Company computer networks in Washington can depend on quick and affordable online access to Progent's qualified network security support specialists to resolve critical security problems. The cost is affordable, charges are per minute, sign-up is immediate, and support is unbeatable. Progent also offers help for long-term engagements that requires the expertise of seasoned security engineers with high-level industry credentials.
In case your Washington organization is situated outside of major urban areas such as Seattle, Spokane, Tacoma, Bellevue, or Vancouver, the availability of nearby accredited security professionals could be limited during an urgent situation. This can cause lost productivity for your company, upset customers, unproductive workers, and distracted executives. By utilizing Progent's online services, you can get in touch with a Certified security professional ready to offer assistance whenever you need it to get your system running and restore your information.
Progent can assist you at any level in your efforts to protect your information system with support services ranging from security assessments to creating a company-wide security plan. Progent offers economical service to assist businesses of all sizes to configure and maintain secure IT environments based on Windows and Cisco products and that may include computers based on UNIX, Linux, Sun Solaris, or Mac OS X platforms as well as mobile clients with Apple iPhones and iPads or Google Android or Windows Phone handsets.
Progent can also assist you to outsource spam filtering and protection from email-borne security threats. Email Guard is Progent's email filtering and encryption solution that incorporates the technology of leading data security companies to provide centralized control and world-class security for your inbound and outbound email. The powerful structure of Email Guard managed service combines cloud-based filtering with a local security gateway device to offer complete defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-based threats. ProSight Email Guard's cloud filter serves as a preliminary barricade and keeps the vast majority of threats from reaching your network firewall. This decreases your exposure to inbound attacks and conserves network bandwidth and storage. ProSight Email Guard's on-premises security gateway device provides a further level of inspection for incoming email. For outbound email, the onsite gateway provides AV and anti-spam protection, DLP, and encryption. The local security gateway can also enable Microsoft Exchange Server to track and safeguard internal email that stays inside your corporate firewall.
Progent's certified professionals are accessible online or on site to offer a range of emergency or project-based computer security services which include:
If your business has an urgent requirement for computer security support, refer to Progent's Urgent Online Technical Support.
Progent's consultants can deliver advanced services in key facets of network security including analysis, firewall and VPN solutions, and advanced security consulting.
Progent's expert security consultants can assess the effectiveness of your current network protection implementation by performing comprehensive remote automated testing via advanced utilities and tested techniques. Progent's skill in administering this service saves your company time and money and offers a detailed picture of security holes. The information your business is provided can be used as the basis of a network protection strategy that will permit your information system to operate safely and respond rapidly to future threats.
Automated Network Security Assessment
Progent offers consulting in the application of security testing software including Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard Network Security Scanner for affordably performing a variety of programmed system testing checks to uncover possible security gaps. Progent has broad knowledge of other network analysis tools including NMAP, AMAP Application Scanner, eEye, as well as tools such as Metasploit, Netcat, Socat, and Nikto. Progent can help you to make sense of testing reports and respond appropriately.
Progent can help you build security into your company operations, install auditing applications, plan and implement a secure network architecture, and recommend procedures to optimize the safety of your network. Progent's security professionals are available to assist you to configure a firewall, design secure remote access to email and business applications, and install virtual private network. Learn additional information on Progent's network security audits.
Security Inventory Bundles for Small Companies
Progent has put together two ultra-affordable security inventory bundles intended to allow small businesses to get an independent security evaluation from a certified security expert. With Progent's External Network Security Inventory Checkup, a security engineer administers a comprehensive examination of your IT infrastructure from beyond your firewalled perimeter to determine potential weaknesses in the security posture you present to the outside world. With Progent's Internal Security Inventory Scan, a security engineer runs a system scan from an authorized machine inside your company firewall to assess your exposure to inside threats. The two security inventory services are configured and executed from a secured remote site. The project is directed by a consultant with top security credentials and who produces a document that details and analyzes the data collected by the scan and suggests practical improvements if called for.
Network Intrusion Testing Consulting
Stealth intrusion testing is a key component of any successful network security plan. Progentís security professionals can run extensive intrusion tests without the awareness of your organization's internal network support resources. Stealth penetration testing uncovers whether existing security monitoring tools such as intrusion detection warnings and event log monitoring are correctly set up and actively checked. Find out additional information about Progent's stealth penetration analysis support services.
Firewalls and VPN Expertise
Progent's background in network security solutions includes extensive familiarity with leading firewalls and Virtual Private Network products from multiple vendors such as Cisco, Microsoft, and Juniper. Progent offers the support of consultants with important networking certifications such as Cisco Certified Internetwork Expert (CCIE) and Microsoft MCSE.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Security Appliances Integration and Troubleshooting
The current ASA 5500-X Series Next-Generation Firewalls with Firepower Services provide significantly more bang for the buck than Cisco's earlier PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX security appliances for new installations. Following Cisco's purchase of Sourcefire, the whole family of ASA 5500-X devices can be provisioned to enable Firepower Services, based on Sourcefire's Snort product, which is the market's most deployed network intrusion protection system. Firepower services bring powerful new capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-premier CCIE network consultants can assist you to manage your current PIX or ASA 5500 security appliances and upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite help with ASA 5500-X firewalls with Firepower Services and can assist your business to plan, integrate, tune, administer and troubleshoot firewall environments built on Cisco ASA 5500-X firewalls with Firepower Services. Learn more details about Cisco ASA Firewalls with Firepower Services configuration and debugging support.
