Company computer networks in Washington can now get quick and economical remote help from Progent's certified network security support specialists to assist with complex security problems. Rates are affordable, charges are by the minute, engagement is quick, and service is unbeatable. Progent also offers assistance for complex projects that demand the knowledge of seasoned security consultants with top industry certifications.
In case your Washington network is far from larger urban areas like Seattle, Spokane, Tacoma, Bellevue, or Vancouver, the availability of local qualified security professionals could be limited when you have an urgent situation. This could mean lost income for your business, angry clients, idle workers, and defocused management. By utilizing Progent, you have access to a qualified security professional ready to deliver help when you require it to get your information system on line and salvage your data.
Progent can assist you in your initiatives to protect your IT environment with support services ranging from network security audits to creating a company-wide security plan. Progent provides economical service to assist companies of any size to design and manage safe networks powered by Windows and Cisco technology and that may include computers running UNIX, Linux, Solaris, or Apple Mac OS X operating systems plus mobile clients with Apple handhelds or Google Android or Windows Phone devices.
Progent can also help you outsource spam filtering and protection from email-borne security threats. Email Guard is Progent's email filtering and encryption platform that uses the technology of leading information security vendors to provide centralized management and world-class protection for your inbound and outbound email. The hybrid architecture of Email Guard managed service combines cloud-based filtering with a local security gateway appliance to offer advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. The cloud filter acts as a preliminary barricade and blocks most unwanted email from reaching your security perimeter. This reduces your exposure to external attacks and saves network bandwidth and storage space. ProSight Email Guard's on-premises security gateway device adds a further level of analysis for inbound email. For outbound email, the local gateway offers anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and encryption. The onsite security gateway can also enable Microsoft Exchange Server to track and safeguard internal email traffic that stays within your security perimeter.
Progent's certified consultants are available remotely or in person to offer a variety of emergency or project-based IT security services including:
If your company has an urgent need for computer security support, refer to Progent's Urgent Remote Technical Help.
- Run comprehensive security audits
- Recuperate promptly after attacks
- Install firewalls from multiple vendors
- Configure secure techniques for offsite and mobile access
- Install effective utilities for defense against viruses, spam and directory harvest attacks
- Help create a comprehensive security strategy with proactive monitoring
- Provide comprehensive Call Center Services
- Develop an effective backup and recovery strategy centered on Data Protection Manager backup capability
Progent's engineers can deliver advanced services in key fields of computer security that include analysis, firewalls and VPN, and advanced security consulting.
Progent's certified security consultants can evaluate the vulnerability of your current network security environment by performing comprehensive remote automated testing via sophisticated software tools and proven procedures. Progent's experience in administering this testing saves you money and offers an accurate picture of security holes. The knowledge your business is provided can form the basis of a security plan that can allow your information system to run dependably and adapt rapidly to future risks.
Automated Network Vulnerability Assessment
Progent offers consulting in the use of security analysis products including Microsoft's MBSA and GFI LANguard Network Security Scanner for economically performing a set of programmed system auditing checks to uncover potential security weaknesses. Progent has extensive experience with additional network auditing tools including NMAP, AMAP application mapper, eEye Vulnerability Scanner, as well as utilities like Metasploit Framework, Netcat, and Nikto. Progent can help you to understand testing reports and respond effectively.
Progent can help you build protection into your business operations, configure scanning software, define and implement a secure system architecture, and suggest procedures to optimize the security of your IT system. Progent's security engineers are available to assist you to configure a firewall, implement safe remote access to email and data, and install virtual private network. Learn more concerning Progent's automated security audits.
Security Inventory Service Packages for Small Companies
Progent offers two ultra-affordable security inventory scanning bundles designed to enable small companies to receive an independent security evaluation from a certified security expert. With Progent's External Network Security Inventory Checkup, an engineer runs a comprehensive test of your IT infrastructure from beyond your company firewall to determine potential risks in the security profile you present to the outside world. With Progent's Internal Network Security Inventory Checkup, a security engineer runs a system scan from an authorized computer inside your company firewall to assess your exposure to inside assaults. Both security inventory packages are configured and executed from a secured external location. The project is overseen by a consultant with top security accreditations and who generates a report that details and analyzes the information collected by the scan and suggests cost-effective remediation where appropriate.
