For fast remote help with data security problems, businesses in Portland, OR, can find expert expertise from Progent's security professionals. Progent's remote service consultants are ready to offer efficient and low-cost help with security emergencies that threaten the viability of your information system. Progent's accredited security engineers are premier to provide help for environments based on Microsoft Windows, Linux, macOS and OS X, Sun, and major derivatives of UNIX. Progent's broad array of consulting services encompasses firewall expertise, email security, protected system design, and business continuity planning. Progent's technical support staff has been awarded the world's top security credentials including Global Information Assurance Certification and Information System Security Architecture Professional.
Progent provides remote security assistance on a by-the-minute model with no minimum times and no extra fees for setup or after hours service. By billing by the minute and by providing top-level expertise, Progent's pricing model keeps expenses under control and eliminates scenarios where simple solutions result in big expenses.
Our System Has Been Hacked: What Should We Do Now?
In case your business is now experiencing a network security emergency, go to Progent's Emergency Online Technical Help to learn how to get fast aid. Progent has a pool of seasoned network security experts who can provide remote and on-premises assistance that includes threat containment, mitigation, restoration, forensics, and enhancement of your cybersecurity profile to protect against future exploits.
For organizations who have planned in advance for an attack, the formal post-attack handling procedure outlined by Global Information Assurance Certification is Progent's approved method of handling a major security incident.
Introduction to Security Support Services
Coordinating data security as well as staying ready for restoring vital data and functions following an attack requires an on-going process involving a variety of tools and procedures. Progent's certified professionals can assist your business at whatever level in your attempt to guard your information system, ranging from security evaluation to designing a comprehensive security plan. Key technologies covered by Progent's security engineers include Security Planning and Prevention, Information Recovery and Security Forensics, and Managed Protection from Email-Based Threats.
Designing and Implementing Protected Environments
Every company should develop a thoroughly thought out security plan that includes both preventive and responsive elements. The proactive strategy is a set of precautions that helps to minimize security gaps. The reactive plan defines procedures to assist security staff to inventory the losses caused by an attack, remediate the damage, document the experience, and revive business functions as quickly as feasible. Progent can show you how to build protection into your business processes. Progent can configure auditing software, define and implement a secure computer architecture, and recommend procedures and policies that will enhance the safety of your network. Progent's security professionals are ready to help you to set up a firewall, deploy safe offsite access to e-mail and data, and install an effective virtual private network.
If you are looking for an economical way for outsourcing your security management, Progent's Round-the-clock Network Support Packages feature continual online network monitoring and immediate resolution of emergencies.
Hybrid Cloud Solutions
Progent can assist your IT team you to plan, deploy, administer and repair enterprise hybrid cloud solutions that incorporate physical and cloud hosted resources and that comply with government and industry data security requirements. (Learn about Progent's Office 365 Exchange Online integration with on-premises Exchange deployments, Microsoft Azure enterprise hybrid cloud integration and Progent's Amazon Web Services enterprise hybrid cloud solutions.)
Data Restoration and Failure Analysis
Progent has expertise in recovering networks and computers that have been compromised, are suspect, or have ceased to function following a security breach. Progent can help evaluate the damage caused by the attack, restore ordinary functions, and retrieve data compromised owing to the event. Progent's security specialists can also oversee a comprehensive failure analysis by going over event logs and utilizing other proven forensics tools. Progent's background with security issues reduces your business disruption and permits Progent to propose effective strategies to avoid or contain new attacks.
Ransomware Removal and Restoration Services
Progent offers the services of experienced ransomware recovery consultants with the knowledge to rebuild an environment that has suffered an attack by a ransomware cryptoworm such as Ryuk, WannaCry, Hermes, or Locky. To find out more, visit ransomware removal and recovery expertise.
Progent's Fixed-price Managed Services for Information Assurance
Progent's affordable ProSight portfolio of network monitoring and management services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. ProSight managed services offered by Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that utilizes cutting edge behavior analysis technology to defend endpoints as well as physical and virtual servers against new malware attacks such as ransomware and file-less exploits, which routinely escape legacy signature-matching AV tools. ProSight Active Security Monitoring safeguards local and cloud resources and provides a single platform to manage the complete malware attack progression including filtering, infiltration detection, containment, remediation, and forensics. Key features include single-click rollback with Windows VSS and real-time network-wide immunization against new attacks. Read more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection (ESP): Unified Endpoint Security
ProSight Enhanced Security Protection (ESP) managed services deliver ultra-affordable in-depth security for physical servers and virtual machines, workstations, mobile devices, and Exchange email. ProSight ESP uses contextual security and modern behavior analysis for round-the-clock monitoring and responding to cyber threats from all vectors. ProSight ESP offers two-way firewall protection, penetration alarms, device management, and web filtering through leading-edge tools incorporated within a single agent managed from a single console. Progent's data protection and virtualization consultants can help you to design and implement a ProSight ESP deployment that meets your organization's specific needs and that allows you prove compliance with legal and industry data protection standards. Progent will help you define and implement security policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alerts that require urgent attention. Progent can also assist you to install and test a backup and disaster recovery solution such as ProSight Data Protection Services (DPS) so you can get back in business rapidly from a destructive security attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Exchange filtering.
