Business networks in Oregon can depend on fast and economical remote technical support from Progent's certified security experts to assist with the toughest security problems. The cost is reasonable, charges are per minute, engagement is quick, and support is world class. Progent also provides help for complex projects that requires the expertise of senior security engineers with top industry certifications.
In case your Oregon network is located outside of major metropolitan neighborhoods like Portland, Salem, Eugene, Gresham, or Beaverton, the availability of nearby certified network security professionals is often problematic when you have an urgent situation. This can cause a drop in productivity for your company, angry clients, unproductive workers, and defocused executives. By calling Progent, you can get in touch with a Premier security professional who can deliver expertise whenever you have to have it to keep your system on line and salvage your information.
Progent can assist you at any level in your efforts to guard your information system with support services that ranges from network security checks to creating a comprehensive security plan. Progent offers affordable service to assist small and midsize companies to design and manage protected networks based on Microsoft Windows and Cisco products and that may include servers and desktops based on UNIX, Linux, Solaris, or Apple Mac OS X operating systems as well as BYOD users with Apple iOS handhelds or Android or Windows Phone smart phones and tablets.
Progent can also assist you to outsource spam filtering and protection from e-mail-based security threats. Email Guard is Progent's email security solution that uses the services and infrastructure of leading information security companies to deliver centralized control and world-class protection for all your inbound and outbound email. The hybrid architecture of Email Guard integrates cloud-based filtering with a local gateway appliance to offer advanced defense against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-based malware. The cloud filter acts as a first line of defense and blocks the vast majority of unwanted email from making it to your security perimeter. This reduces your exposure to inbound attacks and saves system bandwidth and storage space. ProSight Email Guard's onsite security gateway device adds a further level of inspection for incoming email. For outgoing email, the local gateway offers anti-virus and anti-spam filtering, DLP, and email encryption. The local gateway can also enable Microsoft Exchange Server to track and safeguard internal email traffic that originates and ends within your corporate firewall.
Progent's certified consultants are available online or on site to provide a range of emergency or longer-term IT security services such as:
If your network has an immediate requirement for IT security help, refer to Progent's Urgent Remote Technical Support.
- Run automated network security evaluations
- Recuperate rapidly after attacks
- Set up firewalls from multiple vendors
- Configure secure techniques for remote and mobile access
- Deploy advanced solutions for protection against viruses, spam and directory harvest attacks
- Help create a comprehensive security plan with 24x7 network monitoring
- Provide outsourced Call Center Services
- Help Create an effective network backup and restore strategy based on Microsoft DPM backup capability
Progent's support professionals can deliver world-class support in vital areas of network security that include auditing, firewall/VPN support, and high-level security consulting.
System Security Evaluation
Progent's expert security engineers can evaluate the effectiveness of your existing computer protection implementation through comprehensive remote automated analysis based on sophisticated software tools and tested techniques. Progent's skill in this testing saves your company consulting fees and assures a detailed picture of gaps. The information your IT organization is provided can be used as the foundation of a network protection plan that will permit your network to run safely and react quickly to new threats.
Automated Vulnerability Assessment
Progent provides consulting in the use of security evaluation products such as Microsoft's MBSA and LANguard from GFI for affordably performing a variety of automatic network testing checks to uncover possible security vulnerabilities. Progent has extensive experience with other network auditing utilities including NMAP Port Scanner, AMAP Application Scanner, eEye Vulnerability Scanner, plus utilities like Metasploit, Hydra, and Nikto. Progent can help you to understand audit reports and respond appropriately.
Progent can show you how to build security into your business operations, configure auditing applications, define and deploy a secure system environment, and recommend policies to maximize the security of your IT system. Progent's security professionals are available to show you how to set up a firewall, implement secure remote connectivity to email and business applications, and integrate virtual private network. Learn additional information on Progent's automated security audits.
