Company networks in the state of Oregon can now get quick and economical online access to Progent's accredited network security consultants to help with critical security problems. Rates are competitive, billing is by the minute, sign-up is quick, and support is unbeatable. Progent also provides help for complex engagements that demand the services of seasoned security engineers with top security certifications.
If your Oregon small business is far from more populated urban neighborhoods including Portland, Salem, Eugene, Gresham, or Beaverton, help from nearby accredited security experts may be limited during an urgent situation. This could mean lost productivity for your business, upset customers, unproductive workers, and defocused management. By contacting Progent's online services, you can get in touch with a qualified security engineer who can offer help when you need it to get your information system operating and salvage your data.
Progent can assist you at any level in your initiatives to defend your information system with support ranging from network security assessments to developing a comprehensive security strategy. Progent provides economical service to help companies of any size to design and maintain protected networks powered by Microsoft Windows and Cisco technology and that may include servers and desktops based on UNIX, Linux, Sun Solaris, or Mac OS X operating systems as well as BYOD clients with Apple iOS iPhones and iPads or Android or Windows Phone handsets.
Progent can also help you outsource spam filtering and defense against email-borne attacks. Email Guard is Progent's email filtering and encryption platform that incorporates the technology of top information security companies to provide web-based management and comprehensive security for your email traffic. The hybrid structure of Email Guard managed service integrates cloud-based filtering with a local security gateway device to provide advanced protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks, and other email-based malware. The cloud filter acts as a first line of defense and blocks the vast majority of unwanted email from making it to your security perimeter. This decreases your vulnerability to external threats and saves system bandwidth and storage space. ProSight Email Guard's on-premises gateway appliance provides a further level of analysis for inbound email. For outbound email, the on-premises gateway offers AV and anti-spam filtering, protection against data leaks, and email encryption. The on-premises gateway can also enable Exchange Server to track and protect internal email that originates and ends inside your security perimeter.
Progent's security professionals are available online or on premises to provide a range of emergency or longer-term IT security services such as:
If your network has an emergency need for computer security help, go to Progent's Urgent Online Network Support.
Progent's consultants can deliver advanced services in key facets of computer protection including auditing, firewall/VPN support, and advanced security planning.
Progent's expert security consultants can evaluate the strength of your current computer security systems through exhaustive remote automated analysis based on sophisticated software tools and proven procedures. Progent's skill in administering this service saves your company time and money and assures an objective picture of gaps. The knowledge your company is provided can form the foundation of a security strategy that can permit your network to operate dependably and respond quickly to future threats.
Automated Network Vulnerability Audits
Progent provides consulting in the application of security evaluation software including MBSA and LANguard from GFI for affordably running a set of automatic network testing checks to uncover potential security vulnerabilities. Progent has broad knowledge of additional security auditing tools including NMAP Port Scanner, AMAP Application Scanner, eEye Vulnerability Scanner, plus tools such as Metasploit, Netcat, Hydra, and Nikto. Progent can show you how to make sense of testing reports and respond appropriately.
Progent can help you build security into your company operations, install auditing software, define and implement a protected system architecture, and recommend policies to maximize the safety of your IT system. Progent's security engineers are ready to show you how to configure a firewall, design safe remote connectivity to email and data, and integrate virtual private network. Learn additional information on Progent's network security audits.
Security Inventory Service Bundles for Small Businesses
Progent has put together two low-cost security inventory service bundles intended to allow small companies to get a professional security assessment from a qualified security expert. With Progent's External Network Security Inventory Checkup, a security expert administers an extensive test of your IT infrastructure from outside your firewall to determine potential risks in the security posture you expose to the outside world. With Progent's Internal Security Inventory Scan, a certified security professional executes a network scan from a secure machine inside your company firewall to uncover your exposure to inside threats. Both security inventory services are set up and run from a protected remote site. The project is overseen by an engineer who has earned high-level security accreditations and who produces a report that details and analyzes the data collected by the security scan and proposes cost-effective remediation where appropriate.