ProSight Data Protection Services: Managed Cloud Backup
ProSight Data Protection Services offer small and medium-sized businesses a low cost and fully managed solution for secure backup/disaster recovery. For a low monthly rate, ProSight DPS automates your backup activities and enables fast restoration of vital data, applications and VMs that have become lost or damaged due to hardware breakdowns, software glitches, natural disasters, human error, or malicious attacks such as ransomware. ProSight DPS can help you back up, recover and restore files, folders, apps, system images, as well as Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to a local storage device, or mirrored to both. Progent's BDR specialists can deliver world-class support to configure ProSight Data Protection Services to be compliant with regulatory requirements such as HIPPA, FIRPA, PCI and Safe Harbor and, whenever necessary, can help you to recover your critical data. Read more about ProSight DPS Managed Cloud Backup.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering service that uses the technology of leading data security vendors to provide centralized management and comprehensive protection for all your email traffic. The powerful architecture of Progent's Email Guard managed service combines a Cloud Protection Layer with a local security gateway device to offer advanced protection against spam, viruses, Denial of Service Attacks, DHAs, and other email-borne threats. Email Guard's cloud filter serves as a preliminary barricade and keeps most threats from reaching your security perimeter. This decreases your vulnerability to inbound threats and saves network bandwidth and storage. Email Guard's onsite gateway appliance provides a deeper layer of inspection for incoming email. For outgoing email, the onsite gateway offers AV and anti-spam filtering, DLP, and email encryption. The on-premises gateway can also assist Microsoft Exchange Server to monitor and safeguard internal email traffic that originates and ends within your corporate firewall. For more information, visit ProSight Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small business can have its key servers and applications hosted in a protected Tier III data center on a fast virtual machine host set up and maintained by Progent's IT support experts. Under the ProSight Virtual Hosting service model, the client retains ownership of the data, the operating system platforms, and the applications. Because the system is virtualized, it can be moved immediately to an alternate hardware environment without requiring a time-consuming and difficult configuration procedure. With ProSight Virtual Hosting, your business is not tied one hosting service. Learn more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: IT Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, maintain, find and safeguard data related to your IT infrastructure, processes, applications, and services. You can quickly find passwords or serial numbers and be alerted about impending expirations of SSL certificates or warranties. By cleaning up and managing your IT documentation, you can save as much as 50% of time spent trying to find critical information about your network. ProSight IT Asset Management features a centralized location for holding and collaborating on all documents required for managing your business network such as standard operating procedures and self-service instructions. ProSight IT Asset Management also supports advanced automation for collecting and relating IT data. Whether youíre making enhancements, doing maintenance, or responding to a crisis, ProSight IT Asset Management delivers the knowledge you require the instant you need it. Learn more details about ProSight IT Asset Management service.
Specialized Security Services Available from Progent
Progent's security engineers can provide unique consulting support in vital areas of IT security such as:
Security Vulnerability Evaluation and Compliance Testing
Progent offers experience with information risk auditing software like Microsoft Baseline Security Analyzer or LANguard from GFI for performing a variety of automatic network scans to reveal possible security problems. Progent has extensive skills with these utilities and can help your company to understand assessment results and respond efficiently. Progent's security consultants also offer web application validation and can perform thorough assessments of corporate-wide security to assess your organization's compliance with major global security standards including FISMA, NIST, and ISO 17799. In addition, Progent can assess the effectiveness of your wireless protection covering stationary wireless equipment plus mobile devices. Learn more information concerning Progent's Information Risk Evaluation and Compliance Testing.
Cisco Network Security, PIX Firewall and ASA Firewall, Virtual Private Network, Aironet and Meraki Wireless Help
Progent's Cisco Certified Internetwork Experts (CCIEs) and Cisco CCNP experts can deliver in-depth consulting expertise for Cisco's entire family of security and Virtual Private Network technologies such as PIX 500 Firewalls and ASA Series Firewalls, the Catalyst FWSM, protected broadband and integrated services (IS) routers, Aironet wireless access points and bridges, Meraki cloud-managed access points, and Catalyst switches. Find out the details about Cisco Protection, Virtual Private Network and Aironet Wireless Support.
Additional Firewall and Virtual Private Network Technologies
Stealth Intrusion Testing Services
As well as supporting a broad array of network security technologies from Microsoft and Cisco, Progent offers organizations of any size expert support for products from other important firewall and VPN vendors. Progent's engineers offer:
Unannounced penetration checking is a vital method for allowing companies to understand how vulnerable their networks are to serious threats by showing how thoroughly corporate security procedures and technologies hold up to authorized but unpublicized penetration efforts launched by veteran security specialists using advanced hacking techniques. Learn more information concerning Progent's Penetration Testing Services.
