Business networks in the state of Washington can have prompt and affordable online access to Progent's certified security consultants to fix urgent security problems. The cost is affordable, charges are per minute, engagement is fast, and service is unbeatable. Progent also offers assistance for long-term engagements that demand the expertise of senior security engineers with top industry credentials.
If your Washington office is located some distance from larger urban neighborhoods like Seattle, Spokane, Tacoma, Bellevue, or Vancouver, the availability of local qualified network security engineers may be problematic when you have an urgent situation. This can cause lost income for your company, upset clients, idle employees, and distracted management. By utilizing Progent's online services, you can get in touch with a Certified security consultant who can deliver expertise when you have to have it to keep your network on line and restore your information.
Progent can help you in your initiatives to defend your network with support ranging from security assessments to developing a company-wide security plan. Progent offers affordable service to assist companies of any size to configure and manage secure IT environments based on Microsoft Windows and Cisco technology and that may include computers running UNIX, Linux, Solaris, or Apple Mac OS X platforms plus mobile users with Apple handhelds or Android or Windows Phone smart phones and tablets.
Progent can also assist you to outsource spam filtering and protection from email-borne assaults. Email Guard is Progent's email security solution that incorporates the services and infrastructure of top information security companies to provide web-based control and comprehensive protection for your email traffic. The powerful structure of Email Guard managed service combines cloud-based filtering with a local gateway device to offer advanced protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. The cloud filter serves as a preliminary barricade and blocks most unwanted email from making it to your security perimeter. This reduces your exposure to external attacks and saves system bandwidth and storage space. ProSight Email Guard's onsite gateway appliance provides a deeper layer of analysis for inbound email. For outgoing email, the onsite gateway offers AV and anti-spam protection, protection against data leaks, and email encryption. The onsite security gateway can also enable Exchange Server to monitor and protect internal email traffic that stays within your security perimeter.
Progent's security experts are available online or on premises to offer a variety of emergency or project-based network security services including:
If your network has an immediate requirement for IT security help, refer to Progent's Emergency Remote Network Help.
Progent's engineers offer world-class services in key fields of system protection including auditing, firewalls and VPN, and advanced security planning.
Progent's expert security engineers can evaluate the effectiveness of your existing network security implementation through comprehensive remote automated analysis based on advanced software tools and tested procedures. Progent's experience in this service saves your company time and money and assures a detailed portrayal of gaps. The information your company gains can be used as the foundation of a network protection plan that will permit your network to operate safely and adapt rapidly to future threats.
Automated Vulnerability Evaluation
Progent offers consulting in the use of security analysis utilities such as Microsoft Baseline Security Analyzer and GFI LANguard NSS for affordably performing a set of automatic network testing scans to uncover potential security holes. Progent has extensive knowledge of other network analysis utilities such as NMAP, AMAP Application Scanner, eEye, as well as tools like SolarWinds, Netcat, Hydra, and Nikto. Progent can show you how to make sense of testing reports and respond appropriately.
Progent can show you how to build security into your company operations, configure auditing applications, plan and implement a protected network architecture, and suggest policies to optimize the safety of your network. Progent's security engineers are able to help you configure a firewall, implement safe remote access to email and data, and install VPN. Learn additional information about Progent's network security evaluation.
Security Inventory Scanning Packages for Small Companies
Progent offers two ultra-affordable security inventory bundles intended to allow small companies to receive a professional network security evaluation from an accredited security specialist. With Progent's External Security Inventory Scan, a security expert administers a comprehensive test of your network from outside your company firewall to determine possible risks in the security posture you expose to the public. With Progent's Internal Network Security Inventory Checkup, an engineer executes a system scan from a secure computer within your firewall to evaluate vulnerabilities to internal threats. Both security inventory packages are configured and executed from a protected external location. The process is directed by a consultant who has earned high-level security accreditations and who produces a document that details and analyzes the data collected by the scan and proposes practical remediation if appropriate.
Stealth Penetration Analysis Support Services
Stealth penetration checking is an important part of any comprehensive IT system security strategy. Progentís security experts can run thorough intrusion tests without the knowledge of your organization's internal IT staff. Unannounced penetration testing uncovers whether current security defense systems such as intrusion incident alerts and event log analysis are correctly set up and consistently monitored. Learn more on Progent's network security penetration testing consulting.
Firewall And Virtual Private Network (VPN) Support
Progent's expertise in security solutions includes extensive field work with major firewalls and Virtual Private Network technology offered by a variety of companies including Cisco, Microsoft, and Symantec. Progent can provide the services of engineers who have earned key industry accreditations including Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Integration and Troubleshooting
The new Cisco ASA 5500-X Family Next-Generation Firewalls with Firepower Services provide substantially more value than Cisco's legacy PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 security appliances for new deployments. Since Cisco's acquisition of Sourcefire, the whole family of ASA 5500-X devices can be provisioned to enable Firepower Services, based on Sourcefire's Snort product, which is the market's most deployed network intrusion protection system. Firepower services bring enhanced features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-premier CCIE network experts can help your company to maintain your current PIX or ASA 5500 firewalls or upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite help with ASA 5500-X firewalls with Firepower Services and can assist your company to plan, integrate, optimize, manage and troubleshoot firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. Find out more information about ASA 5500-X Firewalls with Firepower Services configuration and debugging support.
