Small business computer networks in Oregon now have prompt and economical remote help from Progent's certified network security support specialists to help with the toughest security issues. Rates are affordable, charges are by the minute, engagement is immediate, and service is unbeatable. Progent also provides help for complex engagements that demand the knowledge of senior security consultants with top security certifications.
If your Oregon network is based far from major metropolitan neighborhoods like Portland, Salem, Eugene, Gresham, or Beaverton, the availability of local accredited network security consultants could be problematic when there's an emergency. This can cause a loss of productivity for your business, upset clients, unproductive workers, and distracted management. By contacting Progent's online services, you have access to a Premier security professional who can deliver assistance whenever you need it to get your computer network operating and recover your information.
Progent can assist you in your efforts to protect your network with support services that ranges from network security audits to creating a company-wide security plan. Progent provides economical support to help small and midsize companies to configure and maintain safe IT environments based on Windows and Cisco products and that may include computers based on UNIX, Linux, Sun Solaris, or Mac OS X operating systems plus BYOD users with Apple iPhones and iPads or Android or Windows Phone smart phones and tablets.
Progent can also show you how to outsource spam blocking and protection from email-borne attacks. Email Guard is Progent's email filtering and encryption solution that uses the technology of top information security companies to deliver web-based management and comprehensive security for all your email traffic. The hybrid architecture of Email Guard managed service combines cloud-based filtering with a local gateway appliance to offer complete defense against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-based malware. ProSight Email Guard's cloud filter serves as a first line of defense and blocks the vast majority of unwanted email from reaching your network firewall. This decreases your vulnerability to external attacks and saves network bandwidth and storage space. ProSight Email Guard's onsite security gateway appliance adds a further level of analysis for incoming email. For outgoing email, the local security gateway offers anti-virus and anti-spam filtering, protection against data leaks, and email encryption. The local security gateway can also enable Microsoft Exchange Server to track and safeguard internal email traffic that stays inside your security perimeter.
Progent's security experts are available remotely or in person to provide a range of urgent or longer-term IT security services such as:
If your business has an emergency requirement for computer security support, refer to Progent's Emergency Remote Technical Support.
Progent's engineers offer advanced services in key fields of computer security including analysis, firewalls and VPN, and advanced security planning.
Progent's expert security consultants can evaluate the strength of your current computer security environment through comprehensive remote automated testing via sophisticated software tools and proven procedures. Progent's skill in this testing saves you consulting fees and assures an accurate portrayal of system vulnerability. The knowledge your IT organization is provided can make up the basis of a security plan that will permit your network to operate safely and respond rapidly to future risks.
Automated Network Security Assessment
Progent provides expertise in the use of security testing software including Microsoft's MBSA and GFI LANguard Network Security Scanner for affordably running a set of automatic network auditing scans to uncover potential security gaps. Progent has broad experience with other network auditing utilities including NMAP, AMAP, eEye, plus utilities such as Metasploit Framework, Hydra, and Nikto. Progent can help you to understand audit reports and react appropriately.
Progent can help you design security into your company processes, configure scanning applications, plan and deploy a protected network environment, and suggest policies to optimize the security of your network. Progent's security engineers are ready to show you how to set up a firewall, implement safe remote access to email and data, and install VPN. Find out additional information about Progent's automated security audits.
Security Inventory and Evaluation Bundles for Small Businesses
Progent offers two low-cost security inventory and evaluation packages intended to enable small companies to receive a professional security evaluation from an accredited security engineer. With Progent's External Security Inventory Scan, a security expert runs a comprehensive examination of your IT infrastructure from outside your company firewall to uncover potential risks in the security posture you present to the outside world. With Progent's Internal Security Inventory Scan, a security expert executes a system scan from a secure computer within your company firewall to uncover vulnerabilities to inside threats. The two security inventory packages are configured and run from a secured remote site. The process is overseen by a consultant who has earned top security credentials and who produces a document that summarizes and interprets the information collected by the security scan and suggests practical remediation if appropriate.