Network Penetration Analysis Consulting
Stealth penetration checking is a key component of any successful network security strategy. Progent’s security professionals can run extensive intrusion checks without the awareness of your organization's internal IT staff. Unannounced penetration testing uncovers whether current security defense systems such as intrusion incident warnings and event history monitoring are correctly set up and actively monitored. Learn more on Progent's network security penetration testing support services.
Firewall and Virtual Private Network Support
Progent's expertise in security technology includes extensive familiarity with leading firewalls and VPN products from multiple companies including Cisco, Microsoft, and Symantec. Progent can provide the support of engineers who have earned key networking certifications such as CCIE and Microsoft Certified Systems Engineer (MCSE).
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Firewalls Configuration and Debugging
Progent's Low-Cost Managed Services for Information Assurance
The new ASA 5500-X Series Next-Generation Firewalls with Firepower Services deliver significantly more performance than Cisco's earlier firewalls and have replaced the ASA 5500 and PIX 500 firewalls for all new installations. Since Cisco's purchase of Sourcefire, the entire line of Cisco ASA 5500-X firewalls can be configured to support Firepower Services, based on Sourcefire's Snort product, which is the world's most popular intrusion protection system (IPS). Firepower services provide enhanced capabilities including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network experts can assist your company to maintain your current PIX or Cisco ASA 5500 security appliances or upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite support for ASA 5500-X firewalls with Firepower Services and can assist your business to design, deploy, optimize, manage and troubleshoot firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. Learn additional details about ASA 5500-X Firewalls with Firepower Services integration and debugging support.
Cisco Network Security and VPN Consulting Services
Cisco's network security and remote access products represent a comprehensive range of easy-to-administer security solutions to help safeguard your local and remote information system. Cisco's VPN product family includes routers, firewalls, intrusion detection devices and VPN appliances. Progent's expert staff of consultants includes experienced specialists with Cisco Certified Internetwork Expert and Cisco Certified Network Professional certifications who can help your company to select Cisco VPN, Cisco RADIUS Security, and additional Cisco security solutions that fit most closely with your business objectives. Learn more information concerning Progent's Support Expertise for Cisco Security and VPN Products.
Support Expertise for Additional Firewall and VPN Technology
Progent offers small and mid-size companies professional support for Intrusion Protection products and IPsec VPN solutions from major firewall and Virtual Private Network security companies such as WatchGuard, Juniper, and SonicWALL. Progent can show you how to create a comprehensive security plan and choose appropriate technologies from a variety of vendors to achieve your security objectives while staying within your spending restraints.
Progent's low-cost ProSight series of network monitoring and management services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
Expert Network Security Planning
ProSight Active Security Monitoring is an endpoint protection service that incorporates cutting edge behavior-based analysis tools to guard endpoint devices and physical and virtual servers against modern malware attacks such as ransomware and file-less exploits, which easily escape legacy signature-based AV products. ProSight ASM protects local and cloud resources and offers a unified platform to manage the entire malware attack progression including protection, identification, mitigation, cleanup, and post-attack forensics. Key capabilities include single-click rollback using Windows VSS and real-time system-wide immunization against new threats. Learn more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense.
ProSight Enhanced Security Protection: Unified Endpoint Protection
Progent's ProSight Enhanced Security Protection services offer ultra-affordable multi-layer protection for physical servers and VMs, workstations, mobile devices, and Microsoft Exchange. ProSight ESP utilizes adaptive security and advanced heuristics for round-the-clock monitoring and responding to security assaults from all vectors. ProSight ESP offers firewall protection, intrusion alarms, endpoint management, and web filtering via cutting-edge tools incorporated within one agent managed from a single console. Progent's security and virtualization consultants can assist your business to design and configure a ProSight ESP deployment that addresses your company's unique requirements and that helps you achieve and demonstrate compliance with legal and industry information protection regulations. Progent will help you define and implement policies that ProSight ESP will manage, and Progent will monitor your IT environment and react to alarms that call for immediate action. Progent's consultants can also assist you to install and verify a backup and restore system like ProSight Data Protection Services (DPS) so you can recover quickly from a destructive security attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Exchange filtering.
