Company computer networks in Washington can have prompt and affordable remote access to Progent's certified network security professionals to assist with critical security issues. Rates are affordable, billing is per minute, sign-up is fast, and service is unbeatable. Progent also provides assistance for long-term engagements that demand the services of seasoned security consultants with top security credentials.
If your Washington network is situated some distance from major urban areas such as Seattle, Spokane, Tacoma, Bellevue, or Vancouver, support from local qualified network security engineers is often problematic during an urgent situation. This can result in a loss of income for your company, upset customers, idle workers, and distracted management. By contacting Progent, you have access to a qualified security professional ready to offer help whenever you require it to get your system running and salvage your data.
Progent can assist you in your initiatives to protect your information system with services that can range from network security assessments to developing a comprehensive security plan. Progent provides economical support to assist businesses of all sizes to set up and maintain secure IT environments powered by Windows and Cisco products and that may include servers and desktops based on UNIX, Linux, Solaris, or Apple Mac OS X platforms plus BYOD users with Apple iPhones and iPads or Android or Windows Phone handsets.
Progent can also show you how to outsource spam blocking and protection from e-mail-based assaults. Email Guard is Progent's email filtering and encryption platform that uses the services and infrastructure of top information security vendors to deliver centralized control and world-class protection for your inbound and outbound email. The hybrid structure of Email Guard integrates cloud-based filtering with a local security gateway appliance to provide complete protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. The cloud filter serves as a first line of defense and blocks the vast majority of unwanted email from reaching your network firewall. This reduces your vulnerability to external attacks and conserves system bandwidth and storage space. ProSight Email Guard's on-premises gateway device adds a deeper layer of inspection for incoming email. For outbound email, the local gateway provides anti-virus and anti-spam protection, protection against data leaks, and email encryption. The local security gateway can also enable Microsoft Exchange Server to track and safeguard internal email traffic that stays inside your security perimeter.
Progent's security consultants are accessible online or in person to offer a range of urgent or longer-term IT security services including:
If your business has an immediate need for computer security help, refer to Progent's Urgent Online Technical Help.
- Run automated security evaluations
- Recover promptly after serious security breaches
- Configure hardware and software firewalls
- Configure secure solutions for offsite and mobile access
- Install effective utilities for protection against viruses, spam and DHAs
- Help create a company-wide security strategy with round-the-clock network monitoring
- Provide outsourced Help Desk Call Center Support
- Help Develop a practical backup and recovery plan centered on Microsoft DPM backup capability
Progent's support professionals offer advanced support in key facets of network protection that include auditing, firewall and VPN solutions, and high-level security consulting.
Progent's expert security consultants can assess the effectiveness of your current computer protection environment by performing exhaustive remote automated analysis based on sophisticated utilities and tested procedures. Progent's skill in this testing saves your company time and money and assures an accurate picture of security holes. The information your IT organization is provided can form the foundation of a network protection strategy that can allow your information system to operate dependably and respond quickly to future risks.
Automated Security Assessment
Progent provides expertise in the application of security testing software such as Microsoft Baseline Security Analyzer (MBSA) and GFI LANguard Network Security Scanner for affordably performing a set of automatic network auditing scans to identify possible security weaknesses. Progent has broad knowledge of additional security analysis tools such as NMAP Port Scanner, AMAP, eEye Vulnerability Scanner, plus tools such as SolarWinds, Netcat, Hydra, and Nikto. Progent can help you to understand testing reports and react appropriately.
Progent can help you design protection into your business operations, configure scanning software, define and implement a secure system architecture, and recommend procedures to optimize the safety of your IT system. Progent's security engineers are ready to show you how to configure a firewall, implement safe remote connectivity to email and data, and integrate virtual private network. Learn more about Progent's automated security audits.