Network Intrusion Analysis Support Services
Stealth penetration checking is an important part of any successful network security strategy. Progentís security experts can run extensive penetration checks without the awareness of your organization's in-house network support resources. Unannounced penetration testing shows whether existing security monitoring tools such as intrusion incident warnings and event log analysis are correctly set up and consistently checked. Learn more on Progent's network penetration analysis support services.
Firewall and Virtual Private Network Solutions
Progent's background in security solutions includes in-depth field work with major firewalls and Virtual Private Network (VPN) products offered by multiple vendors such as Cisco, Microsoft, and Symantec. Progent can provide the support of consultants who have earned important industry certifications including CCIE and Microsoft Certified Systems Engineer.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Integration and Troubleshooting
The current ASA 5500-X Series Next-Generation Firewalls with Firepower Services provide substantially more value than Cisco's earlier PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX security appliances for new deployments. Since Cisco's purchase of Sourcefire, the entire line of ASA 5500-X firewalls can be configured to support Firepower Services, based on Sourcefire's Snort product, which is the world's most popular network intrusion protection system. Firepower services bring powerful new capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-premier CCIE network consultants can assist your company to manage your current PIX or ASA 5500 security appliances and migrate efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and on-premises help with ASA 5500-X firewalls with Firepower Services and can assist your company to design, configure, tune, administer and troubleshoot firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services. See additional details about Cisco ASA Firewalls with Firepower Services configuration and troubleshooting support.
Cisco Security and VPN Support Expertise
Cisco's network security and remote access technology provide a complete line of easy-to-administer security products to help safeguard your wired and wireless information system. Cisco's VPN line includes routers, firewalls, intrusion detection systems and VPN appliances. Progent's professional staff of consultants includes experienced specialists with Cisco CCIE and Cisco Certified Network Professional qualifications who are able to help your business to select Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security solutions that fit most closely with your business goals. Read more information concerning Progent's Consulting Expertise for Cisco Security Technology and VPN Appliances.
Consulting Services for Additional Firewall and VPN Technology
Progent provides small and mid-size companies expert support for Intrusion Protection Systems and IPsec VPN products from leading firewall and VPN security companies including WatchGuard, Juniper, and Symantec. Progent can show you how to create a detailed security strategy and choose appropriate technologies from multiple vendors to achieve your security objectives while staying within your spending limits.
Progent's Low-Cost Managed Services for Information Assurance
Progent's value-priced ProSight series of network monitoring and management services is intended to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance. Managed services offered by Progent include:
ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring is an endpoint protection solution that utilizes cutting edge behavior analysis tools to defend endpoints and servers and VMs against new malware attacks like ransomware and file-less exploits, which routinely escape traditional signature-matching anti-virus products. ProSight Active Security Monitoring safeguards on-premises and cloud-based resources and provides a unified platform to address the entire malware attack progression including blocking, identification, mitigation, cleanup, and post-attack forensics. Top features include one-click rollback with Windows Volume Shadow Copy Service (VSS) and automatic system-wide immunization against new attacks. Read more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware defense.
ProSight Enhanced Security Protection (ESP): Unified Endpoint Security
Progent's ProSight Enhanced Security Protection services offer affordable in-depth protection for physical and virtual servers, desktops, mobile devices, and Exchange email. ProSight ESP utilizes contextual security and advanced machine learning for round-the-clock monitoring and reacting to security assaults from all attack vectors. ProSight ESP offers two-way firewall protection, penetration alerts, endpoint management, and web filtering through leading-edge tools incorporated within a single agent accessible from a single console. Progent's data protection and virtualization experts can assist you to plan and configure a ProSight ESP environment that addresses your company's unique needs and that allows you achieve and demonstrate compliance with government and industry data security regulations. Progent will assist you specify and implement security policies that ProSight ESP will manage, and Progent will monitor your IT environment and respond to alerts that require immediate attention. Progent's consultants can also help you to set up and verify a backup and restore system such as ProSight Data Protection Services so you can get back in business rapidly from a destructive security attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint protection and Microsoft Exchange email filtering.