Stealth Penetration Testing Support Services
Stealth intrusion testing is an important part of any comprehensive network security strategy. Progent’s security professionals can run thorough penetration tests without the knowledge of your organization's in-house network support staff. Stealth penetration checking uncovers whether current security monitoring tools such as intrusion incident warnings and event history monitoring are properly set up and consistently monitored. Learn additional information about Progent's stealth penetration testing consulting.
Firewall And Virtual Private Network (VPN) Expertise
Progent's expertise in network security technology encompasses in-depth familiarity with major firewalls and VPN technology offered by multiple companies such as Cisco, Microsoft, and Juniper. Progent offers the support of engineers with key networking certifications such as CCIE and Microsoft MCSE.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Integration and Troubleshooting
The new ASA 5500-X Family Next-Generation Firewalls with Firepower Services deliver substantially more bang for the buck than Cisco's earlier firewalls and have superseded the ASA 5500 and PIX firewalls for new installations. Following Cisco's purchase of Sourcefire, the entire line of Cisco ASA 5500-X firewalls can be configured to enable Firepower Services, based on Sourcefire's Snort technology, which is the world's most popular intrusion protection system. Firepower services bring enhanced capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-qualified CCIE network consultants can help you to maintain your existing PIX or ASA 5500 firewalls or migrate efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and onsite support for ASA 5500-X firewalls with Firepower Services and can assist your organization to plan, integrate, tune, administer and debug firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Learn additional information about Cisco ASA 5500-X Firewalls with Firepower Services integration and debugging services.
Cisco Security and VPN Consulting Expertise
Cisco's security and remote connection technology provide a full range of easy-to-administer security solutions to help protect your local and remote network infrastructure. Cisco's VPN line includes routers, firewalls, intrusion detection devices and Virtual Private Network concentrators. Progent's expert consulting staff includes experienced specialists with Cisco's CCIE and CCNP certifications who can help your business to select Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security solutions that fit best with your business objectives. Find out additional information concerning Progent's Support Expertise for Cisco Security Solutions and VPN Products.
Support Expertise for Additional Firewall and Virtual Private Network Solutions
Progent provides small and mid-size businesses expert consulting for Intrusion Protection Systems and IPsec VPN solutions from leading firewall and Virtual Private Network security companies such as Check Point Software, Juniper, and SonicWALL. Progent can help you design a comprehensive security strategy and select appropriate products from multiple suppliers to achieve your security objectives while staying within your spending restraints.
Progent's Low-Cost Managed Services for Information Assurance
Progent's value-priced ProSight family of network monitoring and management services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all aspects of information assurance and compliance. Managed services offered by Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection service that utilizes next generation behavior machine learning technology to defend endpoints and physical and virtual servers against new malware assaults such as ransomware and email phishing, which routinely escape legacy signature-based anti-virus products. ProSight Active Security Monitoring safeguards local and cloud resources and offers a unified platform to address the complete threat lifecycle including protection, infiltration detection, mitigation, cleanup, and forensics. Top features include one-click rollback with Windows VSS and real-time network-wide immunization against new attacks. Find out more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Protection
Progent's ProSight Enhanced Security Protection (ESP) services offer affordable multi-layer protection for physical and virtual servers, desktops, mobile devices, and Microsoft Exchange. ProSight ESP uses adaptive security and advanced machine learning for continuously monitoring and responding to security threats from all attack vectors. ProSight ESP provides two-way firewall protection, penetration alarms, device management, and web filtering through leading-edge tools incorporated within one agent managed from a unified control. Progent's data protection and virtualization consultants can assist your business to plan and implement a ProSight ESP environment that meets your organization's specific needs and that allows you prove compliance with government and industry information security regulations. Progent will help you specify and configure security policies that ProSight ESP will manage, and Progent will monitor your IT environment and respond to alerts that call for urgent attention. Progent can also help you to install and test a backup and restore solution such as ProSight Data Protection Services (DPS) so you can get back in business rapidly from a potentially disastrous security attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint protection and Microsoft Exchange filtering.
