Business networks in the state of Washington can now get prompt and economical remote access to Progent's accredited security support specialists to resolve the toughest security problems. The cost is competitive, charges are by the minute, sign-up is quick, and support is unbeatable. Progent also offers help for long-term engagements that requires the expertise of senior security engineers with high-level security credentials.
In case your Washington organization is based some distance from more populated urban neighborhoods including Seattle, Spokane, Tacoma, Bellevue, or Vancouver, contact with local accredited security professionals could be limited during an emergency. This can result in a loss of revenue for your company, upset clients, unproductive employees, and defocused management. By calling Progent, you have access to a Premier security engineer ready to deliver assistance when you require it to get your system running and recover your data.
Progent can assist you in your efforts to protect your network with support that can range from security audits to creating a comprehensive security plan. Progent provides affordable support to assist small and midsize companies to configure and maintain secure IT environments based on Microsoft Windows and Cisco technology and that may include servers and desktops based on UNIX, Linux, Sun Solaris, or Mac OS X operating systems plus mobile users with Apple handhelds or Google Android or Windows Phone smart phones and tablets.
Progent can also assist you to outsource spam filtering and defense against e-mail-based security threats. Email Guard is Progent's email filtering and encryption platform that incorporates the services and infrastructure of leading data security vendors to provide centralized management and comprehensive protection for your inbound and outbound email. The hybrid structure of Email Guard integrates a Cloud Protection Layer with a local gateway device to offer advanced defense against spam, viruses, Denial of Service Attacks, DHAs, and other email-based malware. The cloud filter serves as a first line of defense and blocks most unwanted email from reaching your network firewall. This reduces your vulnerability to external attacks and saves network bandwidth and storage. ProSight Email Guard's on-premises gateway device adds a deeper level of analysis for incoming email. For outgoing email, the on-premises gateway provides anti-virus and anti-spam protection, policy-based Data Loss Prevention, and encryption. The onsite gateway can also help Exchange Server to track and protect internal email that stays within your corporate firewall.
Progent's certified engineers are accessible online or on site to provide a range of urgent or project-based network security services such as:
If your business has an urgent requirement for computer security help, refer to Progent's Emergency Online Technical Help.
Progent's consultants can deliver advanced services in vital facets of network protection that include analysis, firewalls and VPN, and advanced security consulting.
Progent's certified security consultants can evaluate the effectiveness of your existing computer security environment by performing exhaustive remote automated testing based on sophisticated software tools and tested procedures. Progent's skill in this service saves you time and money and assures an objective portrayal of gaps. The information your company gains can form the foundation of a network protection plan that can permit your information system to operate dependably and respond quickly to future risks.
Automated Network Vulnerability Audits
Progent provides consulting in the use of security testing products including Microsoft's MBSA and GFI LANguard Network Security Scanner for affordably performing a variety of programmed system testing scans to identify possible security holes. Progent has broad experience with other security analysis tools including NMAP Port Scanner, AMAP Application Scanner, eEye, as well as utilities such as SolarWinds, Netcat, and Nikto. Progent can help you to make sense of audit reports and react appropriately.
Progent can help you design security into your company operations, configure scanning tools, define and deploy a secure network architecture, and suggest policies to maximize the security of your IT system. Progent's security engineers are ready to help you set up a firewall, design secure remote connectivity to email and business applications, and install virtual private network. Find out more concerning Progent's automated security evaluation.
Security Inventory Scanning Bundles for Small Businesses
Progent has put together two low-cost security inventory packages intended to allow small companies to receive a professional network security assessment from a qualified security engineer. With Progent's External Network Security Inventory Checkup, a security expert runs a comprehensive test of your network from outside your firewall to determine potential weaknesses in the security posture you expose to the outside world. With Progent's Internal Security Inventory Checkup, a security engineer executes a system scan from an authorized machine inside your firewall to evaluate your exposure to inside attacks. Both security inventory services are set up and run from a protected external location. The process is directed by a consultant with top security credentials and who produces a report that summarizes and interprets the data captured by the scan and proposes practical improvements if called for.