ProSight Data Protection Services: Managed Backup and Recovery
ProSight Data Protection Services provide small and medium-sized businesses a low cost and fully managed service for reliable backup/disaster recovery. Available at a low monthly cost, ProSight DPS automates and monitors your backup processes and allows fast restoration of vital files, apps and VMs that have become unavailable or damaged as a result of component breakdowns, software glitches, natural disasters, human mistakes, or malware attacks like ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, apps, system images/, as well as Microsoft Hyper-V and VMware images/. Critical data can be backed up on the cloud, to a local storage device, or mirrored to both. Progent's BDR consultants can deliver world-class support to configure ProSight Data Protection Services to to comply with government and industry regulatory standards like HIPPA, FIRPA, PCI and Safe Harbor and, when necessary, can help you to recover your business-critical data. Find out more about ProSight DPS Managed Cloud Backup and Recovery.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that uses the technology of leading data security companies to provide web-based control and comprehensive protection for all your inbound and outbound email. The hybrid structure of Email Guard managed service combines cloud-based filtering with a local security gateway device to offer advanced defense against spam, viruses, Denial of Service Attacks, DHAs, and other email-borne malware. Email Guard's Cloud Protection Layer acts as a preliminary barricade and blocks the vast majority of threats from reaching your security perimeter. This reduces your exposure to inbound threats and saves network bandwidth and storage. Email Guard's onsite security gateway appliance provides a deeper layer of inspection for incoming email. For outgoing email, the on-premises gateway provides AV and anti-spam filtering, DLP, and email encryption. The on-premises gateway can also assist Exchange Server to track and safeguard internal email that originates and ends within your security perimeter. For more details, visit ProSight Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small business can have its critical servers and apps hosted in a secure fault tolerant data center on a high-performance virtual host configured and managed by Progent's network support experts. With Progent's ProSight Virtual Hosting service model, the customer owns the data, the operating system platforms, and the applications. Because the system is virtualized, it can be ported immediately to an alternate hosting solution without a lengthy and technically risky reinstallation procedure. With ProSight Virtual Hosting, you are not locked into a single hosting service. Learn more about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to capture, maintain, retrieve and protect data about your IT infrastructure, procedures, applications, and services. You can quickly locate passwords or serial numbers and be alerted about impending expirations of SSL certificates or warranties. By cleaning up and managing your network documentation, you can eliminate up to half of time spent trying to find vital information about your IT network. ProSight IT Asset Management includes a centralized repository for storing and sharing all documents related to managing your business network like recommended procedures and self-service instructions. ProSight IT Asset Management also offers advanced automation for collecting and relating IT information. Whether youíre planning enhancements, performing maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the data you need as soon as you need it. Learn more details about Progent's ProSight IT Asset Management service.
Expert Network Security Planning
Any company should develop a carefully thought out security program that incorporates both proactive processes and reaction planning. The pre-attack plan is a collection of mechanisms designed to minimize security weaknesses. The reactive plan assists your company's security engineers to evaluate the damage caused by an attack, fix the damage, record the event, and get business functions restored as rapidly as feasible.
Progent's certified IS security consultants are available to help you to run a full risk assessment and create a company-wide security plan to implement security processes and controls to reduce ongoing attacks and dangers.
CISM Qualified Network Security Engineering Expertise
The CISM organization defines the basic capabilities and worldwide standards of skill that information security professionals are expected to learn. CISM provides executive management the assurance that consultants who have earned their CISM certification have the experience and knowledge to deliver effective security administration and consulting services. Progent can provide the expertise of CISM Certified security consultants to help businesses with:
Read additional information concerning Progent's CISM Information Security Consulting Services.