Security Inventory Service Packages for Small Companies
Progent offers two low-cost security inventory and evaluation packages intended to enable small businesses to get an independent network security evaluation from a qualified security expert. With Progent's External Network Security Inventory Scan, a security engineer administers a comprehensive test of your IT infrastructure from outside your company firewall to determine possible risks in the security posture you expose to the outside world. With Progent's Internal Security Inventory Scan, a security engineer executes a system scan from a secure computer inside your firewall to evaluate the risk to inside attacks. Both security inventory services are configured and executed from a secured remote site. The project is directed by an engineer who has earned high-level security credentials and who produces a document that summarizes and interprets the information collected by the scan and proposes practical remediation if appropriate.
Network Penetration Analysis Support Services
Stealth intrusion testing is a key part of any comprehensive IT system security strategy. Progentís security experts can run extensive intrusion tests without the awareness of your company's internal IT resources. Stealth penetration testing shows whether current security monitoring tools such as intrusion detection warnings and event history analysis are correctly configured and consistently monitored. Find out additional information concerning Progent's network security penetration analysis consulting.
Firewalls and VPN Support
Progent's background in network security technology includes in-depth field work with leading firewalls and VPN technology from multiple vendors such as Cisco, Microsoft, and Juniper. Progent offers the services of consultants with key industry accreditations including Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer (MCSE).
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Integration and Troubleshooting
The new ASA 5500-X Series Next-Generation Firewalls with Firepower Services offer significantly more performance than Cisco's previous firewalls and have replaced the ASA 5500 and PIX 500 firewalls for all new installations. Since Cisco's purchase of Sourcefire, the whole line of Cisco ASA 5500-X firewalls can be configured to support Firepower Services, based on Sourcefire's Snort technology, which is the world's most deployed intrusion protection system (IPS). Firepower services bring powerful new capabilities including advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-certified CCIE network consultants can assist you to manage your legacy PIX or Cisco ASA 5500 firewalls and upgrade to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist you to design, deploy, tune, manage and debug firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. Learn additional information about ASA Firewalls with Firepower Services configuration and troubleshooting support.
Cisco Network Security and Virtual Private Network Engineering Expertise
Cisco's network security and offsite connection technology provide a complete range of easy-to-administer security solutions to help protect your local and remote network infrastructure. Cisco's VPN product family includes routers, firewalls, intrusion detection systems and VPN appliances. Progent's professional staff of consultants includes field-proven specialists with Cisco CCIE and Cisco Certified Network Professional qualifications who are able to help your business to select Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security solutions that fit best with your company objectives. Learn additional details about Progent's Consulting Services for Cisco Security Technology and Virtual Private Network Products.
Support Services for Additional Firewall and VPN Solutions
Progent provides small and mid-size businesses professional consulting for Intrusion Protection Systems and IPsec VPN solutions from leading firewall and Virtual Private Network security companies such as WatchGuard, Juniper Networks, and Symantec. Progent can help you create a comprehensive security strategy and choose appropriate products from a variety of suppliers to achieve your security objectives while staying within your spending restraints.
Progent's Low-Cost Managed Services for Information Security
Progent's affordable ProSight portfolio of managed services is intended to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all facets of information assurance. Managed services offered by Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring is an endpoint protection (EPP) solution that utilizes next generation behavior-based analysis tools to guard endpoint devices and physical and virtual servers against new malware assaults like ransomware and email phishing, which easily escape legacy signature-based anti-virus tools. ProSight Active Security Monitoring protects on-premises and cloud resources and offers a unified platform to manage the entire threat progression including filtering, infiltration detection, containment, cleanup, and post-attack forensics. Key capabilities include single-click rollback with Windows VSS and real-time network-wide immunization against new threats. Learn more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware defense.