ProSight DPS: Managed Cloud Backup
ProSight Data Protection Services from Progent offer small and medium-sized businesses a low cost end-to-end solution for reliable backup/disaster recovery. For a low monthly price, ProSight DPS automates and monitors your backup activities and allows fast recovery of vital data, applications and VMs that have become lost or damaged due to hardware breakdowns, software glitches, disasters, human error, or malicious attacks like ransomware. ProSight DPS can help you back up, recover and restore files, folders, apps, system images/, plus Hyper-V and VMware images/. Critical data can be protected on the cloud, to an on-promises device, or to both. Progent's BDR consultants can provide advanced expertise to set up ProSight DPS to be compliant with government and industry regulatory requirements such as HIPPA, FIRPA, and PCI and, when needed, can help you to restore your business-critical information. Read more about ProSight DPS Managed Cloud Backup.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering and email encryption service that uses the technology of top information security companies to provide centralized management and world-class security for all your email traffic. The hybrid architecture of Email Guard managed service combines a Cloud Protection Layer with an on-premises gateway device to provide complete protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. Email Guard's Cloud Protection Layer acts as a preliminary barricade and blocks most unwanted email from making it to your network firewall. This decreases your vulnerability to inbound attacks and conserves network bandwidth and storage space. Email Guard's onsite gateway appliance adds a further level of inspection for incoming email. For outgoing email, the onsite gateway offers AV and anti-spam protection, DLP, and email encryption. The onsite security gateway can also assist Microsoft Exchange Server to monitor and safeguard internal email traffic that stays within your corporate firewall. For more details, see Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small business can have its critical servers and apps hosted in a secure Tier III data center on a high-performance virtual host set up and managed by Progent's network support professionals. Under Progent's ProSight Virtual Hosting model, the client retains ownership of the data, the operating system software, and the apps. Because the environment is virtualized, it can be moved immediately to a different hosting solution without a time-consuming and technically risky reinstallation procedure. With ProSight Virtual Hosting, you are not tied a single hosting service. Find out more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: IT Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to create, update, retrieve and safeguard information about your network infrastructure, procedures, business apps, and services. You can instantly locate passwords or IP addresses and be alerted about impending expirations of SSL certificates or warranties. By updating and organizing your IT infrastructure documentation, you can save as much as half of time wasted searching for critical information about your IT network. ProSight IT Asset Management includes a common location for holding and sharing all documents related to managing your network infrastructure like standard operating procedures and How-To's. ProSight IT Asset Management also supports a high level of automation for collecting and associating IT information. Whether you’re planning enhancements, performing maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the data you need as soon as you need it. Find out more details about Progent's ProSight IT Asset Management service.
Expert Network Security Planning
Any company ought to have a thoroughly thought out security program that incorporates both preventive processes and reaction plans. The pre-attack strategy is a collection of mechanisms designed to reduce security weaknesses. The reactive plan helps your company's network security engineers to assess the damage resulting from a security penetration, fix the damage, document the event, and get business functions running as rapidly as possible.
Progent's certified IS security consultants are available to assist your business to run a comprehensive risk evaluation and create a network security plan to implement security processes and controls to mitigate ongoing attacks and threats.
CISM Certified System Security Engineering Assistance
The CISM committee defines the core competencies and global standards of skill that information security managers are required to learn. It gives executive management the confidence that consultants who have earned their CISM credential possess the experience and capability to deliver effective security administration and consulting services. Progent offers the support of CISM certified security professionals to assist companies with:
Find out more information concerning Progent's CISM Security Support Services.
