For immediate online help with computer security issues, companies in Portland Oregon can find world-class expertise from Progent's security engineers. Progent's online service consultants are available to offer efficient and affordable help with security emergencies that threaten the productivity of your IT network. Progent's accredited security consultants are certified to provide help for environments powered by Microsoft, Linux, macOS and OS X, Sun Solaris, and popular versions of UNIX. Progent's wide range of services addresses firewall technology, email security, secure system infrastructure, and disaster recovery preparedness. Progent's support staff has earned the industry's most advanced security certifications including CISM and Certified Information Systems Security Professional (CISSP).
Progent provides online security support services on a per-minute basis without minimum minutes and no additional fees for sign-up or after hours service. By billing by the minute and by providing top-level support, Progent's billing policy keeps expenses under control and eliminates situations where quick solutions result in big expenses.
Our Network Has Been Hacked: What Can We Do Now?
If your network is now fighting a security crisis, go to Progent's Urgent Online Technical Help to see how to get immediate help. Progent maintains a team of seasoned cybersecurity experts who can provide remote and onsite assistance that includes threat containment, mitigation, restoration, forensics, and hardening of your cybersecurity profile to guard against future attacks.
For organizations who have planned beforehand for an attack, the formal post-attack handling model promoted by GIAC (Global Information Assurance Certification) is Progent's preferred method of responding to a serious security penetration.
Overview of Security Expertise
Coordinating network protection and planning for recovering critical information and systems following an attack requires an on-going effort that entails a variety of tools and processes. Progent's security engineers can assist your business at whatever level in your efforts to secure your IT system, from security audits to creating a comprehensive security plan. Key areas covered by Progent's security consultants include Planning and Implementation, Information Recovery and Security Forensics, and Outsourced Protection from Email-Borne Attacks.
Planning and Building Secure Environments
Every organization should develop a thoroughly thought out security strategy that incorporates both proactive and reactive elements. The pre-attack plan is a collection of steps that works to minimize security gaps. The reactive strategy specifies procedures to assist IT staff to inventory the losses caused by an attack, repair the damage, record the event, and restore network activity as quickly as feasible. Progent can show you how to design protection into your business operations. Progent can configure scanning software, define and execute a secure network infrastructure, and propose procedures and policies to enhance the safety of your information system. Progent's security experts are available to assist you to configure a firewall, deploy protected offsite connectivity to e-mail and data, and install an efficient virtual private network (VPN).
If your company is interested in an affordable way for jobbing out your security administration, Progent's 24x7 Monitoring Options feature automated online system monitoring and fast response to emergencies.
Hybrid Cloud Solutions
Progent can assist your IT team you to design, deploy, manage and troubleshoot enterprise hybrid cloud solutions that include local and cloud hosted infrastructure and that comply with government security standards. (Find out about Progent's Office 365 integration with on-premises Exchange, Microsoft Azure enterprise hybrid cloud integration, Amazon Web Services enterprise hybrid cloud solutions, and Google Cloud planning and integration consulting.)
Data Restoration and Failure Analysis
Progent provides skill in recovering networks and servers that have been compromised, are in question, or have ceased to function because of a security breakdown. Progent can help determine the losses resulting from the attack, return your company to ordinary functions, and recover information compromised as a result of the assault. Progent's certified specialists can also oversee a thorough failure analysis by going over activity logs and utilizing a variety of proven forensics tools. Progent's experience with security problems minimizes your business disruption and allows Progent to recommend effective strategies to prevent or mitigate new attacks.
Ransomware Removal and Restoration Consulting
Progent can provide the help of experienced ransomware recovery consultants with the knowledge to reconstruct an information system damaged by a ransomware cryptoworm like Ryuk, WannaCry, NotPetya, or Locky. To learn more, visit ransomware removal and recovery expertise.
Progent's Fixed-price Managed Services for Information Assurance
Progent's low-cost ProSight line of network monitoring and management services is intended to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. Managed services offered by Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that utilizes next generation behavior analysis technology to guard endpoint devices and physical and virtual servers against modern malware attacks like ransomware and email phishing, which easily evade traditional signature-matching anti-virus tools. ProSight ASM protects on-premises and cloud-based resources and provides a single platform to address the complete threat lifecycle including protection, identification, containment, remediation, and post-attack forensics. Key features include single-click rollback using Windows Volume Shadow Copy Service (VSS) and automatic network-wide immunization against newly discovered threats. Read more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware defense.
ProSight Enhanced Security Protection: Unified Endpoint Security
ProSight Enhanced Security Protection (ESP) managed services deliver ultra-affordable in-depth protection for physical and virtual servers, workstations, mobile devices, and Exchange Server. ProSight ESP utilizes contextual security and advanced machine learning for continuously monitoring and responding to cyber assaults from all attack vectors. ProSight ESP delivers firewall protection, intrusion alarms, device management, and web filtering through leading-edge technologies incorporated within one agent accessible from a single console. Progent's security and virtualization consultants can assist your business to design and configure a ProSight ESP deployment that meets your organization's specific requirements and that helps you achieve and demonstrate compliance with government and industry information security standards. Progent will assist you define and configure policies that ProSight ESP will manage, and Progent will monitor your network and respond to alerts that require urgent attention. Progent's consultants can also assist your company to install and test a backup and restore solution like ProSight Data Protection Services (DPS) so you can get back in business quickly from a potentially disastrous cyber attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint security and Exchange email filtering.