Security Inventory Service Packages for Small Companies
Progent offers two ultra-affordable security inventory packages designed to enable small companies to get an impartial network security evaluation from an accredited security specialist. With Progent's External Network Security Inventory Checkup, a security expert runs a comprehensive examination of your network from outside your firewalled perimeter to uncover possible weaknesses in the security profile you expose to the outside world. With Progent's Internal Security Inventory Checkup, a certified security professional runs a system scan from a secure computer inside your firewall to evaluate your exposure to internal assaults. The two security inventory packages are set up and run from a protected remote location. The project is directed by an engineer who has earned top security credentials and who produces a document that summarizes and interprets the information captured by the security scan and suggests practical improvements if appropriate.
Network Intrusion Analysis Support Services
Stealth penetration testing is a key component of any successful network security strategy. Progentís security experts can perform extensive intrusion tests without the awareness of your organization's in-house IT staff. Stealth penetration testing uncovers whether existing security monitoring tools such as intrusion incident warnings and event history monitoring are properly set up and actively checked. Learn more on Progent's stealth security penetration analysis consulting.
Firewalls and VPN Expertise
Progent's expertise in network security solutions encompasses extensive field work with leading firewalls and Virtual Private Network products offered by a variety of companies including Cisco, Microsoft, and Juniper. Progent offers the support of consultants with key industry accreditations including CCIE and Microsoft MCSE.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Integration and Debugging
The current ASA 5500-X Family of firewalls with Firepower Services deliver significantly more value than Cisco's earlier PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 security appliances for new deployments. Since Cisco's purchase of Sourcefire, the entire line of ASA 5500-X devices can be configured to enable Firepower Services, based on Sourcefire's Snort technology, which is the world's most popular network intrusion protection system. Firepower services provide enhanced features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network experts can assist your company to maintain your current PIX or Cisco ASA 5500 firewalls or upgrade efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist you to plan, integrate, optimize, manage and troubleshoot firewall solutions based on Cisco ASA 5500-X firewalls with Firepower Services. Learn more details about Cisco ASA 5500-X Firewalls with Firepower integration and troubleshooting support.
Cisco Security and Virtual Private Network Support Services
Cisco's security and offsite access technology offer a complete range of easy-to-administer security products to help safeguard your wired and wireless network infrastructure. Cisco's Virtual Private Network product family features routers, firewalls, intrusion detection systems and VPN appliances. Progent's expert staff of consultants includes field-proven engineers with Cisco's Certified Internetwork Expert and CCNP certifications who can assist your business to select Cisco VPN, Cisco RADIUS Security, and additional Cisco security solutions that align most closely with your company goals. Find out additional information about Progent's Consulting Expertise for Cisco Security Technology and Virtual Private Network Products.
Engineering Expertise for Additional Firewall and VPN Products
Progent provides small and mid-size businesses professional consulting for Intrusion Protection products and IPsec VPN solutions from major firewall and Virtual Private Network security companies such as WatchGuard, Juniper, and Symantec. Progent can help you design a detailed security plan and select the right products from multiple suppliers to support your security objectives while staying within your spending restraints.
Progent's Low-Cost Managed Services for Information Security
Progent's affordable ProSight family of network monitoring and management services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance and compliance. ProSight managed services offered by Progent include:
ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that incorporates cutting edge behavior machine learning technology to defend endpoints and physical and virtual servers against new malware attacks like ransomware and email phishing, which easily escape traditional signature-matching anti-virus products. ProSight Active Security Monitoring safeguards on-premises and cloud resources and offers a single platform to address the complete malware attack lifecycle including blocking, identification, mitigation, cleanup, and forensics. Key features include one-click rollback using Windows Volume Shadow Copy Service and automatic system-wide immunization against newly discovered attacks. Find out more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware defense.
ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Security
Progent's ProSight Enhanced Security Protection (ESP) managed services offer economical multi-layer protection for physical servers and virtual machines, workstations, smartphones, and Exchange Server. ProSight ESP utilizes contextual security and modern behavior analysis for continuously monitoring and responding to cyber assaults from all vectors. ProSight ESP provides two-way firewall protection, penetration alarms, endpoint management, and web filtering via cutting-edge technologies incorporated within a single agent accessible from a unified console. Progent's data protection and virtualization experts can help your business to design and implement a ProSight ESP environment that addresses your organization's specific needs and that allows you prove compliance with government and industry information security regulations. Progent will help you define and configure security policies that ProSight ESP will manage, and Progent will monitor your IT environment and respond to alerts that call for immediate action. Progent's consultants can also assist your company to set up and verify a backup and disaster recovery system such as ProSight Data Protection Services (DPS) so you can get back in business rapidly from a destructive cyber attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Microsoft Exchange filtering.
ProSight Data Protection Services: Managed Backup and Recovery
ProSight Data Protection Services provide small and mid-sized organizations an affordable end-to-end solution for reliable backup/disaster recovery (BDR). For a low monthly rate, ProSight DPS automates and monitors your backup processes and enables rapid restoration of critical files, applications and VMs that have become unavailable or corrupted due to component failures, software glitches, disasters, human error, or malware attacks such as ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, apps, system images, as well as Microsoft Hyper-V and VMware images/. Important data can be protected on the cloud, to an on-promises device, or to both. Progent's backup and recovery specialists can provide advanced expertise to configure ProSight DPS to to comply with government and industry regulatory requirements such as HIPPA, FINRA, PCI and Safe Harbor and, when needed, can assist you to recover your business-critical data. Read more about ProSight DPS Managed Cloud Backup.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering and email encryption service that uses the technology of leading information security vendors to provide web-based management and comprehensive security for your email traffic. The powerful architecture of Progent's Email Guard managed service integrates cloud-based filtering with an on-premises security gateway device to offer advanced defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-based threats. Email Guard's cloud filter acts as a preliminary barricade and keeps the vast majority of threats from making it to your network firewall. This decreases your vulnerability to external attacks and conserves system bandwidth and storage. Email Guard's onsite gateway appliance adds a further level of inspection for incoming email. For outbound email, the on-premises security gateway provides AV and anti-spam protection, protection against data leaks, and email encryption. The local gateway can also help Exchange Server to track and safeguard internal email that stays inside your corporate firewall. For more details, see ProSight Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small organization can have its critical servers and applications hosted in a protected Tier III data center on a fast virtual machine host configured and managed by Progent's IT support experts. Under the ProSight Virtual Hosting service model, the customer retains ownership of the data, the OS platforms, and the applications. Because the environment is virtualized, it can be moved easily to an alternate hosting solution without requiring a lengthy and technically risky reinstallation procedure. With ProSight Virtual Hosting, your business is not locked into a single hosting service. Learn more about ProSight Virtual Hosting services.
ProSight IT Asset Management: IT Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to capture, maintain, find and safeguard information related to your network infrastructure, processes, business apps, and services. You can quickly find passwords or IP addresses and be alerted about impending expirations of SSL certificates or warranties. By updating and organizing your IT infrastructure documentation, you can save up to half of time wasted searching for vital information about your IT network. ProSight IT Asset Management features a common location for storing and collaborating on all documents required for managing your network infrastructure such as standard operating procedures and How-To's. ProSight IT Asset Management also supports advanced automation for collecting and relating IT information. Whether youíre planning enhancements, doing maintenance, or responding to a crisis, ProSight IT Asset Management gets you the data you require as soon as you need it. Find out more about ProSight IT Asset Management service.
Expert Security Design
Every company should have a carefully thought out security strategy that incorporates both proactive processes and reaction planning. The proactive plan is a set of mechanisms intended to minimize security weaknesses. The post-attack strategy helps your company's security engineers to assess the damage caused by an attack, fix the network, record the event, and get business functions restored as rapidly as possible.
Progent's expert IT security consultants can to assist you to perform a comprehensive risk evaluation and define a computer security plan to implement security policies and controls to mitigate ongoing attacks and threats.