Network Intrusion Analysis Consulting
Stealth penetration testing is a key part of any successful network security plan. Progentís security professionals can perform thorough intrusion tests without the awareness of your company's internal IT resources. Unannounced penetration checking shows whether current security monitoring systems such as intrusion incident alerts and event log analysis are correctly configured and consistently checked. Find out additional information concerning Progent's network security penetration analysis consulting.
Firewall and Virtual Private Network Expertise
Progent's expertise in security solutions includes in-depth field work with major firewalls and VPN products from a variety of companies including Cisco, Microsoft, and Juniper. Progent offers the services of engineers with important networking accreditations including Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer (MCSE).
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Integration and Debugging
The latest generation of Cisco ASA 5500-X Family Next-Generation Firewalls with Firepower Services offer substantially more bang for the buck than Cisco's earlier firewalls and have superseded the ASA 5500 and PIX 500 security appliances for all new installations. After Cisco's purchase of Sourcefire, the entire line of ASA 5500-X devices can be provisioned to support Firepower Services, based on Sourcefire's Snort technology, which is the market's most popular intrusion protection system. Firepower services provide enhanced features such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-premier CCIE network consultants can help your company to maintain your legacy PIX or Cisco ASA 5500 firewalls and upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and onsite help with ASA 5500-X firewalls with Firepower Services and can help your company to design, deploy, optimize, administer and debug firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Read more details about ASA Firewalls with Firepower configuration and troubleshooting services.
Cisco Network Security and VPN Engineering Expertise
Cisco's security and offsite access technology provide a comprehensive line of easy-to-administer security solutions to help safeguard your local and remote information system. Cisco's VPN line includes switches, firewalls, intrusion detection devices and VPN appliances. Progent's professional staff of consultants includes field-proven specialists with Cisco CCIE and CCNP qualifications who are able to help your business to select Cisco VPN, Cisco RADIUS Security, and additional Cisco security technologies that align most closely with your company goals. Find out additional details about Progent's Support Expertise for Cisco Security Technology and VPN Appliances.
Support Expertise for Additional Firewall and VPN Products
Progent offers small and medium size organizations expert consulting for Intrusion Protection Systems and IPsec VPN solutions from major firewall and VPN security companies including WatchGuard, Juniper Networks, and Symantec. Progent can show you how to create a comprehensive security strategy and choose the right products from multiple vendors to support your security objectives while staying within your budget limits.
Progent's Flat-rate Managed Services for Information Security
Progent's affordable ProSight line of network monitoring and management services is intended to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all facets of information assurance. ProSight managed services offered by Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection solution that incorporates cutting edge behavior analysis tools to guard endpoints and servers and VMs against new malware attacks such as ransomware and file-less exploits, which easily get by legacy signature-matching AV products. ProSight ASM safeguards on-premises and cloud-based resources and provides a unified platform to address the entire threat progression including protection, infiltration detection, mitigation, cleanup, and forensics. Key capabilities include single-click rollback using Windows Volume Shadow Copy Service (VSS) and automatic system-wide immunization against new attacks. Find out more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection: Unified Endpoint Protection
Progent's ProSight Enhanced Security Protection services deliver affordable multi-layer protection for physical servers and virtual machines, desktops, smartphones, and Microsoft Exchange. ProSight ESP utilizes adaptive security and advanced machine learning for round-the-clock monitoring and reacting to cyber threats from all vectors. ProSight ESP provides two-way firewall protection, intrusion alarms, device management, and web filtering via leading-edge technologies packaged within one agent managed from a unified control. Progent's data protection and virtualization experts can assist you to plan and configure a ProSight ESP deployment that addresses your organization's specific requirements and that allows you demonstrate compliance with government and industry data protection standards. Progent will help you specify and implement security policies that ProSight ESP will manage, and Progent will monitor your network and respond to alarms that call for urgent attention. Progent can also assist you to install and verify a backup and disaster recovery solution like ProSight Data Protection Services so you can get back in business rapidly from a potentially disastrous cyber attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified endpoint security and Microsoft Exchange filtering.
