls, intrusion detection systems and Virtual Private Network concentrators. Progent's professional staff of consultants includes experienced engineers with Cisco's Certified Internetwork Expert and CCNP certifications who are able to assist your company to select Cisco VPN, Cisco RADIUS Security, and other Cisco security solutions that align most closely with your company objectives. Read more information concerning Progent's Support Expertise for Cisco Security Solutions and VPN Appliances.
Engineering Expertise for Additional Firewall and Virtual Private Network Solutions
Progent offers small and mid-size businesses professional support for Intrusion Protection products and IPsec VPN technology from leading firewall and VPN security companies including WatchGuard, Juniper Networks, and Symantec. Progent can show you how to design a comprehensive security plan and choose the right products from a variety of vendors to support your security goals while sticking within your spending limits.
Progent's Low-Cost Managed Services for Information Security
Progent's affordable ProSight family of network management outsourcing services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection service that incorporates next generation behavior machine learning technology to guard endpoint devices and servers and VMs against modern malware assaults like ransomware and email phishing, which easily escape traditional signature-based AV products. ProSight Active Security Monitoring safeguards on-premises and cloud resources and provides a single platform to address the complete threat progression including blocking, detection, containment, remediation, and post-attack forensics. Key capabilities include one-click rollback using Windows Volume Shadow Copy Service and real-time system-wide immunization against new threats. Read more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense.
ProSight Enhanced Security Protection (ESP): Unified Endpoint Security
ProSight Enhanced Security Protection services deliver ultra-affordable in-depth protection for physical and virtual servers, desktops, smartphones, and Exchange email. ProSight ESP utilizes contextual security and advanced heuristics for round-the-clock monitoring and reacting to security assaults from all vectors. ProSight ESP provides firewall protection, intrusion alarms, device management, and web filtering through leading-edge tools incorporated within a single agent accessible from a single control. Progent's security and virtualization experts can help you to design and implement a ProSight ESP environment that meets your organization's specific requirements and that allows you achieve and demonstrate compliance with legal and industry information protection regulations. Progent will assist you define and implement security policies that ProSight ESP will enforce, and Progent will monitor your IT environment and react to alerts that require immediate attention. Progent's consultants can also help you to install and verify a backup and disaster recovery system like ProSight Data Protection Services so you can recover quickly from a destructive cyber attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint protection and Exchange email filtering.
ProSight Data Protection Services: Managed Backup and Recovery
ProSight Data Protection Services from Progent offer small and mid-sized organizations an affordable end-to-end service for reliable backup/disaster recovery (BDR). Available at a low monthly cost, ProSight DPS automates and monitors your backup activities and allows fast recovery of critical data, apps and VMs that have become lost or corrupted due to hardware failures, software glitches, disasters, human mistakes, or malware attacks like ransomware. ProSight DPS can help you protect, recover and restore files, folders, applications, system images, plus Microsoft Hyper-V and VMware images/. Important data can be backed up on the cloud, to a local storage device, or mirrored to both. Progent's backup and recovery specialists can deliver advanced support to set up ProSight Data Protection Services to to comply with government and industry regulatory standards like HIPPA, FINRA, PCI and Safe Harbor and, when necessary, can help you to recover your business-critical information. Read more about ProSight Data Protection Services Managed Backup and Recovery.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering service that incorporates the technology of top information security companies to provide centralized management and comprehensive protection for your email traffic. The powerful structure of Email Guard managed service combines cloud-based filtering with a local gateway appliance to offer advanced defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. The cloud filter acts as a preliminary barricade and keeps the vast majority of threats from reaching your network firewall. This reduces your vulnerability to inbound threats and saves network bandwidth and storage. Email Guard's onsite security gateway device provides a deeper layer of inspection for incoming email. For outbound email, the local security gateway offers AV and anti-spam filtering, protection against data leaks, and email encryption. The on-premises security gateway can also help Exchange Server to track and protect internal email traffic that originates and ends within your corporate firewall. For more details, visit Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small business can have its critical servers and applications hosted in a secure fault tolerant data center on a fast virtual machine host configured and managed by Progent's IT support professionals. Under the ProSight Virtual Hosting model, the client retains ownership of the data, the operating system software, and the applications. Since the environment is virtualized, it can be ported easily to a different hosting solution without requiring a lengthy and technically risky reinstallation procedure. With ProSight Virtual Hosting, you are not tied a single hosting provider. Learn more about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to create, update, retrieve and protect information related to your network infrastructure, processes, applications, and services. You can instantly locate passwords or IP addresses and be alerted about impending expirations of SSL certificates ,domains or warranties. By cleaning up and managing your IT infrastructure documentation, you can eliminate up to half of time thrown away looking for vital information about your IT network. ProSight IT Asset Management features a centralized location for holding and collaborating on all documents required for managing your business network such as standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also offers advanced automation for gathering and relating IT information. Whether youíre planning improvements, performing maintenance, or responding to a crisis, ProSight IT Asset Management delivers the knowledge you need as soon as you need it. Learn more about Progent's ProSight IT Asset Management service.
