Small business IT networks in the state of Michigan now have prompt and affordable remote help from Progent's accredited security engineers to fix the toughest security issues. Rates are reasonable, billing is by the minute, engagement is fast, and support is unbeatable. Progent also offers help for complex projects that demand the knowledge of seasoned security consultants with top industry credentials.

In case your Michigan business is outside of major metropolitan areas like Detroit, Grand Rapids, Warren, Sterling Heights, Flint, Lansing, or Ann Arbor, contact with nearby accredited network security experts may be limited when you have a crisis. This can result in lost productivity for your company, angry customers, unproductive workers, and distracted management. By calling Progent, you can get in touch with a certified security professional ready to provide help when you have to have it to keep your computer network on line and recover your data.

Progent can help you in your initiatives to defend your IT environment with support ranging from security audits to creating a company-wide security strategy. Progent offers economical service to assist companies of any size to configure and manage secure IT environments based on Microsoft Windows and Cisco products and that may include servers and desktops based on UNIX, Linux, Sun Solaris, or Mac OS X operating systems as well as BYOD users with Apple iOS handhelds or Android or Windows Phone handsets.

Progent can also show you how to outsource spam blocking and defense against e-mail-based security threats. Email Guard is Progent's email filtering and encryption platform that uses the services and infrastructure of leading information security vendors to provide web-based control and comprehensive security for your email traffic. The hybrid architecture of Email Guard combines cloud-based filtering with an on-premises gateway device to offer complete defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. The cloud filter acts as a first line of defense and keeps most unwanted email from making it to your network firewall. This decreases your exposure to inbound threats and conserves system bandwidth and storage. ProSight Email Guard's onsite security gateway appliance adds a deeper layer of analysis for incoming email. For outgoing email, the on-premises gateway offers AV and anti-spam filtering, DLP, and encryption. The on-premises security gateway can also help Exchange Server to monitor and protect internal email traffic that originates and ends within your corporate firewall.

Progent's certified professionals are accessible remotely or on premises to provide a variety of urgent or project-based computer security services which include:

If your company has an immediate requirement for computer security support, refer to Progent's Emergency Online Network Help.

Progent's security experts can deliver advanced services in vital facets of system protection including security evaluation, firewall and VPN expertise, and advanced security consulting.

Security Assessment
Progent's expert security consultants can assess the effectiveness of your existing computer security environment by performing comprehensive remote automated analysis based on sophisticated software tools and tested procedures. Progent's skill in this service saves you money and offers a detailed picture of gaps. The information your company is provided can form the foundation of a security plan that will allow your network to operate safely and respond quickly to future risks.

Automated Vulnerability Analysis
Progent provides expertise in the application of security testing packages including Microsoft's MBSA and GFI LANguard NSS for economically performing a set of automatic system testing scans to uncover possible security weaknesses. Progent has extensive experience with additional network auditing products such as NMAP Port Scanner, AMAP Application Scanner, eEye Vulnerability Scanner, plus utilities such as Metasploit, Netcat, Hydra, and Nikto. Progent can show you how to make sense of testing reports and respond effectively.

Progent can help you design protection into your company processes, configure scanning software, define and implement a protected network architecture, and suggest procedures to maximize the safety of your network. Progent's security engineers are ready to help you set up a firewall, implement safe remote connectivity to email and data, and install virtual private network. Learn additional information about Progent's automated security evaluation.

Security Inventory Scanning Bundles for Small Companies
Progent offers two ultra-affordable security inventory and evaluation bundles designed to allow small companies to receive an independent security assessment from a certified security specialist. With Progent's External Security Inventory Checkup, a security expert runs a comprehensive examination of your network from beyond your company firewall to determine possible weaknesses in the security posture you present to the outside world. With Progent's Internal Network Security Inventory Scan, a security engineer executes a system scan from a secure computer within your company firewall to assess the risk to internal threats. The two security inventory packages are configured and run from a secured external site. The project is directed by a consultant with top security credentials and who generates a report that details and interprets the information collected by the scan and proposes practical improvements where called for.