ProSight DPS: Managed Cloud Backup
ProSight Data Protection Services from Progent provide small and mid-sized organizations a low cost end-to-end solution for reliable backup/disaster recovery (BDR). Available at a fixed monthly price, ProSight DPS automates your backup processes and allows fast recovery of vital data, apps and VMs that have become unavailable or damaged due to component breakdowns, software glitches, natural disasters, human mistakes, or malicious attacks like ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, applications, system images, plus Microsoft Hyper-V and VMware images/. Important data can be protected on the cloud, to a local device, or mirrored to both. Progent's backup and recovery consultants can deliver advanced expertise to set up ProSight Data Protection Services to to comply with regulatory standards such as HIPPA, FIRPA, PCI and Safe Harbor and, whenever necessary, can assist you to recover your critical information. Read more about ProSight DPS Managed Backup.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering service that uses the infrastructure of leading data security vendors to deliver centralized control and comprehensive security for your email traffic. The powerful architecture of Progent's Email Guard integrates a Cloud Protection Layer with a local security gateway appliance to provide advanced defense against spam, viruses, Dos Attacks, DHAs, and other email-borne malware. The Cloud Protection Layer acts as a first line of defense and keeps most unwanted email from reaching your network firewall. This reduces your exposure to inbound threats and saves network bandwidth and storage. Email Guard's on-premises gateway appliance provides a further layer of inspection for incoming email. For outgoing email, the on-premises security gateway offers anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The on-premises gateway can also assist Microsoft Exchange Server to track and safeguard internal email traffic that originates and ends inside your corporate firewall. For more information, see ProSight Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size organization can have its key servers and apps hosted in a protected fault tolerant data center on a fast virtual host configured and maintained by Progent's IT support professionals. Under the ProSight Virtual Hosting model, the client owns the data, the OS software, and the applications. Since the system is virtualized, it can be moved immediately to an alternate hardware environment without a lengthy and technically risky reinstallation process. With ProSight Virtual Hosting, you are not locked into a single hosting service. Find out more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: IT Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to create, maintain, find and protect data related to your IT infrastructure, procedures, business apps, and services. You can quickly find passwords or IP addresses and be warned about upcoming expirations of SSL certificates or warranties. By cleaning up and managing your IT infrastructure documentation, you can save up to 50% of time thrown away searching for vital information about your IT network. ProSight IT Asset Management includes a common repository for holding and sharing all documents required for managing your network infrastructure like standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also offers advanced automation for collecting and relating IT information. Whether youíre making improvements, doing regular maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the data you need when you need it. Find out more about ProSight IT Asset Management service.
Expert Network Security Planning
Every company ought to have a carefully considered security program that incorporates both preventive procedures and response planning. The pre-attack plan is a set of steps intended to reduce security weaknesses. The reactive strategy helps your network security personnel to assess the impact resulting from a security penetration, repair the damage, document the event, and get the IT network operational as quickly as feasible.
Progent's certified IT security engineers are available to help your business to perform a complete vulnerability evaluation and create a computer security strategy to implement security policies and mechanisms to minimize future assaults and threats.
CISM Accredited System Security Consulting Services
The CISM committee describes the core capabilities and worldwide standards of performance that information security managers are expected to master. CISM gives executive management the assurance that those who have qualified for their CISM certification possess the experience and knowledge to provide effective security management and support consulting. Progent offers the services of CISM Certified security consultants to help companies with:
Read additional details concerning Progent's CISM Information Security Engineering Expertise.