ProSight Data Protection Services: Managed Cloud Backup and Recovery
ProSight Data Protection Services offer small and medium-sized businesses an affordable end-to-end solution for reliable backup/disaster recovery. For a fixed monthly cost, ProSight Data Protection Services automates your backup processes and enables rapid restoration of vital files, applications and VMs that have become lost or damaged due to hardware breakdowns, software glitches, natural disasters, human mistakes, or malware attacks like ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, applications, system images/, plus Hyper-V and VMware images/. Important data can be protected on the cloud, to an on-promises device, or to both. Progent's BDR consultants can provide advanced expertise to set up ProSight Data Protection Services to to comply with government and industry regulatory requirements such as HIPPA, FIRPA, PCI and Safe Harbor and, when needed, can help you to restore your business-critical information. Find out more about ProSight DPS Managed Cloud Backup.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering and email encryption service that uses the infrastructure of leading data security vendors to deliver centralized control and comprehensive protection for your email traffic. The powerful structure of Progent's Email Guard integrates a Cloud Protection Layer with a local gateway device to provide complete defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. Email Guard's cloud filter acts as a first line of defense and blocks most unwanted email from making it to your network firewall. This reduces your vulnerability to inbound threats and conserves system bandwidth and storage space. Email Guard's on-premises gateway appliance provides a deeper level of inspection for inbound email. For outbound email, the onsite security gateway offers AV and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The on-premises security gateway can also help Exchange Server to track and safeguard internal email that stays within your corporate firewall. For more details, visit Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size organization can have its key servers and applications hosted in a secure Tier III data center on a high-performance virtual host set up and managed by Progent's network support professionals. With Progent's ProSight Virtual Hosting model, the client owns the data, the operating system platforms, and the apps. Since the system is virtualized, it can be ported easily to an alternate hosting environment without a time-consuming and technically risky reinstallation procedure. With ProSight Virtual Hosting, your business is not locked into one hosting service. Find out more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: Network Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to create, update, retrieve and protect data related to your IT infrastructure, procedures, business apps, and services. You can instantly find passwords or IP addresses and be warned about upcoming expirations of SSLs or warranties. By updating and managing your network documentation, you can eliminate as much as 50% of time wasted looking for critical information about your network. ProSight IT Asset Management features a common location for storing and sharing all documents related to managing your network infrastructure like standard operating procedures and self-service instructions. ProSight IT Asset Management also offers advanced automation for collecting and relating IT data. Whether you’re making enhancements, performing maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the data you require when you need it. Learn more details about Progent's ProSight IT Asset Management service.
Any business should develop a thoroughly considered security program that includes both pre-attack processes and response planning. The pre-attack plan is a collection of steps designed to minimize security weaknesses. The post-attack strategy helps your company's network security engineers to evaluate the damage caused by an attack, repair the damage, record the event, and get the IT network running as rapidly as feasible.
Progent's certified IT security engineers can to assist you to run a complete risk evaluation and define a computer security strategy to implement security processes and mechanisms to mitigate future assaults and threats.
CISM Qualified Information Security Consulting Expertise
The CISM organization defines the basic capabilities and international standards of skill that information security professionals are required to master. It provides executive management the assurance that those who have qualified for their CISM credential have the experience and knowledge to provide effective security administration and consulting services. Progent offers the expertise of CISM qualified security consultants to help companies with:
Read more information about Progent's CISM Qualified IS Security Support Professionals.