Cisco Network Security and VPN Support Services
Cisco's network security and offsite access products represent a complete line of easy-to-administer security products to help protect your local and remote network infrastructure. Cisco's VPN line features switches, firewalls, intrusion detection systems and VPN appliances. Progent's expert consulting staff includes field-proven specialists with Cisco Certified Internetwork Expert and CCNP certifications who are able to assist your organization to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security solutions that fit most closely with your company objectives. Learn more details about Progent's Engineering Services for Cisco Security and Virtual Private Network Products.
Engineering Services for Additional Firewall and VPN Technology
Progent offers small and mid-size companies expert consulting for Intrusion Protection Systems and IPsec VPN products from major firewall and Virtual Private Network security vendors including WatchGuard, Juniper Networks, and Symantec. Progent can show you how to design a detailed security strategy and select the right technologies from multiple vendors to achieve your security goals while staying within your spending limits.
Progent's Fixed-price Managed Services for Information Assurance
Progent's affordable ProSight family of network monitoring and management services is designed to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all facets of information assurance. ProSight managed services offered by Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring is an endpoint protection (EPP) service that incorporates cutting edge behavior analysis tools to defend endpoint devices and physical and virtual servers against new malware attacks like ransomware and file-less exploits, which easily escape traditional signature-based AV tools. ProSight Active Security Monitoring protects local and cloud resources and provides a single platform to address the complete malware attack lifecycle including filtering, infiltration detection, mitigation, cleanup, and post-attack forensics. Key features include one-click rollback with Windows Volume Shadow Copy Service and automatic network-wide immunization against new threats. Learn more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection: Unified Endpoint Protection
Progent's ProSight Enhanced Security Protection (ESP) managed services offer economical multi-layer security for physical servers and virtual machines, workstations, smartphones, and Exchange email. ProSight ESP uses contextual security and advanced machine learning for continuously monitoring and responding to security assaults from all attack vectors. ProSight ESP offers two-way firewall protection, intrusion alerts, device management, and web filtering via leading-edge tools incorporated within one agent accessible from a unified console. Progent's data protection and virtualization consultants can assist you to plan and configure a ProSight ESP deployment that addresses your organization's unique requirements and that helps you prove compliance with government and industry data security regulations. Progent will assist you define and implement security policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alarms that require immediate attention. Progent can also help you to set up and test a backup and restore system such as ProSight Data Protection Services (DPS) so you can get back in business quickly from a destructive security attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified endpoint security and Microsoft Exchange filtering.
ProSight Data Protection Services: Managed Backup and Recovery
ProSight Data Protection Services provide small and medium-sized businesses a low cost end-to-end solution for reliable backup/disaster recovery (BDR). Available at a fixed monthly rate, ProSight Data Protection Services automates and monitors your backup activities and allows rapid restoration of critical data, applications and VMs that have become unavailable or corrupted due to hardware breakdowns, software bugs, natural disasters, human mistakes, or malware attacks like ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, apps, system images, plus Hyper-V and VMware virtual machine images. Important data can be protected on the cloud, to an on-promises storage device, or mirrored to both. Progent's cloud backup consultants can provide advanced support to configure ProSight DPS to to comply with government and industry regulatory requirements such as HIPPA, FIRPA, and PCI and, when necessary, can assist you to restore your critical information. Find out more about ProSight DPS Managed Cloud Backup and Recovery.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering service that incorporates the infrastructure of leading information security vendors to provide web-based control and world-class protection for your inbound and outbound email. The powerful architecture of Progent's Email Guard managed service integrates a Cloud Protection Layer with an on-premises gateway device to offer advanced protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. Email Guard's Cloud Protection Layer acts as a first line of defense and blocks the vast majority of threats from reaching your security perimeter. This reduces your vulnerability to external attacks and conserves network bandwidth and storage. Email Guard's onsite gateway appliance provides a deeper level of inspection for incoming email. For outbound email, the on-premises security gateway offers AV and anti-spam protection, DLP, and email encryption. The on-premises gateway can also assist Exchange Server to monitor and protect internal email traffic that originates and ends inside your security perimeter. For more details, visit Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small business can have its key servers and applications hosted in a secure Tier III data center on a fast virtual machine host set up and managed by Progent's network support experts. Under the ProSight Virtual Hosting model, the customer retains ownership of the data, the OS software, and the applications. Because the system is virtualized, it can be ported immediately to an alternate hosting solution without a time-consuming and technically risky configuration process. With ProSight Virtual Hosting, you are not tied a single hosting provider. Learn more about ProSight Virtual Hosting services.
ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to create, maintain, retrieve and protect data about your IT infrastructure, procedures, applications, and services. You can instantly find passwords or IP addresses and be alerted automatically about impending expirations of SSL certificates or domains. By cleaning up and managing your IT infrastructure documentation, you can eliminate up to half of time thrown away looking for vital information about your IT network. ProSight IT Asset Management features a centralized location for storing and sharing all documents related to managing your network infrastructure like standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also supports a high level of automation for gathering and relating IT data. Whether youíre planning improvements, doing maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the information you need the instant you need it. Learn more details about Progent's ProSight IT Asset Management service.
Expert Network Security Planning
Any business ought to develop a thoroughly thought out security strategy that incorporates both proactive procedures and response planning. The proactive plan is a collection of steps intended to reduce security weaknesses. The post-attack strategy assists your IT security engineers to evaluate the damage resulting from a security penetration, repair the system, record the event, and get business functions operational as rapidly as possible.
Progent's expert information security engineers are available to help your business to perform a comprehensive vulnerability evaluation and create a computer security plan to establish security processes and mechanisms to minimize ongoing attacks and threats.
CISM Certified Information Security Support Expertise
The Certified Information Security Manager (CISM) organization describes the basic capabilities and international standards of skill that information security managers are expected to master. It provides executive management the assurance that consultants who have qualified for their CISM certification have the background and knowledge to deliver effective security management and support consulting. Progent offers the services of CISM Premier security professionals to help companies with:
Find out additional details about Progent's CISM Qualified Network Security Engineering Professionals.
- Network Security Processes
- Risk Management
- Network Security Program Management
- Network Security Management
- Recovery Management
CISSP Accredited Security Consulting Services
CISSP certification recognizes expertise with a worldwide standard for data security. ANSI has awarded certification recognition in the field of information protection defined by ISO 17024. Progent offers access to of security consultants who have qualified for CISSP accreditation. Progent can provide a CISSP-certified professional to help your organization in a variety security areas including:
Learn more details about Progent's CISSP Accredited Network Security Support Professionals.
- Security Administration Practices
- Security Infrastructure and Paradigms
- Access Management Systems and Processes
- Applications Development Security
- Operations Security
- Physical Security
- Encryption/Decryption Mechanisms
- Telecom, Network and WAN Security
- Disaster Recovery Planning
CISSP-ISSAP Qualified Secure IT Architecture Engineering Assistance
Progent's CISSP-ISSAP Premier system architecture professionals are consultants who have been awarded ISSAP Certification through rigorous testing and significant work with network security design. The ISSAP credential represents proven competence in the most complex demands of IS security architecture within the broader scope of IS security expertise needed for CISSP certification. Progent's ISSAP-certified security specialists can help your company with all phases of secure network architecture such as.
Read more information about Progent's ISSAP Certified Secure IT Architecture Engineering Expertise.
- Access Management Mechanisms and Techniques
- Telecommunications and System Infrastructure Protection
- Cryptography Solutions
- Requirements Analysis and Security Guidelines
- Business Continuity Planning (BCP) and DRP
- Hardware Security
CISA Certified IS Security Auditing Engineering Expertise
The Certified Information Systems Auditor (CISA) accreditation is a prestigious qualification that represents mastery in network security audit and control. Accredited by the American National Standards Institute, the CISA credential requires that candidates pass a comprehensive examination administered by the ISACA professional group. Progent's CISA-certified information security audit consultants are available to help your company with:
Find out the details concerning Progent's CISA Accredited IS Security Auditing Engineering Support.
- IS Audit Services
- Information Technology Enforcement
- Systems and Infrastructure Planned Useful Life
- IT Support
- Safeguarding Data Resources
- Disaster Recovery Planning
The CRISC certification program was established by ISACA to verify an IT professional's ability to plan, implement, and support IS control mechanisms to mitigate risk. Progent offers the services of a CRISC-certified consultant to assist you to develop and carry out a workplace continuity strategy that follows leading practices promoted by CRISC and geared to align with your organization's risk tolerance, business goals, and budgetary guidelines. Progent's CRISC-certified network risk mitigation experts offer a variety of risk assessment services including:
Learn more information concerning Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.
- Gather data and review documentation to evaluate significant vulnerabilities
- Inventory legal, regulatory, and contractual mandates and organizational standards associated with your information system to assess their potential impact on your business objectives
- Point out potential vulnerabilities for your business processes to help in analyzing your corporate risk
- Create a risk awareness initiative and conduct training to make sure your stakeholders understand IT risk so they can assist with your risk management program
- Match identified risk scenarios to related business processes to help determine risk responsibility
- Determine risk tolerance with your senior management and major stakeholders to ensure they are in agreement
GIAC Qualified Information System Security Consulting Expertise
Learn additional details about Progent's GIAC Information Assurance Expertise.
GIAC (Global Information Assurance Certification) was founded in 1999 to certify the knowledge of computer security engineers. GIAC's goal is to make sure that an accredited professional has the knowledge needed to deliver services in important areas of system, information, and application security. GIAC certifications are recognized by businesses and institutions throughout the world including and the U.S. National Security Agency. Progent's GIAC information security audit engineers can assist your business with:
Contact a Certified Security Specialist
To learn how to contact a Progent security engineer for remote or onsite assistance in Washington, call 1-800-993-9400 or go to Remote Computer Support.