ProSight Data Protection Services: Managed Cloud Backup
ProSight Data Protection Services offer small and medium-sized organizations a low cost and fully managed solution for reliable backup/disaster recovery (BDR). For a fixed monthly cost, ProSight Data Protection Services automates your backup processes and allows fast restoration of critical files, apps and virtual machines that have become lost or corrupted due to hardware failures, software glitches, disasters, human mistakes, or malicious attacks such as ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, apps, system images, plus Hyper-V and VMware virtual machine images. Important data can be backed up on the cloud, to an on-promises storage device, or mirrored to both. Progent's cloud backup consultants can deliver world-class expertise to configure ProSight Data Protection Services to to comply with regulatory requirements like HIPAA, FIRPA, PCI and Safe Harbor and, whenever necessary, can assist you to restore your critical data. Learn more about ProSight Data Protection Services Managed Backup.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering service that incorporates the infrastructure of leading information security vendors to provide centralized control and world-class security for your inbound and outbound email. The hybrid architecture of Email Guard combines cloud-based filtering with an on-premises security gateway device to offer advanced protection against spam, viruses, Dos Attacks, DHAs, and other email-borne threats. The Cloud Protection Layer acts as a preliminary barricade and blocks the vast majority of unwanted email from making it to your network firewall. This decreases your exposure to inbound attacks and saves system bandwidth and storage space. Email Guard's on-premises security gateway device adds a further level of analysis for inbound email. For outbound email, the on-premises security gateway provides AV and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The onsite security gateway can also assist Microsoft Exchange Server to monitor and protect internal email that originates and ends within your security perimeter. For more information, visit Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small organization can have its key servers and apps hosted in a protected Tier III data center on a fast virtual machine host configured and managed by Progent's network support professionals. Under the ProSight Virtual Hosting model, the client retains ownership of the data, the operating system software, and the applications. Because the environment is virtualized, it can be moved immediately to an alternate hosting solution without a time-consuming and technically risky configuration process. With ProSight Virtual Hosting, you are not locked into one hosting provider. Find out more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: IT Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to capture, update, retrieve and protect information about your IT infrastructure, procedures, applications, and services. You can quickly find passwords or serial numbers and be alerted automatically about upcoming expirations of SSLs or warranties. By updating and managing your IT infrastructure documentation, you can eliminate up to 50% of time thrown away searching for vital information about your network. ProSight IT Asset Management features a common location for storing and sharing all documents required for managing your business network like standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also offers advanced automation for collecting and associating IT information. Whether youíre planning enhancements, performing regular maintenance, or responding to a crisis, ProSight IT Asset Management gets you the information you need as soon as you need it. Find out more details about Progent's ProSight IT Asset Management service.
Special Security Expertise Offered by Progent
Progent's certified consultants offer world-class expertise in vital facets of computer protection such as:
Information Risk Audits and Security Compliance Testing
Progent offers experience with security evaluation software like Microsoft Baseline Security Analyzer and LANguard for performing a variety of automatic network scans to identify possible security problems. Progent has extensive experience with testing tools and can assist your company to analyze audit reports and react efficiently. Progent's certified security consultants also can perform web application testing and can conduct thorough assessments of corporate-wide security to assess your company's compliance with key global security specifications including FISMA, NIST, and ISO 17799. In addition, Progent can assess the strength of your wireless security including stationary wireless appliances as well as portable devices. Get the details concerning Progent's Vulnerability Audits and Compliance Assessment.
Cisco Security, PIX Firewall and ASA Firewall, Virtual Private Network, Aironet and Meraki Wireless Consulting
Progent's Cisco Certified Internetwork Experts and Cisco Certified Network Professionals (CCNPs) can deliver world-class consulting services for Cisco's complete family of protection and Virtual Private Network technologies such as PIX Series Firewalls and ASA 5500 Series Firewalls, the Catalyst Firewall Services Module, secure broadband and integrated services (IS) routers, Aironet wireless access points and bridges, Meraki cloud-managed Wi-Fi APs, and Catalyst family switches. Find out the details about Cisco Protection, Virtual Private Network and Wireless Expertise.
Additional Firewall and Virtual Private Network Solutions
Stealth Intrusion Testing Services
As well as being expert in a broad array of network security technologies from Microsoft and Cisco, Progent can provide companies of any size top-level engineering services for technologies from other major firewall and Virtual Private Network (VPN) suppliers. Progent's engineers can provide:
Stealth intrusion testing is a vital technique for helping organizations to find out how vulnerable their IT systems are to potential attacks by revealing how effectively corporate security processes and mechanisms hold up against authorized but unannounced penetration efforts launched by seasoned security engineers utilizing advanced hacking methods. Learn more details about Progent's Penetration Testing Services.