Expert Network Security Planning
Any business ought to develop a carefully considered security program that incorporates both proactive processes and response planning. The pre-attack plan is a collection of procedures that help to reduce security weaknesses. The post-attack strategy assists your security engineers to assess the impact caused by an attack, fix the system, document the event, and get business functions running as rapidly as feasible.
Progent's expert IS security engineers can to assist you to perform a full vulnerability assessment and create a network security plan to implement security processes and mechanisms to reduce future assaults and dangers.
CISM Accredited Information Security Engineering Services
The Certified Information Security Manager (CISM) organization describes the basic capabilities and global standards of skill that information security managers are required to learn. CISM gives executive management the assurance that those who have earned their CISM credential possess the background and knowledge to deliver efficient security management and consulting consulting. Progent offers the services of CISM Premier security consultants to assist companies with:
Learn additional information about Progent's CISM Certified Information Security Consulting Expertise.
- IS Security Strategies
- Vulnerability Analysis
- Network Security Program Management
- Network Security Management
- Response Management
CISSP Accredited Security Consulting Assistance
The CISSP credential recognizes expertise with an international standard for network security. ANSI has granted the CISSP credential recognition in the field of information protection stipulated by ISO 17024. Progent offers access to of security professionals who have qualified for CISSP certification. Progent can give you access to a CISSP-certified expert to help your company in a broad range of security fields including:
Find out additional details concerning Progent's CISSP Qualified Information Security Consulting Professionals.
- Security Administration Practices
- Security Architecture and Models
- Access Control Solutions and Methodology
- Software Development Security
- Secure Operations
- Physical Security
- Data Encryption Mechanisms
- Telecom, LAN and Internet Security
- Disaster Recovery Planning
CISSP-ISSAP Qualified Secure Information System Architecture Engineering Expertise
Progent's CISSP-ISSAP Certified information system architecture professionals are consultants who have earned ISSAP Certification as a result of rigorous testing and significant work with network security design. The ISSAP credential represents proven competence in the most challenging demands of IS security architecture bounded by the broader field of information security expertise required for CISSP certification. Progent's ISSAP-premier security specialists can assist your business with all phases of architecture security such as.
Learn more information about Progent's ISSAP Qualified Secure Network Architecture Engineering Expertise.
- Access Management Mechanisms and Methodologies
- Telecommunications and System Infrastructure Security
- Cryptography Options
- Requirements Evaluation and Security Guidelines
- Business Continuity Planning (BCP) and Disaster Recovery Planning
- Hardware Security
CISA Accredited Network Security Auditing Engineering Services
The Certified Information Systems Auditor (CISA) credential is an important achievement that signifies expertise in information system security auditing. Certified by the American National Standards Institute (ANSI), the CISA accreditation has consultants undergo an extensive test administered by the ISACA professional group. Progent's CISA-qualified IS security audit experts are available to assist your business with:
Learn additional details about Progent's CISA Certified IS Security Auditing Consulting Assistance.
- IS Audit Services
- Information Technology Enforcement
- Network Assets and Architecture Planned Useful Life
- IT Service Delivery
- Safeguarding Information Assets
- Business Continuity Preparedness
The Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA to verify a consultant's ability to plan, deploy, and support information system controls to mitigate network risk. Progent can provide the services of a CRISC-certified engineer to assist your company to create and execute a business continuity or disaster recovery strategy based on industry best practices promoted by CRISC and crafted to match your company's risk tolerance, business goals, and IT budget. Progent's CRISC-qualified network risk management engineers offer a variety of risk assessment services including:
Read additional information about Progent's Certified in Risk and Information Systems Control (CRISC) Experts.
- Collect information and review documentation to evaluate significant vulnerabilities
- Inventory statutory, industry, and contractual requirements and company standards related to your network to assess their potential influence on your strategic goals
- Point out possible vulnerabilities for your business workflows to help in analyzing your enterprise risk
- Create a risk awareness program and conduct training to ensure your organization understand IT risk so they can contribute to your risk management program
- Match identified risk scenarios to your associated business procedures to help determine risk ownership
- Validate risk appetite with your senior management and key stakeholders to ensure they align
GIAC Accredited Security Consulting Support
Read additional details about Progent's GIAC Information Assurance Services.
GIAC was founded in 1999 to validate the skill of network security experts. GIAC's mission is to assure that a certified professional has the knowledge appropriate to deliver support in critical categories of network, information, and application software security. GIAC accreditations are acknowledged by companies and government organizations all over the world including and the U.S. National Security Agency (NSA). Progent's GIAC-qualified network security audit engineers are available to help your business with:
Talk to a Security Engineer
To see how to contact a security engineer for remote or on-premises support in Oregon, call 1-800-993-9400 or go to Remote Computer Support.