ProSight Enhanced Security Protection (ESP): Unified Endpoint Security
Progent's ProSight Enhanced Security Protection (ESP) managed services offer affordable in-depth protection for physical servers and VMs, desktops, mobile devices, and Exchange Server. ProSight ESP utilizes adaptive security and modern behavior analysis for continuously monitoring and responding to security assaults from all attack vectors. ProSight ESP offers two-way firewall protection, intrusion alarms, endpoint control, and web filtering through cutting-edge tools packaged within one agent managed from a unified control. Progent's data protection and virtualization consultants can help your business to plan and configure a ProSight ESP environment that addresses your organization's specific needs and that helps you demonstrate compliance with government and industry information protection standards. Progent will assist you specify and configure security policies that ProSight ESP will enforce, and Progent will monitor your network and respond to alarms that require immediate action. Progent can also assist you to set up and test a backup and disaster recovery solution such as ProSight Data Protection Services so you can get back in business rapidly from a potentially disastrous cyber attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint protection and Microsoft Exchange filtering.
ProSight Data Protection Services: Managed Backup and Recovery
ProSight Data Protection Services from Progent provide small and medium-sized businesses a low cost and fully managed solution for reliable backup/disaster recovery. Available at a fixed monthly cost, ProSight Data Protection Services automates and monitors your backup activities and allows rapid recovery of vital data, apps and VMs that have become lost or damaged due to component breakdowns, software glitches, natural disasters, human error, or malware attacks like ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, applications, system images/, as well as Microsoft Hyper-V and VMware images/. Critical data can be backed up on the cloud, to a local storage device, or to both. Progent's BDR specialists can deliver world-class support to configure ProSight DPS to be compliant with regulatory standards such as HIPPA, FINRA, and PCI and, when needed, can assist you to recover your critical data. Read more about ProSight DPS Managed Backup and Recovery.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering service that uses the infrastructure of top information security companies to provide centralized management and comprehensive protection for your email traffic. The hybrid architecture of Email Guard managed service integrates cloud-based filtering with a local security gateway device to offer advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. Email Guard's cloud filter serves as a preliminary barricade and blocks the vast majority of threats from making it to your network firewall. This decreases your exposure to inbound attacks and conserves network bandwidth and storage space. Email Guard's on-premises gateway device adds a deeper level of analysis for inbound email. For outgoing email, the local security gateway offers AV and anti-spam protection, DLP, and email encryption. The onsite security gateway can also help Exchange Server to monitor and protect internal email traffic that stays inside your security perimeter. For more details, visit Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small or mid-size organization can have its critical servers and applications hosted in a protected Tier III data center on a fast virtual machine host set up and maintained by Progent's IT support professionals. With Progent's ProSight Virtual Hosting service model, the customer owns the data, the operating system software, and the apps. Because the system is virtualized, it can be moved easily to a different hardware environment without a lengthy and technically risky reinstallation procedure. With ProSight Virtual Hosting, you are not tied one hosting provider. Find out more about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to create, maintain, find and protect information about your IT infrastructure, processes, applications, and services. You can instantly locate passwords or serial numbers and be warned automatically about impending expirations of SSL certificates or warranties. By cleaning up and organizing your network documentation, you can eliminate up to half of time wasted searching for vital information about your IT network. ProSight IT Asset Management includes a common repository for holding and collaborating on all documents related to managing your network infrastructure such as standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also supports a high level of automation for gathering and associating IT data. Whether youíre making enhancements, performing regular maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the data you require when you need it. Learn more about Progent's ProSight IT Asset Management service.
Expert Security Consulting
Any business should have a carefully considered security program that includes both pre-attack processes and reaction plans. The proactive plan is a collection of procedures intended to minimize vulnerabilities. The reactive strategy assists your IT security personnel to assess the impact caused by an attack, repair the system, document the experience, and get the IT network restored as soon as possible.
Progent's certified IS security consultants can to assist your company to run a full risk assessment and create a network security strategy to establish security policies and controls to mitigate ongoing attacks and threats.
CISM Accredited Network Security Consulting Assistance
The Certified Information Security Manager (CISM) organization describes the basic competencies and worldwide standards of skill that information security managers are required to master. It gives executive management the confidence that consultants who have earned their CISM credential possess the background and knowledge to provide effective security management and consulting services. Progent offers the support of CISM qualified security professionals to help companies with:
Read additional details about Progent's CISM Accredited IS Security Engineering Services.