Network Intrusion Analysis Support Services
Stealth penetration checking is a key component of any comprehensive network security strategy. Progentís security experts can run extensive penetration tests without the awareness of your company's internal network support staff. Unannounced penetration testing uncovers whether current security monitoring systems such as intrusion incident warnings and event history analysis are properly configured and consistently checked. Learn more on Progent's network security penetration analysis consulting.

Firewall And Virtual Private Network (VPN) Solutions
Progent's expertise in security solutions encompasses in-depth field work with leading firewalls and VPN technology offered by a variety of vendors such as Cisco, Microsoft, and Symantec. Progent offers the support of consultants who have earned key networking certifications including Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Security Appliances Integration and Debugging
The new Cisco ASA 5500-X Family Next-Generation Firewalls with Firepower Services provide substantially more bang for the buck than Cisco's earlier PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 security appliances for all new installations. After Cisco's purchase of Sourcefire, the entire line of Cisco ASA 5500-X devices can be provisioned to support Firepower Services, based on Sourcefire's Snort technology, which is the world's most deployed intrusion protection system. Firepower services provide enhanced capabilities including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network experts can assist your company to manage your existing PIX or ASA 5500 firewalls and upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and on-premises help with ASA 5500-X firewalls with Firepower Services and can help your company to design, integrate, tune, manage and debug firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. See more information about Cisco ASA Firewalls with Firepower Services integration and debugging support.

Cisco Security and Virtual Private Network Support Services
Cisco's network security and offsite connection technology represent a full range of manageable security products to help protect your wired and wireless network infrastructure. Cisco's VPN line features switches, firewalls, intrusion detection systems and Virtual Private Network concentrators. Progent's expert staff of consultants includes field-proven engineers with Cisco's Certified Internetwork Expert and Cisco Certified Network Professional qualifications who are able to help your business to select Cisco VPN, Cisco RADIUS Security, and additional Cisco security solutions that fit best with your company objectives. Find out more details concerning Progent's Support Expertise for Cisco Security and VPN Appliances.

Support Services for Additional Firewall and VPN Products
Progent provides small and mid-size companies professional consulting for Intrusion Protection products and IPsec VPN technology from major firewall and VPN security companies including WatchGuard, Juniper, and Symantec. Progent can help you create a detailed security plan and select appropriate technologies from multiple vendors to achieve your security objectives while staying within your spending restraints.

Progent's Fixed-price Managed Services for Information Security
Progent's value-priced ProSight series of outsourced network management services is intended to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all facets of information assurance. Managed services offered by Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that incorporates cutting edge behavior analysis technology to defend endpoint devices as well as physical and virtual servers against new malware assaults such as ransomware and email phishing, which routinely evade legacy signature-matching anti-virus tools. ProSight ASM protects local and cloud-based resources and offers a single platform to manage the complete threat progression including blocking, identification, containment, remediation, and post-attack forensics. Key capabilities include single-click rollback with Windows VSS and automatic network-wide immunization against new threats. Learn more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware recovery.

ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Security
Progent's ProSight Enhanced Security Protection (ESP) services deliver affordable multi-layer protection for physical and virtual servers, desktops, smartphones, and Microsoft Exchange. ProSight ESP uses contextual security and advanced heuristics for round-the-clock monitoring and reacting to security threats from all vectors. ProSight ESP delivers firewall protection, penetration alarms, endpoint management, and web filtering through leading-edge technologies incorporated within one agent accessible from a unified console. Progent's security and virtualization consultants can help you to plan and implement a ProSight ESP environment that addresses your organization's specific requirements and that helps you demonstrate compliance with government and industry data security standards. Progent will assist you specify and implement policies that ProSight ESP will enforce, and Progent will monitor your IT environment and react to alarms that require urgent action. Progent's consultants can also help you to set up and test a backup and restore system like ProSight Data Protection Services so you can recover quickly from a potentially disastrous cyber attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection unified physical and virtual endpoint security and Exchange filtering.

