Company computer networks in the state ofWashingtoncan have fast and affordable online access to Progent's qualified network security experts to resolve complex security issues. Rates are reasonable, charges are per minute, engagement is quick, and support is world class. Progent also provides assistance for long-term engagements that demand the expertise of seasoned security engineers with top industry certifications.
If yourWashingtonbusiness is based away from major metropolitan areas likeSeattle, Spokane, Tacoma, Bellevue, or Vancouver, access to nearby certified security experts could be limited when you have a security disaster. This can cause a drop in productivity for your business, upset customers, unproductive employees, and defocused management. By utilizing Progent, you can get in touch with a Certified security consultant who can deliver assistance whenever you need it to keep your system operating and restore your data.
Progent can help you at any level in your initiatives to guard your IT environment with services ranging from security audits to creating a comprehensive security plan. Progent offers economical support to assist small and midsize companies to set up and manage safe IT environments powered by Microsoft Windows and Cisco products and that may include servers and desktops running UNIX, Linux, Sun Solaris, or Mac OS X operating systems plus BYOD clients with Apple handhelds or Google Android or Windows Phone devices.
Progent can also show you how to outsource spam filtering and protection from e-mail-based security threats. Email Guard is Progent's email filtering and encryption solution that incorporates the technology of top information security vendors to provide web-based management and comprehensive protection for all your inbound and outbound email. The powerful structure of Progent's Email Guard managed service combines cloud-based filtering with an on-premises security gateway appliance to provide complete defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. ProSight Email Guard's cloud filter serves as a preliminary barricade and blocks the vast majority of threats from reaching your network firewall. This decreases your vulnerability to external threats and saves network bandwidth and storage space. ProSight Email Guard's onsite security gateway device adds a further layer of inspection for inbound email. For outbound email, the onsite security gateway provides AV and anti-spam protection, protection against data leaks, and email encryption. The on-premises gateway can also enable Microsoft Exchange Server to track and protect internal email that originates and ends inside your security perimeter.
Progent's security professionals are available online or on premises to offer a range of emergency or longer-term network security services such as:
If your company has an emergency need for computer security support, refer to Progent's Urgent Online Network Support.
Progent's consultants can deliver world-class services in key fields of system protection including security assessment, firewalls and VPN, and high-level security consulting.
Progent's expert security consultants can evaluate the vulnerability of your current network security implementation through exhaustive remote automated analysis based on advanced software tools and tested techniques. Progent's experience in administering this testing saves you money and assures a detailed portrayal of security holes. The information your company is provided can be used as the basis of a network protection plan that can permit your information system to operate safely and adapt quickly to future threats.
Automated Vulnerability Analysis
Progent offers expertise in the application of security testing packages such as Microsoft Baseline Security Analyzer and GFI LANguard Network Security Scanner for economically performing a set of automatic network auditing scans to identify possible security weaknesses. Progent has extensive knowledge of other network auditing utilities such as NMAP, AMAP, eEye Vulnerability Scanner, as well as tools like Metasploit, Netcat, and Nikto. Progent can show you how to understand audit reports and react effectively.
Progent can help you build protection into your business processes, install scanning software, plan and deploy a protected system architecture, and suggest policies to optimize the security of your network. Progent's security consultants are ready to assist you to set up a firewall, implement safe remote connectivity to email and business applications, and install virtual private network. Learn additional information concerning Progent's network security evaluation.
Security Inventory Scanning Packages for Small Companies
Progent offers two low-cost security inventory service packages designed to enable small businesses to receive an objective network security assessment from an accredited security specialist. With Progent's External Security Inventory Scan, a security engineer runs an extensive test of your IT infrastructure from outside your firewalled perimeter to uncover possible risks in the security profile you present to the outside world. With Progent's Internal Network Security Inventory Scan, a security expert executes a system scan from an authorized computer within your company firewall to determine the risk to inside assaults. The two security inventory services are set up and executed from a protected external site. The process is overseen by an engineer with high-level security accreditations and who produces a report that details and interprets the data captured by the security scan and suggests cost-effective improvements where called for.