CISM Accredited Security Consulting Services
The Certified Information Security Manager (CISM) committee describes the basic capabilities and global standards of skill that information security managers are required to learn. It gives business management the confidence that consultants who have earned their CISM credential have the experience and capability to deliver effective security management and support consulting. Progent offers the expertise of CISM Certified security professionals to help businesses with:
Learn more details concerning Progent's CISM Security Support Services.
- Network Security Governance
- Risk Management
- Network Security Implementation Management
- Information Security Administration
- Recovery Planning
CISSP Qualified Security Consulting Assistance
CISSP certification denotes mastery of a global standard for network security. ANSI has awarded certification recognition in the area of information protection under ISO/IEC 17024. Progent offers access to of security professionals who have qualified for CISSP certification. Progent can give you access to a CISSP-certified expert to help your business in a variety security areas including:
Read additional details about Progent's CISSP Security Support Professionals.
- Security Management Procedures
- Security Infrastructure and Models
- Access Control Solutions and Processes
- Software Development Security
- Secure Operations
- Physical Security
- Cryptography Mechanisms
- Telecommunications, LAN and WAN Security
- Disaster Recovery Planning
CISSP-ISSAP Certified Secure IT Architecture Engineering Support
Progent's CISSP-ISSAP Certified information system architecture professionals are consultants who have been awarded ISSAP Certification through thorough examination and extensive experience with network security architecture. The ISSAP credential indicates demonstrated skill in the more complex demands of information system security architecture within the wider field of information system security expertise required for CISSP accreditation. Progent's ISSAP-premier security specialists can assist your company with all aspects of secure network architecture such as.
Learn additional details concerning Progent's ISSAP Qualified Secure Information System Architecture Consulting Professionals.
- Access Management Systems and Methodologies
- Telecommunications and Network Protection
- Cryptography Options
- Requirements Evaluation and Security Guidelines
- Business Continuity Planning and Disaster Recovery Planning
- Hardware Security
CISA Certified Security Auditing Consulting Services
The Certified Information Systems Auditor (CISA) credential is a globally recognized qualification that represents mastery in network security audit and control. Certified by the American National Standards Institute, the CISA credential requires that consultants pass a comprehensive test given by the ISACA international professional group. Progent's CISA-certified IS security audit experts can help your company in the areas of:
Find out more details concerning Progent's CISA Certified Network Security Auditing Consulting Services.
- Information Systems Audit Process
- IT Enforcement
- Systems and Architecture Planned Useful Life
- IT Service Delivery
- Protecting Information Resources
- Business Continuity Preparedness
The CRISC program was initiated by ISACA to verify a consultant's skills to design, deploy, and support IS control mechanisms to mitigate network risk. Progent can provide the expertise of a CRISC-certified engineer to assist you to develop and carry out a business continuity plan based on leading practices identified by CRISC and geared to match your company's risk appetite, business objectives, and IT budget. Progent's CRISC-qualified network risk mitigation engineers offer a variety of risk assessment services such as:
Learn the details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.
- Gather information and review documentation to identify significant vulnerabilities
- Inventory legal, regulatory, and contractual requirements and company policies associated with your network to assess their potential impact on your business goals
- Identify possible threats for your operational workflows to help in evaluating your enterprise risk
- Create a risk awareness initiative and conduct training to make sure your organization understand IS risk so they can contribute to your risk management program
- Connect identified risk scenarios to related operational procedures to help assign risk responsibility
- Validate risk tolerance with your senior leadership and major stakeholders to make sure they match
GIAC Certified IS Security Consulting Support
Learn additional details about Progent's GIAC Information Assurance Services.
GIAC was founded in 1999 to certify the knowledge of computer security experts. GIAC's mission is to ensure that a certified security consultant possesses the knowledge needed to provide support in vital areas of system, information, and program security. GIAC accreditations are recognized by businesses and institutions throughout the world including and the United States National Security Agency. Progent's GIAC-qualified IS security audit engineers are available to assist your company in the areas of:
Talk to a Certified Security Expert
To find out how to contact a certified security engineer for remote or onsite expertise in Oregon, phone 1-800-993-9400 or go to Online Network Help.