- IS Security Processes
- Vulnerability Management
- IS Security Program Management
- IS Security Administration
- Response Management
CISSP Accredited Security Consulting Expertise
The CISSP credential denotes mastery of an international standard for data security. The American National Standards Institute has granted certification recognition in the field of information security stipulated by ISO 17024. Progent offers access to of security professionals who have earned CISSP accreditation. Progent can give you access to a CISSP-certified expert to help your business in a broad range of security fields including:
Read more details concerning Progent's CISSP Qualified Information Security Support Services.
- Security Administration Procedures
- Security Architecture and Paradigms
- Access Management Solutions and Processes
- Software Development Security
- Operations Security
- Site Security
- Encryption/Decryption Mechanisms
- Telecom, Network and Internet Security
- Business Continuity Planning
CISSP-ISSAP Accredited Secure IT Architecture Engineering Services
Progent's CISSP-ISSAP certified network architecture engineers are experts who have earned ISSAP Certification as a result of rigorous examination and extensive experience with information security architecture. The ISSAP certification indicates demonstrated competence in the more in-depth requirements of IS security architecture bounded by the wider scope of information security expertise required for CISSP certification. Progent's ISSAP-certified security consultants can assist your business with all phases of architecture security including.
Read more information about Progent's ISSAP Certified Secure IT Architecture Support Services.
- Access Management Systems and Methodologies
- Telecom and Network Infrastructure Protection
- Encryption/Decryption Solutions
- Needs Evaluation and Security Criteria
- Business Continuity Planning and Disaster Recovery Planning
- Site Security
CISA Qualified Network Security Auditing Engineering Support
The CISA accreditation is an important achievement that represents mastery in information system security audit and control. Accredited by the American National Standards Institute, the CISA credential has candidates undergo a comprehensive examination administered by the ISACA professional association. Progent's CISA information security audit experts are available to help your IT organization in the areas of:
Get more information concerning Progent's CISA Qualified IS Security Auditing Consulting Services.
- Information Systems Audit Services
- Information Technology Enforcement
- Network Assets and Architecture Lifecycle
- Information Technology Support
- Protecting Data Assets
- Business Continuity Preparedness
The CRISC program was established by ISACA in 2010 to verify a consultant's skills to plan, deploy, and support IS controls to mitigate risk. Progent can provide the expertise of a CRISC-certified consultant to assist your company to develop and carry out a business continuity or disaster recovery plan that follows leading practices promoted by CRISC and geared to match your organization's risk tolerance, business goals, and IT budget. Progent's CRISC-certified network risk management experts offer a variety of risk identification services such as:
Find out more information about Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.
- Gather information and review documentation to identify major risk scenarios
- Identify statutory, industry, and business requirements and company policies associated with your information system to determine their potential influence on your business goals
- Identify possible vulnerabilities for your operational workflows to assist in analyzing your corporate risk
- Create a risk awareness program and conduct training to make sure your stakeholders understand information system risk so they can contribute to your risk management process
- Connect identified risk vectors to related business processes to help determine risk ownership
- Determine risk appetite with executive leadership and major stakeholders to ensure they are in agreement
GIAC Qualified Information System Security Engineering Expertise
Read more information about Progent's GIAC Information Assurance Services.
GIAC (Global Information Assurance Certification) was founded in 1999 to certify the skill of computer security professionals. GIAC's mission is to verify that an accredited professional has the skills needed to provide support in critical categories of system, information, and application program security. GIAC accreditations are acknowledged by companies and institutions around the world including and the U.S. NSA. Progent's GIAC-qualified information security audit specialists are available to assist your business with:
Get in Touch with a Certified Security Expert
To see how to contact a certified Progent security engineer for online or on-premises assistance in Washington, call 1-800-993-9400 or go to Online Computer Support.
© 2002-2019 Progent Corporation. All rights reserved.