Network Penetration Testing Consulting
Stealth intrusion testing is a key part of any serious IT system security plan. Progentís security professionals can run thorough intrusion tests without the knowledge of your company's internal network support resources. Stealth penetration checking uncovers whether current security defense tools such as intrusion detection warnings and event history analysis are properly set up and actively monitored. Learn more about Progent's network penetration analysis support services.
Progent's background in security solutions includes extensive familiarity with leading firewalls and Virtual Private Network (VPN) products offered by multiple vendors including Cisco, Microsoft, and CheckPoint. Progent offers the support of engineers with important industry certifications including Cisco Certified Internetwork Expert (CCIE) and Microsoft MCSE.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Configuration and Debugging
The current ASA 5500-X Family of firewalls with Firepower Services offer significantly more bang for the buck than Cisco's legacy firewalls and have superseded the ASA 5500 and PIX security appliances for new installations. Since Cisco's purchase of Sourcefire, the entire line of ASA 5500-X devices can be provisioned to support Firepower Services, based on Sourcefire's Snort technology, which is the world's most popular intrusion protection system. Firepower services bring enhanced capabilities such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-premier CCIE network consultants can assist your company to maintain your legacy PIX or ASA 5500 security appliances and migrate efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite support for ASA 5500-X firewalls with Firepower Services and can assist your company to plan, deploy, tune, administer and debug firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. See more information about ASA Firewalls with Firepower Services integration and troubleshooting support.
Cisco Network Security and VPN Consulting Expertise
Cisco's security and remote access products offer a comprehensive line of manageable security products to help protect your local and remote information system. Cisco's VPN line includes routers, firewalls, intrusion detection devices and VPN appliances. Progent's expert consulting staff includes field-proven engineers with Cisco's CCIE and CCNP certifications who are able to assist your organization to evaluate Cisco VPN, Cisco RADIUS Security, and other Cisco security technologies that align most closely with your company goals. Read additional details concerning Progent's Consulting Services for Cisco Security Solutions and Virtual Private Network Appliances.
Support Services for Other Firewall and VPN Technology
Progent offers small and mid-size organizations professional support for Intrusion Protection Systems and IPsec VPN technology from leading firewall and Virtual Private Network security vendors such as WatchGuard, Juniper, and SonicWall. Progent can show you how to design a detailed security plan and choose the right technologies from multiple suppliers to achieve your security objectives while staying within your budget restraints.
Progent's Fixed-price Managed Services for Information Assurance
Progent's low-cost ProSight portfolio of network monitoring and management services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring is an endpoint protection solution that utilizes cutting edge behavior-based machine learning tools to guard endpoints as well as servers and VMs against modern malware attacks such as ransomware and email phishing, which routinely escape legacy signature-matching anti-virus products. ProSight Active Security Monitoring protects local and cloud resources and provides a unified platform to address the complete threat lifecycle including filtering, detection, containment, remediation, and forensics. Key capabilities include single-click rollback using Windows Volume Shadow Copy Service (VSS) and automatic network-wide immunization against new attacks. Read more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Protection
Progent's ProSight Enhanced Security Protection (ESP) services deliver affordable in-depth security for physical and virtual servers, workstations, smartphones, and Exchange Server. ProSight ESP uses adaptive security and advanced heuristics for round-the-clock monitoring and reacting to security assaults from all attack vectors. ProSight ESP provides two-way firewall protection, penetration alarms, endpoint management, and web filtering through cutting-edge tools packaged within a single agent accessible from a single control. Progent's data protection and virtualization consultants can assist your business to plan and configure a ProSight ESP deployment that meets your organization's specific requirements and that allows you achieve and demonstrate compliance with legal and industry data security regulations. Progent will assist you define and implement policies that ProSight ESP will enforce, and Progent will monitor your IT environment and react to alerts that call for urgent action. Progent can also assist you to install and test a backup and disaster recovery solution like ProSight Data Protection Services (DPS) so you can get back in business quickly from a destructive cyber attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint protection and Microsoft Exchange email filtering.