Cisco Network Security and VPN Support Expertise
Cisco's network security and remote connection products represent a full range of easy-to-administer security products to help protect your wired and wireless network infrastructure. Cisco's Virtual Private Network product family features switches, firewalls, intrusion detection systems and VPN concentrators. Progent's expert staff of consultants includes field-proven engineers with Cisco CCIE and CCNP qualifications who can assist your organization to evaluate Cisco VPN, Cisco RADIUS Security, and additional Cisco security technologies that fit best with your company goals. Learn more information concerning Progent's Support Expertise for Cisco Security Solutions and Virtual Private Network Appliances.
Consulting Expertise for Additional Firewall and VPN Technology
Progent provides small and medium size businesses expert support for Intrusion Protection Systems and IPsec VPN solutions from leading firewall and Virtual Private Network security companies including WatchGuard, Juniper, and Symantec. Progent can show you how to create a comprehensive security plan and select the right technologies from multiple suppliers to achieve your security goals while sticking within your budget limits.
Progent's Fixed-price Managed Services for Information Assurance
Progent's affordable ProSight portfolio of network management outsourcing services is intended to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all facets of information assurance and compliance. ProSight managed services offered by Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that incorporates next generation behavior-based machine learning tools to guard endpoints and physical and virtual servers against modern malware attacks such as ransomware and email phishing, which routinely get by traditional signature-matching anti-virus tools. ProSight ASM protects on-premises and cloud resources and offers a unified platform to automate the complete malware attack progression including blocking, identification, containment, cleanup, and post-attack forensics. Key features include single-click rollback with Windows VSS and automatic network-wide immunization against newly discovered threats. Find out more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Protection
Progent's ProSight Enhanced Security Protection services offer affordable multi-layer security for physical servers and virtual machines, desktops, smartphones, and Exchange Server. ProSight ESP utilizes adaptive security and advanced machine learning for continuously monitoring and responding to security threats from all attack vectors. ProSight ESP provides two-way firewall protection, penetration alerts, endpoint management, and web filtering through leading-edge technologies packaged within one agent managed from a unified control. Progent's data protection and virtualization experts can help your business to design and configure a ProSight ESP environment that meets your organization's unique needs and that allows you achieve and demonstrate compliance with government and industry information security regulations. Progent will assist you define and implement policies that ProSight ESP will manage, and Progent will monitor your IT environment and respond to alarms that require urgent attention. Progent's consultants can also help you to install and verify a backup and disaster recovery system such as ProSight Data Protection Services so you can get back in business quickly from a destructive cyber attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint protection and Microsoft Exchange filtering.
ProSight Data Protection Services: Managed Backup
ProSight Data Protection Services from Progent offer small and mid-sized organizations an affordable end-to-end solution for reliable backup/disaster recovery. Available at a low monthly cost, ProSight Data Protection Services automates your backup processes and enables fast restoration of critical data, apps and VMs that have become unavailable or corrupted as a result of hardware failures, software glitches, disasters, human mistakes, or malicious attacks like ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, apps, system images, as well as Hyper-V and VMware virtual machine images. Important data can be protected on the cloud, to an on-promises device, or mirrored to both. Progent's cloud backup specialists can provide world-class expertise to configure ProSight DPS to be compliant with regulatory standards like HIPPA, FINRA, and PCI and, whenever needed, can help you to recover your critical data. Read more about ProSight DPS Managed Cloud Backup and Recovery.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering service that uses the technology of top data security vendors to deliver centralized control and world-class security for your inbound and outbound email. The hybrid structure of Email Guard combines cloud-based filtering with an on-premises gateway device to offer complete defense against spam, viruses, Dos Attacks, DHAs, and other email-borne malware. The cloud filter acts as a first line of defense and keeps the vast majority of unwanted email from reaching your network firewall. This reduces your vulnerability to external threats and saves system bandwidth and storage space. Email Guard's on-premises security gateway device adds a further level of inspection for inbound email. For outbound email, the local security gateway offers anti-virus and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The local security gateway can also assist Exchange Server to monitor and safeguard internal email traffic that stays inside your security perimeter. For more information, see Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small or mid-size organization can have its critical servers and applications hosted in a secure Tier III data center on a fast virtual machine host set up and managed by Progent's IT support professionals. With the ProSight Virtual Hosting model, the customer retains ownership of the data, the operating system software, and the applications. Because the system is virtualized, it can be moved immediately to an alternate hosting environment without a lengthy and difficult configuration process. With ProSight Virtual Hosting, you are not tied one hosting service. Find out more about ProSight Virtual Hosting services.
ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to capture, maintain, retrieve and safeguard information related to your IT infrastructure, processes, applications, and services. You can quickly find passwords or IP addresses and be warned about impending expirations of SSLs or domains. By cleaning up and organizing your IT documentation, you can save as much as 50% of time thrown away searching for critical information about your network. ProSight IT Asset Management features a common repository for storing and sharing all documents required for managing your network infrastructure such as standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also supports a high level of automation for gathering and associating IT data. Whether youíre making improvements, doing regular maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the information you require when you need it. Learn more about ProSight IT Asset Management service.
