Portland Metro Area Contact Information:
Progent offers consulting services and onsite technical support throughout the Portland Metro Area.
Progent locations in the Portland Metro Area
For immediate remote help with network security issues, businesses in Portland, OR, have access to expert troubleshooting from Progent's security engineers. Progent's remote service consultants are ready to offer effective and affordable assistance with security crises that threaten the productivity of your information system. Progent's accredited security consultants are certified to support environments based on Windows, Linux, macOS and OS X, Sun, and major derivatives of UNIX. Progent's wide selection of consulting services covers firewall technology, email filtering and encryption, protected system design, and business continuity planning. Progent's technical support staff has been awarded the industry's top security credentials including GIAC and Information System Security Architecture Professional (ISSAP).
Progent offers online security assistance on a by-the-minute basis without minimum call duration and no extra charges for sign-up or off-hour support. By charging per minute and by delivering top-level help, Progent's pricing policy keeps costs low and eliminates scenarios where quick fixes entail big expenses.
Our System Has Been Hacked: What Can We Do?
In case your business is now experiencing a network security crisis, refer to Progent's Emergency Online Computer Support to find out how to receive fast help. Progent has a pool of certified cybersecurity specialists who offer remote and on-premises assistance that includes containment, mitigation, recovery, forensics, and enhancement of your cybersecurity profile to guard against future attacks.
For businesses who have planned carefully for an attack, the formal incident response procedure outlined by Global Information Assurance Certification is Progent's approved method of handling a serious security attack.
Introduction to Security Expertise
Managing network security plus preparedness for recovering vital information and systems after an attack requires an on-going effort involving a variety of technologies and processes. Progent's security experts can assist your business at all levels in your efforts to guard your information network, ranging from security assessments to designing a complete security plan. Important areas covered by Progent's security engineers include Security Planning and Implementation, Information Recovery and Security Failure Analysis, and Outsourced Filtering of Email-Based Spam and Viruses.
Designing and Implementing Protected Networks
Every company ought to develop a carefully thought out security strategy that incorporates both proactive and responsive elements. The pre-attack plan is a collection of steps that helps to minimize security gaps. The post-attack plan defines activities to assist security personnel to evaluate the damage caused by a breach, remediate the damage, record the experience, and revive business functions as soon as feasible. Progent can advise you how to design protection into your business processes. Progent can install auditing utilities, create and build a safe computer architecture, and propose procedures and policies to enhance the protection of your information system. Progent's security professionals are ready to assist you to configure a firewall, design safe offsite access to e-mail and information, and install an efficient VPN.
If you are looking for an economical way for jobbing out your network security management, Progent's 24x7 Network Support Services feature non-stop remote server tracking and immediate response to emergencies.
Hybrid Cloud Solutions
Progent can help your company you to design, implement, manage and repair enterprise hybrid cloud solutions that incorporate local and cloud hosted resources and that are compliant with government security requirements. (Learn about Progent's Office 365 integration with on-premises installations of Exchange, Azure enterprise hybrid cloud integration and Progent's Amazon Web Services (AWS) enterprise hybrid cloud solutions.)
System Recovery and Failure Analysis
Progent offers skill in restoring networks and servers that have been hacked, are in question, or have ceased to function as a result of a security breach. Progent can show you how to determine the losses caused by the attack, return your company to ordinary business operations, and retrieve data lost as a result of the event. Progent's certified engineers can also manage a comprehensive forensic analysis by examining event logs and using other proven assessment tools. Progent's background with security consulting reduces your downtime and allows Progent to propose efficient measures to avoid or contain new assaults.
Ransomware Removal and Recovery Expertise
Progent offers the help of proven ransomware recovery experts with the skills to reconstruct an IT network that has suffered an attack by a ransomware cryptoworm like Ryuk, WannaCry, NotPetya, or Locky. To learn more, visit ransomware removal and restoration expertise.
Progent's Flat-rate Managed Services for Information Assurance
Progent's value-priced ProSight family of outsourced network management services is designed to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all facets of information assurance. ProSight managed services offered by Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that utilizes cutting edge behavior-based analysis tools to guard endpoints as well as physical and virtual servers against modern malware assaults such as ransomware and file-less exploits, which routinely evade traditional signature-matching anti-virus products. ProSight ASM protects on-premises and cloud resources and provides a unified platform to address the entire threat lifecycle including blocking, infiltration detection, mitigation, cleanup, and forensics. Key features include single-click rollback using Windows Volume Shadow Copy Service (VSS) and real-time network-wide immunization against new attacks. Find out more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware defense.
ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Protection
Progent's ProSight Enhanced Security Protection (ESP) services offer affordable in-depth protection for physical and virtual servers, desktops, mobile devices, and Microsoft Exchange. ProSight ESP utilizes adaptive security and modern behavior analysis for continuously monitoring and responding to cyber threats from all vectors. ProSight ESP offers two-way firewall protection, intrusion alarms, endpoint control, and web filtering through cutting-edge tools incorporated within a single agent managed from a single console. Progent's data protection and virtualization consultants can help you to plan and implement a ProSight ESP environment that addresses your organization's unique requirements and that allows you prove compliance with government and industry data protection regulations. Progent will help you specify and configure policies that ProSight ESP will enforce, and Progent will monitor your network and react to alerts that require immediate action. Progent can also assist you to set up and test a backup and restore solution such as ProSight Data Protection Services (DPS) so you can recover rapidly from a destructive security attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint protection and Exchange filtering.
ProSight DPS: Managed Backup and Recovery
ProSight Data Protection Services from Progent offer small and mid-sized businesses an affordable and fully managed solution for reliable backup/disaster recovery. For a low monthly rate, ProSight Data Protection Services automates your backup activities and allows fast restoration of critical files, apps and VMs that have become unavailable or corrupted due to component breakdowns, software glitches, natural disasters, human mistakes, or malware attacks such as ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, applications, system images/, as well as Microsoft Hyper-V and VMware images/. Important data can be backed up on the cloud, to an on-promises device, or mirrored to both. Progent's cloud backup specialists can deliver world-class support to set up ProSight DPS to to comply with regulatory standards such as HIPPA, FIRPA, PCI and Safe Harbor and, whenever needed, can help you to recover your business-critical information. Read more about ProSight Data Protection Services Managed Cloud Backup and Recovery.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering service that uses the infrastructure of top data security companies to provide centralized control and comprehensive security for all your email traffic. The hybrid architecture of Progent's Email Guard managed service integrates a Cloud Protection Layer with a local gateway device to provide complete protection against spam, viruses, Denial of Service Attacks, DHAs, and other email-borne malware. The Cloud Protection Layer acts as a preliminary barricade and blocks the vast majority of threats from reaching your network firewall. This decreases your exposure to inbound attacks and conserves network bandwidth and storage space. Email Guard's on-premises gateway device provides a further level of inspection for incoming email. For outgoing email, the on-premises gateway provides anti-virus and anti-spam protection, protection against data leaks, and email encryption. The onsite security gateway can also assist Microsoft Exchange Server to track and protect internal email that originates and ends within your corporate firewall. For more information, visit Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small or mid-size business can have its key servers and apps hosted in a protected Tier III data center on a fast virtual machine host configured and maintained by Progent's network support experts. Under the ProSight Virtual Hosting service model, the customer owns the data, the operating system platforms, and the applications. Because the system is virtualized, it can be moved immediately to an alternate hosting environment without requiring a time-consuming and technically risky reinstallation process. With ProSight Virtual Hosting, you are not tied a single hosting service. Find out more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: IT Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to create, maintain, find and protect information about your IT infrastructure, processes, applications, and services. You can quickly find passwords or IP addresses and be alerted automatically about upcoming expirations of SSLs or domains. By cleaning up and organizing your network documentation, you can eliminate up to half of time spent looking for critical information about your network. ProSight IT Asset Management includes a centralized location for holding and collaborating on all documents related to managing your network infrastructure such as recommended procedures and How-To's. ProSight IT Asset Management also supports a high level of automation for gathering and associating IT data. Whether youíre planning enhancements, performing regular maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the information you require the instant you need it. Find out more details about ProSight IT Asset Management service.
Special Security Expertise Offered by Progent
Progent's veteran engineers offer unique expertise in vital facets of computer security including:
Vulnerability Evaluation and Compliance Testing
Progent provides experience with information risk evaluation tools like Microsoft Baseline Security Analyzer and LANguard from GFI for performing a variety of comprehensive network scans to uncover possible security problems. Progent has extensive experience with testing tools and can assist your company to analyze audit reports and respond efficiently. Progent's security engineers also can perform web application testing and can perform expert evaluation of corporate-wide security to determine your organization's compliance with major global security specifications such as HIPAA, NIST, and ISO. In addition, Progent can evaluate the strength of your wireless security including in-place wireless equipment plus mobile devices. Learn more information about Progent's Information Risk Evaluation and Compliance Assessment.
Cisco Security, PIX and ASA Firewall, Virtual Private Network (VPN), Aironet and Meraki Wireless Consulting
Progent's Cisco Certified Internetwork Experts (CCIEs) and Cisco Certified Network Professionals (CCNPs) can provide world-class technical services for Cisco's complete family of security and Virtual Private Network solutions such as PIX 500 Firewalls and ASA 5500 Series Firewalls, the Catalyst Firewall Services Module (FWSM), secure broadband and integrated services routers, Aironet wireless access points, Meraki cloud-managed APs, and Catalyst family switches. Read additional information about Cisco Protection, VPN and Aironet Wireless Expertise.