- Network Security Strategies
- Vulnerability Analysis
- Information Security Implementation Management
- IS Security Management
- Response Planning
CISSP Accredited Security Engineering Services
CISSP recognizes mastery of an international standard for network security. The American National Standards Institute has granted certification accreditation in the field of data protection defined by ISO 17024. Progent can provide access to of security professionals who have qualified for CISSP accreditation. Progent can provide a CISSP-certified professional to help your company in a variety security fields such as:
Read additional details about Progent's CISSP-certified Network Security Consulting Services.
- Security Management Procedures
- Security Architecture and Paradigms
- Access Management Systems and Methodology
- Software Development Security
- Operations Security
- Physical Security
- Encryption/Decryption Mechanisms
- Telecom, LAN and WAN Security
- Business Continuity Planning
CISSP-ISSAP Accredited Secure System Architecture Consulting Assistance
Progent's CISSP-ISSAP qualified IT architecture professionals are consultants who have earned ISSAP Certification through rigorous examination and significant experience with information security architecture. The ISSAP credential indicates demonstrated skill in the most in-depth requirements of IS security architecture within the wider field of information security expertise needed for CISSP certification. Progent's ISSAP-qualified security experts can help your business with all phases of architecture security such as.
Read more details about Progent's ISSAP Certified Secure System Architecture Engineering Professionals.
- Access Control Systems and Techniques
- Phone System and System Infrastructure Protection
- Encryption/Decryption Solutions
- Needs Analysis and Security Standards
- Business Continuity Planning and Disaster Recovery Planning (DRP)
- Hardware Security
CISA Qualified Information System Security Auditing Engineering Expertise
The CISA credential is an important achievement that signifies mastery in information system security audit and control. Certified by ANSI, the CISA credential has consultants undergo a comprehensive examination given by the ISACA professional association. Progent's CISA IS security audit consultants can help your business with:
Get the details concerning Progent's CISA Qualified Network Security Auditing Consulting Expertise.
- Information Systems Audit Process
- Information Technology Administration
- Systems and Infrastructure Planned Useful Life
- IT Support
- Protecting Data Resources
- Disaster Recovery Planning
Certified in Risk and Information Systems Control (CRISC) Experts
The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA in 2010 to verify an IT professional's ability to plan, deploy, and maintain IS controls to reduce risk. Progent can provide the expertise of a CRISC-certified consultant to assist your company to create and execute a workplace continuity strategy based on industry best practices identified by CRISC and geared to align with your organization's risk appetite, business objectives, and budgetary guidelines. Progent's CRISC-qualified IT risk management engineers can provide a variety of risk evaluation services such as:
Read more details concerning Progent's CRISC Risk Management Experts.
- Collect data and review documentation to help identify major vulnerabilities
- Identify legal, regulatory, and business mandates and organizational standards associated with your network to assess their possible influence on your strategic objectives
- Point out possible vulnerabilities for your business workflows to assist in evaluating your enterprise risk
- Create a risk awareness program and conduct training to ensure your organization understand IT risk so they can assist with your risk control program
- Connect identified risk scenarios to related business processes to help assign risk responsibility
- Determine risk appetite with your senior leadership and key stakeholders to make sure they are in agreement
GIAC Certified Network Security Consulting Assistance
Global Information Assurance Certification was founded in 1999 to certify the skill of IT security engineers. GIAC's mission is to assure that an accredited security consultant has the knowledge necessary to deliver services in critical areas of system, data, and application security. GIAC accreditations are acknowledged by businesses and institutions throughout the world including and the U.S. National Security Agency. Progent's GIAC-qualified IS security audit experts are available to help your company with:
Find out more information concerning Progent's GIAC Information Assurance Services.
- Auditing Networks
- Security Incident Handling
- Intrusion Detection
- Web Application Security
- SIEM solutions
Get in Touch with a Certified Progent Security Engineer
To see how to get in touch with a certified Progent security consultant for online or on-premises support in Oregon, phone 1-800-993-9400 or visit Remote Computer Support.