- IS Security Processes
- Risk Analysis
- Network Security Program Management
- IS Security Administration
- Recovery Planning
CISSP Accredited Security Engineering Services
The CISSP credential denotes mastery of an international standard for data security. ANSI has awarded the CISSP credential accreditation in the area of data security under ISO 17024. Progent can provide access to of security professionals who have qualified for CISSP accreditation. Progent can provide a CISSP-certified professional to help your business in a variety security areas including:
Learn more information concerning Progent's CISSP Security Consulting Expertise.
- Security Management Practices
- Security Infrastructure and Models
- Access Management Solutions and Processes
- Software Development Security
- Operations Security
- Site Security
- Cryptography Mechanisms
- Telecommunications, Network and WAN Security
- Business Continuity Preparedness
CISSP-ISSAP Certified Secure Information System Architecture Consulting Services
Progent's CISSP-ISSAP certified information system architecture engineers are experts who have earned ISSAP status through thorough testing and extensive work with network security architecture. The ISSAP certification indicates proven competence in the more in-depth requirements of IS security architecture within the wider scope of information security expertise needed for CISSP accreditation. Progent's ISSAP-certified security specialists can assist your company with all phases of secure network architecture including.
Learn additional details concerning Progent's ISSAP Certified Secure IT Architecture Engineering Services.
- Access Control Mechanisms and Methodologies
- Phone System and System Infrastructure Protection
- Encryption/Decryption Solutions
- Needs Analysis and Security Standards
- BCP and DRP
- Site Security
CISA Certified IS Security Auditing Engineering Assistance
The CISA accreditation is a globally recognized qualification that signifies expertise in IS security auditing. Certified by the American National Standards Institute (ANSI), the CISA credential requires that consultants undergo an extensive test given by the ISACA international professional group. Progent's CISA-certified IS security audit engineers are available to help your business with:
Find out more information about Progent's CISA Qualified Information System Security Auditing Consulting Support.
- IS Audit Services
- Information Technology Enforcement
- Systems and Infrastructure Planned Useful Life
- IT Support
- Protecting Information Assets
- Business Continuity Preparedness
Certified in Risk and Information Systems Control (CRISC) Experts
The CRISC program was initiated by ISACA to verify a consultant's skills to plan, deploy, and maintain IS controls to reduce network risk. Progent offers the expertise of a CRISC-certified consultant to help your company to develop and execute a workplace continuity plan based on leading practices identified by CRISC and crafted to align with your company's risk appetite, business objectives, and budgetary guidelines. Progent's CRISC-qualified IT risk mitigation engineers can provide a range of risk evaluation services such as:
Get additional information about Progent's Certified in Risk and Information Systems Control (CRISC) Experts.
- Gather information and study documentation to evaluate major risk scenarios
- Identify statutory, industry, and business mandates and company policies related to your network to assess their possible influence on your strategic goals
- Identify potential vulnerabilities for your business processes to help in analyzing your corporate risk
- Create a risk awareness program and conduct training to ensure your organization appreciate IT risk so they can assist with your risk management program
- Connect identified risk vectors to related operational processes to help assign risk responsibility
- Validate risk tolerance with executive management and key stakeholders to ensure they align
GIAC Accredited Network Security Engineering Services
Global Information Assurance Certification was established in 1999 to validate the skill of computer security engineers. GIAC's goal is to verify that a certified professional possesses the skills necessary to deliver services in key categories of system, information, and application software security. GIAC certifications are recognized by businesses and institutions around the world including and the United States National Security Agency (NSA). Progent's GIAC-qualified security audit experts can help your IT organization in the areas of:
Find out additional details about Progent's GIAC Information Assurance Expertise.
- Assessing Security Systems
- Incident Handling
- Intrusion Detection
- Web Services Security
- SIEM solutions
Contact a Certified Security Expert
To learn how to get in touch with a Progent security engineer for remote or onsite assistance in Washington, phone 1-800-993-9400 or go to Online Network Support.