Certified Information Security Manager Security Support Expertise
Certified Information Security Manager identifies the core skills and worldwide standards of performance that information technology security managers are required to master. It provides business management the confidence that consultants who have been awarded their CISM possess the experience and knowledge to offer efficient security administration and engineering services. Progent can provide a CISM support professional to help your enterprise in key security disciplines including information security governance, vulnerability assessment, information security process management, and crisis response support.
Find out additional details about Progent's CISM Security Support Assistance.
Certified Information Systems Security Professionals (CISSP) Security Consulting Expertise
Progent's CISSP consultants are cybersecurity specialists who have earned CISSP status as a result of verified professional work, rigorous study, and formal testing. CISSP qualification recognizes mastery of a worldwide standard for information security. American National Standards Institute has given the CISSP credential official recognition in the field of IT security under ISO/IEC 17024. Fields of knowledge included under CISSP include cybersecurity administration practices, security architecture and test systems, connection permission systems, applications development security, operations security, hardware security, encryption, communications, network security, and business continuity planning.
Read the details about Progent's Certified Information Systems Security Professionals (CISSP) Support Services.
CISSP-ISSAP Premier Experts for Secure System Infrastructure
Progent's ISSAP Certified cybersecurity experts have been awarded ISSAP accreditation following thorough testing and substantial experience. field experience with information security design. ISSAP security experts have acquired in-depth knowledge of access management mechanisms and techniques, telecommunications and network security, cryptography, requirements analysis, business continuity planning (BCP) and disaster recovery, and physical security integration. Progent's ISSAP-certified security specialists can assist your company with all aspects of architecture security.
Learn additional information about Progent's ISSAP Certified Secure Network Infrastructure Engineering Services.
CISSP-ISSEP Premier Security Engineering Experts
Cybersecurity consultants who have earned CISSP-ISSEP (Information Systems Security Engineering Professional) certification have shown their ability to provide enterprises with the expertise expected of a senior systems engineer, information assurance systems engineer, information assurance officer, information assurance analyst, or senior cybersecurity analyst. Progent can provide the skills of a certified CISSP-ISSEP cybersecurity expert to assist your organization to follow current system security engineering theory and techniques in system development, evaluate system security designs based on security engineering leading practices, create cohesive system designs that incorporate compliant cybersecurity mechanisms for all critical system functions, develop efficient design and configuration strategies to deliver operational security, perform in-depth risk analysis, and recommend realistic security models that balance your operational requirements with your company's tolerance for risk.
Learn the details about Progent's CISSP-ISSEP Network Security Engineering Consulting Services.
Certified Information Systems Auditor (CISA) Support Expertise
The Certified Information Systems Auditor (CISA) accreditation is an important achievement that signifies mastery in IS security audit and control. Accredited by the American National Standards Institute (ANSI), the CISA credential has candidates pass an exhaustive test overseen by the ISACA professional group. Progent offers the services of a CISA-Premier security audit consultant able to assist businesses in the fields of IS audit services, IT governance, network assets and architecture lifecycle, information technology service delivery, protecting data assets, and business continuity preparedness.
Find out additional details concerning Progent's Certified Information Systems Auditor (CISA) Consulting Services.
CRISC-certified IT Risk Management Experts
The CRISC program was initiated by ISACA in 2010 to validate an IT professional's ability to design, implement, and support IS controls to reduce network risk. Progent can provide the expertise of a CRISC-certified consultant to help your company to develop and carry out a business continuity strategy that follows industry best practices promoted by CRISC and crafted to match your organization's risk tolerance, business goals, and budgetary guidelines. Progent's network risk mitigation expertise is a good fit the support provided by Progent's CISA-Premier consultants for objectively auditing your IS management design and with the services of Progent's CISM consultants for designing company-wide security policies.
Find out additional details about Progent's CRISC Risk Mitigation Consulting.
GIAC (Global Information Assurance Certification) Professional Services
Global Information Assurance Certification was established in 1999 to certify the knowledge of computer security experts. GIAC's mission is to ensure that a certified security consultant possesses the skills appropriate to provide services in key areas of network, information, and application software security. GIAC certifications are acknowledged by companies and government organizations throughout the world including U.S. NSA. Progent offers the support of certified consultants for any of the security disciplines covered within GIAC accreditation topics such as auditing security systems, incident handling, traffic analysis, web application security, and SIEM solutions.
Learn additional information concerning Progent's GIAC Information Assurance Expertise.
Get in Touch with Progent for Computer Security Consulting Services
If your organization is situated in Portland Oregon and you're trying to find cybersecurity consulting expertise, telephone Progent at 800-993-9400 or refer to Contact Progent.
Oregon State Contact Information:
Progent offers consulting services and onsite technical support throughout the state of Oregon.
Progent locations in Oregon State