Business computer networks in Michigan now have quick and economical remote access to Progent's accredited network security professionals to help with urgent security problems. Rates are affordable, charges are by the minute, sign-up is immediate, and service is world class. Progent also offers assistance for long-term engagements that demand the services of senior security engineers with high-level security credentials.

In case your Michigan small business is away from more populated metropolitan neighborhoods like Detroit, Grand Rapids, Warren, Sterling Heights, Flint, Lansing, or Ann Arbor, contact with local accredited network security experts could be problematic when there's a crisis. This can cause lost revenue for your business, upset customers, idle employees, and distracted executives. By calling Progent, you can get in touch with a qualified security professional who can offer expertise whenever you require it to get your computer network operating and recover your data.

Progent can help you in all your initiatives to guard your IT environment with support that ranges from network security audits to creating a comprehensive security strategy. Progent offers affordable service to assist small and midsize companies to design and manage protected IT environments based on Microsoft Windows and Cisco technology and that can include servers and desktops running UNIX or Linux platforms plus BYOD clients with Apple iOS iPhones and iPads or Google Android or Windows Phone handsets.

Progent can also help you outsource spam filtering and defense against email-borne attacks. Email Guard is Progent's email filtering and encryption solution that uses the services and infrastructure of leading data security vendors to deliver web-based management and world-class security for all your email traffic. The hybrid structure of Progent's Email Guard integrates a Cloud Protection Layer with an on-premises gateway appliance to offer advanced protection against spam, viruses, Denial of Service Attacks, DHAs, and other email-based malware. Email Guard's cloud filter serves as a first line of defense and keeps the vast majority of unwanted email from reaching your network firewall. This decreases your vulnerability to inbound threats and conserves network bandwidth and storage space. Email Guard's onsite gateway appliance adds a further layer of inspection for inbound email. For outbound email, the local security gateway offers anti-virus and anti-spam protection, DLP, and email encryption. The local security gateway can also help Exchange Server to track and safeguard internal email that originates and ends within your corporate firewall.

Progent's security experts are accessible remotely or in person to provide a range of emergency or longer-term computer security services including:

If your company has an urgent requirement for IT security help, refer to Progent's Emergency Remote Network Help.

Progent's engineers offer advanced support in key facets of system protection including analysis, firewalls and VPN, and advanced security consulting.

Security Evaluation
Progent's certified security consultants can assess the effectiveness of your existing network protection environment by performing exhaustive remote automated analysis based on advanced software tools and proven techniques. Progent's skill in administering this service saves your company money and offers an objective portrayal of system vulnerability. The knowledge your company gains can be used as the foundation of a network protection plan that will allow your network to operate safely and respond rapidly to future threats.

Automated Network Security Audits
Progent offers consulting in the use of security testing utilities such as MBSA and GFI LANguard for economically performing a variety of programmed network auditing checks to identify possible security vulnerabilities. Progent has broad experience with other network analysis utilities such as NMAP, AMAP application mapper, eEye Vulnerability Scanner, as well as tools like Metasploit, Netcat, Socat, and Nikto. Progent can show you how to make sense of testing reports and react effectively.

Progent can show you how to build security into your company operations, install auditing applications, plan and implement a secure network architecture, and suggest procedures to maximize the safety of your network. Progent's security professionals are ready to show you how to set up a firewall, design safe remote connectivity to email and business applications, and integrate virtual private network. Learn more concerning Progent's network security audits.

Security Inventory Service Bundles for Small Businesses
Progent has put together two ultra-affordable security inventory service packages designed to allow small companies to get an impartial security assessment from a certified security expert. With Progent's External Security Inventory Scan, a security engineer administers an extensive test of your IT infrastructure from beyond your company firewall to uncover possible risks in the security profile you present to the outside world. With Progent's Internal Security Inventory Checkup, a certified security professional runs a network scan from a secure machine within your company firewall to evaluate vulnerabilities to inside threats. The two security inventory services are set up and run from a secured external site. The project is directed by a consultant with top security accreditations and who produces a document that details and interprets the information captured by the security scan and proposes practical remediation if called for.

Network Penetration Analysis Support Services
Stealth intrusion checking is a key component of any serious IT system security plan. Progentís security experts can perform extensive intrusion checks without the awareness of your organization's in-house network support staff. Stealth penetration checking uncovers whether existing security monitoring systems such as intrusion incident alerts and event log analysis are correctly set up and actively monitored. Learn more on Progent's network security penetration analysis consulting.

Firewall/VPN Expertise
Progent's background in security solutions encompasses in-depth familiarity with leading firewalls and Virtual Private Network products from a variety of vendors such as Cisco, Microsoft, and CheckPoint. Progent can provide the support of consultants with key industry accreditations including CCIE and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Integration and Debugging
The latest generation of Cisco ASA 5500-X Series Next-Generation Firewalls with Firepower Services deliver significantly more performance than Cisco's previous firewalls and have replaced the ASA 5500 and PIX security appliances for all new installations. After Cisco's purchase of Sourcefire, the entire family of ASA 5500-X devices can be configured to support Firepower Services, based on Sourcefire's Snort product, which is the market's most popular intrusion protection system (IPS). Firepower services provide enhanced features including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-qualified CCIE network consultants can assist you to maintain your existing PIX or ASA 5500 firewalls or migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite support for ASA 5500-X firewalls with Firepower Services and can help your business to design, configure, tune, administer and debug firewall environments based on Cisco ASA 5500-X firewalls with Firepower Services. Find out more details about Cisco ASA Firewalls with Firepower Services configuration and troubleshooting services.