- Network Security Processes
- Risk Management
- Network Security Program Management
- Information Security Administration
- Response Management
CISSP Qualified Security Consulting Assistance
CISSP certification denotes expertise with an international standard for data security. The American National Standards Institute has granted the CISSP credential accreditation in the area of information security defined by ISO/IEC 17024. Progent offers the services of security experts who have qualified for CISSP accreditation. Progent can give you access to a CISSP-certified professional to help your organization in a variety security fields such as:
Read more details about Progent's CISSP-certified Cybersecurity Support Services.
- Security Administration Practices
- Security Architecture and Paradigms
- Access Management Solutions and Methodology
- Applications Development Security
- Secure Operations
- Physical Security
- Data Encryption Mechanisms
- Telecommunications, LAN and Internet Security
- Business Continuity Preparedness
CISSP-ISSAP Qualified Secure Information System Architecture Engineering Services
Progent's CISSP-ISSAP Certified system architecture engineers are experts who have been awarded ISSAP Certification through rigorous examination and extensive work with network security design. The Information System Security Architecture Professional (ISSAP) certification represents proven competence in the more in-depth demands of information security architecture bounded by the wider scope of IS security knowledge required for CISSP accreditation. Progent's ISSAP-premier security experts can help your business with all aspects of architecture security such as.
Read more details about Progent's ISSAP Accredited Secure IT Architecture Engineering Professionals.
- Access Management Mechanisms and Techniques
- Phone System and System Infrastructure Protection
- Cryptography Options
- Needs Evaluation and Security Guidelines
- BCP and Disaster Recovery Planning (DRP)
- Hardware Security
CISA Qualified Security Auditing Engineering Assistance
The Certified Information Systems Auditor (CISA) credential is a globally recognized qualification that indicates expertise in information system security auditing. Accredited by the American National Standards Institute (ANSI), the CISA accreditation has consultants undergo an extensive test given by the ISACA international professional association. Progent's CISA-certified network security audit specialists can assist your company in the areas of:
Get additional details concerning Progent's CISA Qualified Security Auditing Engineering Assistance.
- Information Systems Audit Services
- Information Technology Governance
- Network Assets and Architecture Planned Useful Life
- Information Technology Service Delivery
- Safeguarding Data Resources
- Business Continuity Preparedness
Certified in Risk and Information Systems Control (CRISC) Consultants
The Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA in 2010 to verify a consultant's skills to design, deploy, and maintain IS controls to mitigate risk. Progent offers the services of a CRISC-certified consultant to assist you to develop and carry out a workplace continuity or disaster recovery plan based on leading practices identified by CRISC and geared to match your organization's risk tolerance, business goals, and IT budget. Progent's CRISC IT risk mitigation engineers offer a variety of risk identification services such as:
Learn additional details concerning Progent's CRISC Risk Management Consultants.
- Collect data and review documentation to help identify significant vulnerabilities
- Inventory legal, regulatory, and contractual requirements and organizational standards related to your network to determine their potential influence on your business objectives
- Identify potential threats for your operational workflows to help in analyzing your corporate risk
- Develop a risk awareness program and provide training to make sure your stakeholders appreciate IT risk so they can assist with your risk control program
- Connect identified risk vectors to related operational processes to help assign risk ownership
- Validate risk appetite with your senior leadership and major stakeholders to make sure they are in agreement
GIAC Qualified Security Consulting Assistance
Learn more information about Progent's GIAC Information Assurance Services.
GIAC (Global Information Assurance Certification) was established in 1999 to certify the skill of network security engineers. GIAC's mission is to verify that an accredited security consultant has the knowledge appropriate to deliver services in critical areas of network, information, and application security. GIAC certifications are recognized by companies and government organizations around the world including and the U.S. National Security Agency (NSA). Progent's GIAC IS security audit experts can help your company in the areas of:
Get in Touch with a Progent Security Engineer
To see how you can get in touch with a Progent security engineer for remote or onsite help in Washington, call 1-800-993-9400 or visit Online Network Support.