- IS Security Strategies
- Risk Management
- IS Security Implementation Management
- IS Security Administration
- Response Planning
CISSP Qualified Security Consulting Services
The CISSP credential denotes mastery of an international standard for network security. ANSI (American National Standards Institute) has awarded certification accreditation in the area of information security under ISO 17024. Progent can provide access to of security consultants who have earned CISSP certification. Progent can give you access to a CISSP-certified expert to help your organization in a variety security areas such as:
Read more details about Progent's CISSP Network Security Consulting Professionals.
- Security Management Procedures
- Security Infrastructure and Paradigms
- Access Management Systems and Processes
- Applications Development Security
- Secure Operations
- Physical Security
- Cryptography Technology
- Telecom, LAN and Internet Security
- Disaster Recovery Planning
CISSP-ISSAP Accredited Secure Information System Architecture Consulting Support
Progent's CISSP-ISSAP Premier IT architecture engineers are experts who have been awarded ISSAP Certification through rigorous examination and significant experience with information security design. The ISSAP certification represents demonstrated skill in the most in-depth requirements of information security architecture within the wider field of information system security expertise needed for CISSP accreditation. Progent's ISSAP-certified security consultants can assist your business with all phases of secure network architecture such as.
Find out more information concerning Progent's ISSAP Qualified Secure System Architecture Consulting Services.
- Access Control Systems and Techniques
- Telecom and Network Infrastructure Protection
- Data Encryption Solutions
- Needs Analysis and Security Standards
- Business Continuity Planning (BCP) and DRP
- Site Security
CISA Qualified Network Security Auditing Engineering Expertise
The CISA accreditation is a recognized qualification that represents expertise in network security auditing. Accredited by the American National Standards Institute, the CISA accreditation requires that candidates pass an extensive examination given by the ISACA international professional group. Progent's CISA-qualified information security audit specialists can help your company with:
Read additional information concerning Progent's CISA Accredited Security Auditing Engineering Assistance.
- Information Systems Audit Process
- Information Technology Administration
- Network Assets and Infrastructure Planned Useful Life
- IT Service Delivery
- Safeguarding Information Assets
- Business Continuity Planning
The Certified in Risk and Information Systems Control (CRISC) certification program was established by ISACA to verify a consultant's skills to design, deploy, and maintain IS control mechanisms to reduce network risk. Progent can provide the services of a CRISC-certified engineer to assist your company to create and execute a workplace continuity or disaster recovery plan based on industry best practices promoted by CRISC and geared to align with your organization's risk tolerance, business goals, and IT budget. Progent's CRISC IT risk mitigation specialists offer a variety of risk assessment services such as:
Find out additional information concerning Progent's CRISC Risk Management Consultants.
- Gather data and review documentation to identify significant risk scenarios
- Identify legal, regulatory, and contractual requirements and organizational policies associated with your information system to determine their possible influence on your strategic objectives
- Point out potential vulnerabilities for your business workflows to assist in analyzing your corporate risk
- Create a risk awareness initiative and conduct training to ensure your stakeholders appreciate information system risk so they can assist with your risk control process
- Connect identified risk vectors to related operational processes to help determine risk responsibility
- Determine risk tolerance with your senior management and key stakeholders to make sure they are in agreement
GIAC Qualified IS Security Consulting Expertise
GIAC was founded in 1999 to validate the knowledge of information technology security experts. GIAC's mission is to ensure that an accredited professional has the knowledge needed to deliver support in key categories of network, information, and application security. GIAC certifications are recognized by companies and institutions around the world including and the United States National Security Agency (NSA). Progent's GIAC-certified network security audit engineers can help your company with:
Find out more details concerning Progent's GIAC Information Assurance Expertise.
- Assessing Networks
- Incident Response
- Intrusion Detection
- Web-based Services Security
- SIEM solutions
Get in Touch with a Progent Security Expert
To find out how to access a certified security consultant for online or onsite help in Oregon, call 1-800-993-9400 or go to Online Network Help.