Expert Security Consulting
Any company should have a carefully considered security strategy that includes both pre-attack processes and response planning. The proactive strategy is a set of procedures intended to reduce security weaknesses. The post-attack plan helps your company's security engineers to assess the impact resulting from an attack, repair the network, record the experience, and get the IT network restored as soon as feasible.
Progent's certified information security consultants can to assist you to perform a complete risk evaluation and define a computer security plan to implement security processes and controls to minimize ongoing assaults and dangers.
CISM Accredited System Security Consulting Services
The CISM organization describes the basic capabilities and international standards of skill that information security professionals are expected to learn. It provides executive management the confidence that consultants who have qualified for their CISM credential possess the experience and capability to deliver effective security administration and support consulting. Progent offers the services of CISM Certified security consultants to assist businesses with:
Find out more details concerning Progent's CISM Qualified Security Engineering Expertise.
- IS Security Governance
- Risk Analysis
- IS Security Implementation Management
- Information Security Administration
- Recovery Planning
CISSP Certified Security Engineering Services
CISSP certification denotes mastery of an international standard for network security. ANSI has granted certification accreditation in the field of data security defined by ISO/IEC 17024. Progent can provide the services of security consultants who have earned CISSP accreditation. Progent can give you access to a CISSP-certified consultant to help your business in a variety security areas including:
Learn more details about Progent's CISSP Cybersecurity Support Expertise.
- Security Administration Procedures
- Security Architecture and Paradigms
- Access Control Solutions and Processes
- Applications Development Security
- Secure Operations
- Site Security
- Encryption/Decryption Mechanisms
- Telecom, Network and WAN Security
- Disaster Recovery Preparedness
CISSP-ISSAP Certified Secure IT Architecture Consulting Support
Progent's CISSP-ISSAP Certified network architecture engineers are consultants who have been awarded ISSAP status as a result of thorough testing and significant work with information security design. The Information System Security Architecture Professional (ISSAP) certification represents proven competence in the most challenging demands of IS security architecture within the broader field of information security expertise required for CISSP accreditation. Progent's ISSAP-certified security consultants can help your company with all phases of secure network architecture such as.
Read additional details about Progent's ISSAP Qualified Secure IT Architecture Support Professionals.
- Access Management Systems and Methodologies
- Telecommunications and Network Infrastructure Security
- Data Encryption Solutions
- Needs Evaluation and Security Criteria
- BCP and DRP
- Site Security
CISA Accredited Security Auditing Engineering Services
The Certified Information Systems Auditor (CISA) credential is a prestigious qualification that indicates mastery in network security audit and control. Accredited by the American National Standards Institute, the CISA accreditation requires that candidates undergo an extensive examination administered by the ISACA professional group. Progent's CISA-qualified network security audit consultants can assist your business in the areas of:
Get the details about Progent's CISA Qualified Network Security Auditing Engineering Expertise.
- IS Audit Process
- Information Technology Enforcement
- Network Assets and Architecture Lifecycle
- Information Technology Support
- Protecting Data Assets
- Disaster Recovery Planning
Certified in Risk and Information Systems Control (CRISC) Experts
The CRISC program was initiated by ISACA to verify a consultant's skills to design, implement, and support IS controls to mitigate risk. Progent offers the expertise of a CRISC-certified consultant to assist your company to develop and execute a workplace continuity strategy that follows leading practices identified by CRISC and geared to align with your company's risk tolerance, business goals, and IT budget. Progent's CRISC-certified IT risk management engineers offer a range of risk evaluation services including:
Learn more details concerning Progent's CRISC Risk Management Consultants.
- Collect information and study documentation to identify major vulnerabilities
- Inventory statutory, industry, and business requirements and organizational policies associated with your network to determine their possible influence on your business objectives
- Point out potential vulnerabilities for your business processes to help in evaluating your corporate risk
- Develop a risk awareness initiative and conduct seminars to ensure your organization appreciate IS risk so they can contribute to your risk management program
- Connect key risk vectors to related business processes to help assign risk responsibility
- Determine risk appetite with executive leadership and major stakeholders to make sure they are in agreement
GIAC Accredited Security Engineering Services
GIAC (Global Information Assurance Certification) was founded in 1999 to validate the skill of computer security experts. GIAC's mission is to verify that an accredited professional has the skills needed to provide support in key categories of system, data, and application security. GIAC certifications are acknowledged by businesses and government organizations around the world including and the U.S. NSA. Progent's GIAC-certified information security audit experts are available to help your business in the areas of:
Find out more details concerning Progent's GIAC Information Assurance Services.
- Auditing Networks
- Security Incident Handling
- Intrusion Detection
- Web-based Services Security
- SIEM solutions
Contact a Certified Security Specialist
To find out how you can get in touch with a security engineer for online or on-premises help in Washington, call 1-800-993-9400 or visit Remote Computer Help.