CISM Security Consulting Expertise
Certified Information Security Manager identifies the core competencies and international standards of performance that computer security professionals are expected to master. CISM offers business management the confidence that consultants who have been awarded their accreditation have the background and skill to offer efficient security management and engineering support. Progent can provide a CISM-certified expert to assist your enterprise in vital security disciplines including data protection governance, risk assessment, information security process control, and incident response support.
Read additional information about Progent's Certified Information Security Manager (CISM) Security Support Services.
CISSP Security Consulting Expertise
Progent's CISSP experts are cybersecurity engineers who have earned CISSP status as a result of demonstrated professional work, extensive study, and exhaustive testing. CISSP Certification indicates expertise in an international standard for IT security. American National Standards Institute has granted the CISSP status official recognition in the area of information security under ISO/IEC 17024. Areas of knowledge covered under CISSP include security management procedures, security architecture and models, connection control systems, software development security, business processes security, hardware security, cryptography, telecommunications, network security, and disaster recovery planning.
Read additional information about Progent's Certified Information Systems Security Professionals (CISSP) Consulting Services.
CISSP-ISSAP Certified Consultants for Secure Network Infrastructure
Progent's ISSAP Premier cybersecurity consultants have been awarded ISSAP accreditation following thorough testing and significant hands-on work with network security design. ISSAP security experts have acquired comprehensive knowledge of access management systems and methodologies, telecommunications and network infrastructure security, cryptography, requirements analysis, business continuity planning (BCP) and disaster recovery, and physical security integration. Progent's ISSAP-premier security specialists can assist your company with all aspects of architecture security.
Read the details concerning Progent's ISSAP Certified Protected System Infrastructure Consulting Services.
CISSP-ISSEP Certified Security Engineering Experts
Network Security consultants with CISSP-ISSEP (Information Systems Security Engineering Professional) certification have shown their ability to provide enterprises with the services expected of a senior systems engineer, information assurance systems engineer, information assurance officer, information assurance analyst, or senior security analyst. Progent offers the support of a certified CISSP-ISSEP cybersecurity expert to assist your organization to follow modern system security engineering theory and processes in system development, review and evaluate system security designs based on cybersecurity engineering best practices, produce cohesive system designs that include compliant security mechanisms for all critical system functions, define effective configuration strategies to deliver operational security, perform in-depth risk analysis, and recommend realistic security models that balance your operational goals with your organization's tolerance for risk.
Find out more about Progent's CISSP-ISSEP Cybersecurity Engineering Consulting.
Certified Information Systems Auditor Consulting Services
The Certified Information Systems Auditor accreditation is a recognized achievement that represents expertise in information system security audit and control. Accredited by the American National Standards Institute, the CISA credential requires that candidates pass a comprehensive examination administered by the ISACA professional association. Progent offers the expertise of a CISA-Certified security professional trained to assist businesses in the areas of IS audit process, IT governance, systems and infrastructure lifecycle, IT service delivery, safeguarding information resources, and business continuity preparedness.
Get more details concerning Progent's Certified Information Systems Auditor Professional Services.
CRISC-certified Network Risk Management Experts
The CRISC program was initiated by ISACA in 2010 to verify an IT professional's ability to plan, deploy, and support IS control mechanisms to reduce risk. Progent offers the services of a CRISC-certified consultant to assist your company to develop and execute a business continuity or disaster recovery plan that follows leading practices promoted by CRISC and geared to align with your company's risk tolerance, business objectives, and IT budget. Progent's network risk management expertise is complementary to the support available from Progent's CISA-Premier consultants for impartially auditing your IS control design and with the services of Progent's CISM support professionals for implementing company-wide security policies and procedures.
Find out more details about Progent's CRISC Risk Management Services.
GIAC Consulting Expertise
Global Information Assurance Certification was established in 1999 to certify the skill of computer security professionals. GIAC's mission is to ensure that an accredited security consultant has the knowledge appropriate to deliver services in vital categories of system, information, and program security. GIAC accreditations are acknowledged by businesses and institutions throughout the world including United States National Security Agency (NSA). Progent offers the help of certified professionals for all of the security services covered within GIAC certification topics such as assessing security systems, incident handling, intrusion detection, web-based application security, and security information and event management (SIEM) solutions.
Read additional information about Progent's GIAC Information Assurance Support.
Contact Progent for Network Security Support
If your organization is located in Portland or elsewhere in Oregon and you need cybersecurity help, call Progent at 800-993-9400 or go to Contact Progent.
Portland Metro Area Contact Information:
Progent offers consulting services and onsite technical support throughout the Portland Metro Area.
Progent locations in the Portland Metro Area