Cisco Security and VPN Consulting Services
Cisco's network security and remote connection technology provide a complete range of easy-to-administer security products to help safeguard your local and remote information system. Cisco's VPN line features switches, firewalls, intrusion detection systems and Virtual Private Network concentrators. Progent's professional consulting staff includes experienced specialists with Cisco's CCIE and Cisco Certified Network Professional certifications who are able to assist your organization to select Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco security technologies that fit best with your business goals. Learn additional details about Progent's Engineering Expertise for Cisco Security and VPN Products.

Consulting Expertise for Other Firewall and VPN Products
Progent offers small and mid-size companies expert support for Intrusion Protection Systems and IPsec VPN technology from major firewall and VPN security companies such as WatchGuard, Juniper, and SonicWALL. Progent can help you create a comprehensive security strategy and select the right products from multiple vendors to achieve your security goals while staying within your spending restraints.

Certified Security Design
Any company ought to have a carefully thought out security program that includes both proactive processes and response plans. The proactive plan is a set of steps designed to minimize vulnerabilities. The post-attack plan helps your company's security engineers to evaluate the impact caused by a security penetration, repair the damage, document the event, and get the IT network running as quickly as feasible.

Progent's certified information security engineers can to help your company to run a comprehensive risk evaluation and define a network security plan to establish security processes and controls to reduce ongoing attacks and dangers.

CISM Qualified Network Security Support Expertise
The Certified Information Security Manager (CISM) committee defines the core competencies and international standards of performance that IT security managers are required to learn. CISM gives business management the assurance that those who have earned their CISM credential possess the background and capability to deliver efficient security administration and support services. Progent can provide the services of CISM qualified security consultants to help companies with:

  • IS Security Strategies
  • Risk Management
  • IS Security Implementation Management
  • IS Security Management
  • Response Management
Read more information about Progent's CISM Qualified IS Security Engineering Professionals.

CISSP Certified Security Engineering Support
CISSP certification recognizes mastery of an international standard for information security. ANSI has granted the CISSP credential recognition in the field of information security defined by ISO 17024. Progent can provide the services of security consultants who have qualified for CISSP certification. Progent can give you access to a CISSP-certified professional to help your enterprise in a broad range of security areas such as:

  • Security Management Procedures
  • Security Infrastructure and Models
  • Access Management Systems and Methodology
  • Applications Development Security
  • Secure Operations
  • Site Security
  • Encryption/Decryption Technology
  • Telecommunications, LAN and WAN Security
  • Business Continuity Planning
Learn more details concerning Progent's CISSP Accredited Network Security Engineering Professionals.

ISSAP Accredited Secure System Architecture Engineering Assistance
Progent's ISSAP qualified network architecture engineers are experts who have been awarded ISSAP status as a result of rigorous testing and extensive work with network security design. The ISSAP credential represents demonstrated competence in the most challenging demands of information system security architecture within the broader field of information system security expertise required for CISSP certification. Progent's ISSAP-qualified security specialists can help your company with all aspects of architecture security such as.

  • Access Management Mechanisms and Methodologies
  • Telecom and System Infrastructure Protection
  • Data Encryption Options
  • Needs Evaluation and Security Guidelines
  • BCP and DRP
  • Hardware Security
Read additional information concerning Progent's ISSAP Certified Secure Information System Architecture Support Services.

CISA Accredited IS Security Auditing Engineering Assistance
The Certified Information Systems Auditor credential is a globally recognized achievement that signifies mastery in IS security auditing. Certified by the American National Standards Institute, the CISA credential has consultants pass a comprehensive examination given by the ISACA international professional association. Progent's CISA-qualified security audit engineers can assist your IT organization in the areas of:

  • IS Audit Process
  • Information Technology Enforcement
  • Network Assets and Architecture Planned Useful Life
  • IT Service Delivery
  • Safeguarding Data Resources
  • Business Continuity Planning
Learn more details about Progent's CISA Accredited Network Security Auditing Consulting Expertise.

Certified in Risk and Information Systems Control (CRISC) Consultants
The CRISC certification program was established by ISACA in 2010 to validate an IT professional's skills to plan, implement, and maintain information system control mechanisms to mitigate risk. Progent can provide the expertise of a CRISC-certified engineer to assist you to develop and carry out a workplace continuity strategy based on leading practices promoted by CRISC and geared to match your company's risk appetite, business goals, and IT budget. Progent's CRISC-certified network risk management consultants offer a range of risk evaluation services including:

  • Collect data and review documentation to evaluate major vulnerabilities
  • Identify legal, regulatory, and business mandates and organizational policies associated with your network to assess their possible impact on your business goals
  • Identify potential vulnerabilities for your business processes to help in analyzing your corporate risk
  • Create a risk awareness initiative and conduct training to make sure your stakeholders understand IT risk so they can assist with your risk management process
  • Match identified risk scenarios to related operational processes to help assign risk ownership
  • Validate risk tolerance with your senior leadership and key stakeholders to make sure they align
Get additional information concerning Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Qualified Security Consulting Assistance
GIAC was founded in 1999 to validate the skill of information technology security engineers. GIAC's goal is to verify that a certified professional has the knowledge appropriate to deliver services in important areas of system, information, and application program security. GIAC accreditations are acknowledged by companies and institutions all over the world including and the United States NSA. Progent's GIAC-qualified IS security audit consultants can assist your IT organization with:

  • Assessing Security Systems
  • Security Incident Response
  • Traffic Analysis
  • Web-based Application Security
  • SIEM solutions
Read additional information concerning Progent's GIAC Information Assurance Expertise.

Get in Touch with a Progent Security Specialist
To see how you can access a certified security consultant for online or on-premises assistance in Michigan, call 1-800-993-9400 or go to Remote Computer Support.














© 2002- 2017 Progent Corporation. All rights reserved.