ProSight DPS: Managed Backup
ProSight Data Protection Services provide small and mid-sized organizations a low cost and fully managed service for reliable backup/disaster recovery. For a fixed monthly price, ProSight DPS automates your backup activities and allows fast restoration of critical data, applications and virtual machines that have become unavailable or damaged as a result of hardware breakdowns, software bugs, natural disasters, human error, or malware attacks such as ransomware. ProSight DPS can help you back up, retrieve and restore files, folders, apps, system images, plus Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to an on-promises device, or mirrored to both. Progent's BDR consultants can provide world-class support to set up ProSight DPS to be compliant with regulatory standards like HIPPA, FINRA, PCI and Safe Harbor and, whenever needed, can assist you to restore your business-critical information. Read more about ProSight Data Protection Services Managed Backup and Recovery.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering service that incorporates the infrastructure of leading information security vendors to provide web-based management and comprehensive security for all your inbound and outbound email. The powerful architecture of Email Guard combines cloud-based filtering with an on-premises gateway device to provide advanced defense against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-borne threats. Email Guard's Cloud Protection Layer serves as a first line of defense and blocks the vast majority of threats from making it to your network firewall. This reduces your exposure to inbound threats and conserves network bandwidth and storage. Email Guard's onsite security gateway appliance provides a deeper level of inspection for incoming email. For outgoing email, the local gateway offers AV and anti-spam protection, protection against data leaks, and email encryption. The onsite gateway can also assist Exchange Server to track and protect internal email traffic that stays within your corporate firewall. For more information, see ProSight Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small business can have its key servers and applications hosted in a secure fault tolerant data center on a high-performance virtual host configured and managed by Progent's IT support experts. With Progent's ProSight Virtual Hosting model, the client retains ownership of the data, the operating system software, and the apps. Because the environment is virtualized, it can be ported easily to a different hosting environment without a lengthy and difficult reinstallation procedure. With ProSight Virtual Hosting, your business is not tied one hosting provider. Learn more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: IT Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to capture, maintain, retrieve and safeguard data related to your network infrastructure, procedures, applications, and services. You can quickly find passwords or IP addresses and be warned about impending expirations of SSLs or domains. By updating and organizing your IT documentation, you can eliminate up to half of time wasted looking for vital information about your network. ProSight IT Asset Management includes a common repository for holding and collaborating on all documents required for managing your business network such as standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also offers advanced automation for gathering and relating IT information. Whether youíre making enhancements, doing regular maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the knowledge you need when you need it. Learn more details about Progent's ProSight IT Asset Management service.
Expert Network Security Planning
Any business ought to have a carefully thought out security program that includes both proactive processes and response plans. The pre-attack strategy is a set of procedures intended to minimize security weaknesses. The reactive strategy helps your IT security personnel to assess the damage resulting from a security penetration, fix the damage, document the experience, and get business functions restored as rapidly as feasible.
Progent's certified IS security consultants can to assist you to run a full vulnerability evaluation and create a computer security strategy to implement security processes and mechanisms to reduce future attacks and threats.
CISM Accredited Security Engineering Services
The CISM committee describes the basic capabilities and worldwide standards of skill that information security managers are required to master. CISM gives executive management the confidence that consultants who have qualified for their CISM certification have the background and knowledge to deliver efficient security administration and support consulting. Progent can provide the support of CISM Certified security consultants to assist companies with:
Learn more details about Progent's CISM Certified Information Security Engineering Expertise.