Other Firewall and Virtual Private Network (VPN) Technologies
Stealth Intrusion Checking Services
In addition to supporting a wide range of protection technologies from Microsoft and Cisco, Progent can provide companies of any size expert engineering services for security products from other important firewall and Virtual Private Network (VPN) vendors. Progent's consultants can provide:
Unannounced penetration checking is a vital method for allowing companies to find out how exposed their information systems are to real-world threats by revealing how thoroughly corporate protection procedures and mechanisms stand up to planned but unannounced penetration efforts instigated by seasoned security engineers using advanced hacking techniques. Learn more information about Progent's Penetration Testing Services.
Certified Information Security Manager Security Support Expertise
CISM identifies the core skills and worldwide benchmarks of performance that information security managers are required to achieve. CISM provides executive management the assurance that consultants who have been awarded their CISM possess the background and skill to offer efficient security administration and engineering services. Progent can provide a CISM support professional to help your organization in vital security areas such as data protection governance, risk assessment, data protection process control, and crisis handling management.
Learn more information concerning Progent's Certified Information Security Manager (CISM) Security Support Services.
CISSP Security Support Expertise
Progent's Certified Information Systems Security Professionals (CISSPs) are security specialists who have been awarded CISSP certification through verified professional work, extensive study, and exhaustive examination. CISSP Certification recognizes mastery of a worldwide standard for IT security. ANSI has given the CISSP status accreditation in the field of IT security under ISO/IEC 17024. Areas of expertise covered within CISSP include cybersecurity management practices, security architecture and test systems, connection permission methodology, software development security, operations security, physical security, encryption, communications, network security, and business continuity planning.
Learn additional details concerning Progent's CISSP Support Expertise.
CISSP-ISSAP Qualified Consultants for Secure System Infrastructure
Progent's ISSAP certified security consultants have been awarded ISSAP accreditation after rigorous testing and extensive hands-on work with information security architecture. ISSAP security experts possess comprehensive knowledge of access management systems and techniques, phone system and network infrastructure security, cryptography, requirements analysis, BCP and DRP, and physical security. Progent's ISSAP-certified security consultants can assist your business with all aspects of architecture security.
Find out additional information about Progent's ISSAP Certified Secure Network Infrastructure Consulting Services.
CISSP-ISSEP Certified Cybersecurity Engineering Experts
Cybersecurity consultants with CISSP-ISSEP (Information Systems Security Engineering Professional) certification have proven their ability to provide enterprises with the expertise associated with a senior systems engineer, information assurance systems engineer, information assurance officer, information assurance analyst, or senior security analyst. Progent can provide the support of a certified CISSP-ISSEP network security expert to assist your enterprise to follow modern system security engineering principles and processes in system development, evaluate system security designs according to cybersecurity engineering best practices, produce cohesive system designs that include compliant security mechanisms for all key system functions, develop effective design strategies to deliver operational security, perform comprehensive risk analysis, and propose practical cybersecurity models that balance your operational requirements with your organization's tolerance for risk.
Find out more about Progent's CISSP-ISSEP Network Security Engineering Consulting.
Certified Information Systems Auditor Consulting Services
The CISA credential is a prestigious qualification that signifies mastery in information system security auditing. Accredited by the American National Standards Institute (ANSI), the CISA accreditation has consultants undergo an extensive examination administered by the ISACA professional association. Progent offers the services of a CISA-qualified security professional trained to help businesses in the fields of information systems audit services, information technology governance, systems and architecture lifecycle, IT service delivery, safeguarding data resources, and business continuity planning.
Read additional details about Progent's CISA Professional Expertise.
CRISC-certified Risk Management Consultants
The Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA in 2010 to validate a consultant's ability to plan, implement, and maintain IS control mechanisms to reduce risk. Progent offers the expertise of a CRISC-certified consultant to help your company to develop and execute a workplace continuity strategy based on industry best practices identified by CRISC and geared to align with your organization's risk tolerance, business objectives, and budgetary guidelines. Progent's network risk management expertise is a good fit the support available from Progent's CISA-qualified consultants for objectively evaluating your IS control mechanisms and also with the services of Progent's CISM-certified consultants for designing company-wide security policies.
Read additional details about Progent's CRISC-certified Network Risk Mitigation Support.
Global Information Assurance Certification Support Services
Global Information Assurance Certification was founded in 1999 to certify the skill of network security engineers. GIAC's mission is to assure that a certified security consultant possesses the knowledge needed to deliver services in critical categories of system, data, and application software security. GIAC accreditations are acknowledged by businesses and government organizations around the world including U.S. National Security Agency (NSA). Progent can provide the expertise of certified professionals for all of the security disciplines addressed within GIAC accreditation topics including assessing networks, security incident response, traffic analysis, web services security, and SIEM solutions.
Find out additional information about Progent's GIAC Information Assurance Expertise.
Contact Progent for Computer Security Consulting Services
If your business is situated in Portland or anywhere in Oregon and you're looking for network security expertise, phone Progent at 800-993-9400 or see Contact Progent.