ProSight Data Protection Services: Managed Backup and Recovery
ProSight Data Protection Services from Progent provide small and mid-sized organizations a low cost and fully managed solution for reliable backup/disaster recovery (BDR). For a fixed monthly rate, ProSight Data Protection Services automates and monitors your backup processes and allows fast recovery of critical data, apps and VMs that have become unavailable or corrupted as a result of component failures, software bugs, disasters, human error, or malware attacks such as ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, apps, system images, as well as Hyper-V and VMware virtual machine images. Important data can be protected on the cloud, to a local storage device, or to both. Progent's backup and recovery specialists can provide world-class support to configure ProSight DPS to to comply with government and industry regulatory standards like HIPPA, FINRA, and PCI and, whenever needed, can assist you to recover your critical data. Learn more about ProSight Data Protection Services Managed Backup.

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that incorporates the infrastructure of top information security vendors to provide web-based management and comprehensive protection for your email traffic. The powerful structure of Progent's Email Guard integrates cloud-based filtering with an on-premises gateway appliance to offer complete defense against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-borne threats. The cloud filter serves as a first line of defense and blocks the vast majority of unwanted email from making it to your security perimeter. This reduces your exposure to external attacks and conserves network bandwidth and storage. Email Guard's onsite gateway appliance provides a further layer of analysis for inbound email. For outbound email, the onsite gateway offers anti-virus and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The local gateway can also assist Exchange Server to track and safeguard internal email traffic that originates and ends inside your corporate firewall. For more information, visit Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size organization can have its key servers and applications hosted in a secure Tier III data center on a high-performance virtual machine host set up and maintained by Progent's IT support professionals. Under the ProSight Virtual Hosting service model, the customer owns the data, the OS software, and the apps. Since the environment is virtualized, it can be moved easily to an alternate hardware solution without requiring a time-consuming and technically risky configuration process. With ProSight Virtual Hosting, your business is not locked into one hosting provider. Learn more about ProSight Virtual Hosting services.

ProSight IT Asset Management: IT Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to capture, update, find and protect data about your network infrastructure, processes, applications, and services. You can instantly find passwords or IP addresses and be alerted about upcoming expirations of SSL certificates or domains. By cleaning up and organizing your IT infrastructure documentation, you can save as much as half of time spent looking for critical information about your network. ProSight IT Asset Management features a centralized location for holding and sharing all documents related to managing your network infrastructure such as standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also offers advanced automation for collecting and associating IT information. Whether youíre making improvements, performing maintenance, or responding to a crisis, ProSight IT Asset Management delivers the data you need the instant you need it. Learn more details about Progent's ProSight IT Asset Management service.

Expert Network Security Design
Any company ought to develop a carefully thought out security program that includes both proactive procedures and response plans. The proactive plan is a set of procedures intended to reduce security weaknesses. The reactive strategy helps your company's security engineers to evaluate the damage resulting from an attack, repair the system, record the event, and get the IT network operational as soon as feasible.

Progent's expert information security engineers are available to help your company to perform a comprehensive vulnerability evaluation and create a computer security strategy to establish security processes and mechanisms to minimize ongoing assaults and dangers.

CISM Accredited Security Support Assistance
The Certified Information Security Manager (CISM) committee defines the core competencies and global standards of performance that IT security professionals are required to learn. It provides business management the assurance that those who have earned their CISM credential possess the experience and capability to provide efficient security administration and support services. Progent offers the expertise of CISM certified security professionals to assist businesses with:

  • IS Security Governance
  • Risk Management
  • IS Security Program Management
  • Network Security Administration
  • Response Planning
Find out more details concerning Progent's CISM Qualified Network Security Engineering Expertise.