- Network Security Strategies
- Risk Analysis
- Network Security Implementation Management
- Information Security Management
- Response Management
CISSP Accredited Security Engineering Expertise
The CISSP credential recognizes expertise with a worldwide standard for network security. The American National Standards Institute has awarded certification accreditation in the area of data security stipulated by ISO/IEC 17024. Progent can provide the services of security professionals who have earned CISSP accreditation. Progent can provide a CISSP-certified expert to help your organization in a broad range of security areas including:
Find out additional details concerning Progent's CISSP Accredited Information Security Support Professionals.
- Security Administration Procedures
- Security Architecture and Paradigms
- Access Control Systems and Processes
- Software Development Security
- Secure Operations
- Site Security
- Encryption/Decryption Technology
- Telecommunications, Network and Internet Security
- Business Continuity Preparedness
CISSP-ISSAP Certified Secure IT Architecture Consulting Assistance
Progent's CISSP-ISSAP Premier IT architecture professionals are experts who have been awarded ISSAP status as a result of thorough testing and extensive experience with network security architecture. The Information System Security Architecture Professional (ISSAP) credential indicates demonstrated skill in the most complex requirements of information security architecture within the broader field of information security expertise required for CISSP certification. Progent's ISSAP-certified security experts can help your business with all phases of secure network architecture such as.
Find out more information concerning Progent's ISSAP Certified Secure IT Architecture Support Professionals.
- Access Control Mechanisms and Methodologies
- Telecommunications and System Infrastructure Protection
- Cryptography Options
- Requirements Analysis and Security Standards
- BCP and Disaster Recovery Planning
- Physical Security
CISA Certified Network Security Auditing Consulting Expertise
The Certified Information Systems Auditor (CISA) credential is a recognized qualification that indicates mastery in IS security auditing. Certified by ANSI, the CISA credential has consultants undergo a comprehensive test administered by the ISACA professional association. Progent's CISA IS security audit experts can help your company with:
Get additional details about Progent's CISA Certified Information System Security Auditing Consulting Services.
- IS Audit Process
- Information Technology Governance
- Systems and Infrastructure Lifecycle
- Information Technology Service Delivery
- Safeguarding Information Resources
- Business Continuity Preparedness
The CRISC certification program was initiated by ISACA in 2010 to verify a consultant's skills to plan, implement, and maintain IS controls to reduce risk. Progent offers the expertise of a CRISC-certified consultant to assist you to develop and execute a business continuity or disaster recovery plan based on industry best practices identified by CRISC and crafted to align with your organization's risk appetite, business goals, and budgetary guidelines. Progent's CRISC-certified network risk management engineers can provide a range of risk evaluation services such as:
Read more details about Progent's CRISC Risk Management Consultants.
- Collect data and review documentation to identify major risk scenarios
- Inventory legal, industry, and contractual requirements and company standards related to your network to determine their possible influence on your strategic objectives
- Identify potential threats for your business processes to assist in evaluating your enterprise risk
- Develop a risk awareness program and provide seminars to make sure your stakeholders understand IS risk so they can contribute to your risk control process
- Connect identified risk scenarios to related business processes to help assign risk responsibility
- Validate risk appetite with your senior leadership and key stakeholders to make sure they align
GIAC Certified Information System Security Engineering Support
GIAC (Global Information Assurance Certification) was founded in 1999 to validate the knowledge of IT security engineers. GIAC's mission is to ensure that an accredited professional possesses the skills appropriate to deliver services in vital areas of network, information, and program security. GIAC certifications are recognized by companies and institutions throughout the world including and the United States National Security Agency. Progent's GIAC-certified network security audit specialists can help your IT organization with:
Find out additional information about Progent's GIAC Information Assurance Expertise.
- Auditing IT Infrastructure
- Incident Handling
- Intrusion Detection
- Web Services Security
- SIEM solutions
Talk to a Certified Security Engineer
To see how to get in touch with a certified security engineer for remote or on-premises assistance in Washington, phone 1-800-993-9400 or visit Online Network Support.