CISSP Qualified Security Engineering Assistance
CISSP certification denotes expertise with a worldwide standard for network security. The American National Standards Institute has awarded certification accreditation in the area of data security stipulated by ISO 17024. Progent offers the services of security experts who have qualified for CISSP accreditation. Progent can provide a CISSP-certified expert to help your organization in a broad range of security fields including:

  • Security Administration Practices
  • Security Infrastructure and Paradigms
  • Access Control Solutions and Methodology
  • Software Development Security
  • Secure Operations
  • Site Security
  • Encryption/Decryption Technology
  • Telecom, LAN and Internet Security
  • Business Continuity Planning
Learn more details about Progent's CISSP Security Engineering Professionals.

ISSAP Certified Secure Information System Architecture Consulting Expertise
Progent's ISSAP qualified information system architecture engineers are experts who have been awarded ISSAP status through rigorous examination and extensive work with information security design. The Information System Security Architecture Professional (ISSAP) certification represents demonstrated competence in the more in-depth demands of IS security architecture within the broader scope of information security knowledge required for CISSP accreditation. Progent's ISSAP-qualified security specialists can help your company with all aspects of secure network architecture including.

  • Access Management Systems and Methodologies
  • Telecom and Network Infrastructure Security
  • Encryption/Decryption Options
  • Requirements Analysis and Security Guidelines
  • Business Continuity Planning (BCP) and Disaster Recovery Planning
  • Hardware Security
Read more information about Progent's ISSAP Accredited Secure Information System Architecture Support Services.

CISA Accredited Information System Security Auditing Consulting Support
The Certified Information Systems Auditor credential is an important qualification that indicates mastery in information system security auditing. Accredited by the American National Standards Institute (ANSI), the CISA credential has candidates pass an extensive test given by the ISACA professional association. Progent's CISA-certified security audit experts are available to assist your business with:

  • IS Audit Process
  • Information Technology Governance
  • Network Assets and Architecture Lifecycle Planning
  • IT Service Delivery
  • Safeguarding Information Assets
  • Disaster Recovery Preparedness
Find out more information concerning Progent's CISA Accredited IS Security Auditing Consulting Expertise.

Certified in Risk and Information Systems Control (CRISC) Experts
The CRISC certification program was established by ISACA to validate a consultant's ability to plan, implement, and maintain IS controls to reduce risk. Progent can provide the services of a CRISC-certified engineer to help your company to develop and execute a business continuity strategy based on industry best practices promoted by CRISC and crafted to align with your organization's risk tolerance, business goals, and budgetary guidelines. Progent's CRISC network risk management consultants can provide a range of risk identification services such as:

  • Gather data and study documentation to help identify significant risk scenarios
  • Identify legal, regulatory, and business mandates and company standards related to your network to assess their potential influence on your business objectives
  • Point out potential vulnerabilities for your operational workflows to assist in analyzing your corporate risk
  • Develop a risk awareness initiative and provide seminars to ensure your stakeholders understand information system risk so they can assist with your risk management program
  • Connect identified risk vectors to related operational procedures to help assign risk ownership
  • Determine risk appetite with your senior leadership and major stakeholders to ensure they are in agreement
Learn more details about Progent's CRISC Consultants.

GIAC Certified Network Security Engineering Assistance
Global Information Assurance Certification was established in 1999 to validate the knowledge of information technology security engineers. GIAC's goal is to make sure that an accredited security consultant possesses the skills appropriate to deliver services in key categories of system, data, and application security. GIAC accreditations are acknowledged by businesses and institutions all over the world including and the U.S. National Security Agency. Progent's GIAC-certified security audit engineers are available to help your business with:

  • Auditing Perimeters
  • Incident Response
  • Intrusion Detection
  • Web Services Security
  • SIEM solutions
Read additional details concerning Progent's GIAC Information Assurance Support.

Contact a Certified Security Expert
To see how to get in touch with a security consultant for online or onsite support in Michigan, phone 1-800-993-9400 or visit Online Network Support.

© 2002- 2018 Progent Corporation. All rights reserved.