Business information networks in the state of Michigan can depend on prompt and affordable remote technical support from Progent's certified security experts to fix complex security problems. Rates are affordable, charges are by the minute, sign-up is fast, and service is unbeatable. Progent also provides help for complex projects that requires the expertise of senior security engineers with high-level security credentials.

In case your Michigan small business is outside of larger urban neighborhoods like Detroit, Grand Rapids, Warren, Sterling Heights, Flint, Lansing, or Ann Arbor, support from nearby qualified security support specialists could be problematic during an urgent situation. This can cause lost revenue for your company, angry customers, unproductive employees, and distracted executives. By utilizing Progent, you can get in touch with a certified security professional who can provide help when you require it to get your information system on line and salvage your information.

Progent can assist you in a variety of ways in your efforts to protect your information system with support that ranges from network security assessments to creating a comprehensive security strategy. Progent provides economical service to help businesses of all sizes to set up and maintain protected networks powered by Windows and Cisco technology and that may include servers and desktops running UNIX, Linux, Sun Solaris, or Mac OS X operating systems as well as mobile users with Apple handhelds or Google Android or Windows Phone smart phones and tablets.

Progent can also help you outsource spam filtering and protection from email-borne assaults. Email Guard is Progent's email filtering and encryption platform that incorporates the technology of leading data security vendors to provide web-based management and world-class security for all your inbound and outbound email. The powerful architecture of Progent's Email Guard integrates a Cloud Protection Layer with a local gateway appliance to provide advanced protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. The cloud filter acts as a preliminary barricade and blocks most threats from reaching your network firewall. This decreases your vulnerability to external attacks and conserves network bandwidth and storage space. ProSight Email Guard's on-premises security gateway device provides a further layer of inspection for incoming email. For outgoing email, the local security gateway offers anti-virus and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The onsite gateway can also enable Microsoft Exchange Server to track and protect internal email traffic that stays within your corporate firewall.

Progent's certified professionals are available remotely or in person to provide a range of emergency or longer-term IT security services including:

  • Run thorough network security audits
  • Recuperate quickly after serious security breaches
  • Configure effective firewalls
  • Configure safe solutions for offsite and mobile connectivity
  • Deploy advanced utilities for protection against viruses, spam and DHAs
  • Develop a company-wide security plan with round-the-clock security monitoring
  • Offer comprehensive Help Desk Services
  • Create a practical network backup and restore plan centered on Microsoft DPM backup/restore technology
If your company has an urgent requirement for computer security help, refer to Progent's Emergency Online Network Support.

Progent's support professionals can deliver world-class support in key fields of computer protection that include auditing, firewall/VPN support, and high-level security planning.

System Evaluation
Progent's certified security consultants can evaluate the vulnerability of your existing network security environment through comprehensive remote automated analysis via sophisticated software tools and tested procedures. Progent's experience in administering this testing saves you consulting fees and assures a detailed portrayal of system vulnerability. The information your business is provided can make up the basis of a network protection strategy that will allow your network to run safely and adapt quickly to new threats.

Automated Vulnerability Evaluation
Progent provides expertise in the application of security auditing packages including MBSA and GFI LANguard Network Security Scanner for economically running a set of programmed network auditing scans to identify potential security weaknesses. Progent has broad knowledge of other security auditing utilities including NMAP, AMAP, eEye Vulnerability Scanner, plus tools like SolarWinds, Netcat, Socat, and Nikto. Progent can show you how to make sense of testing reports and respond appropriately.

Progent can show you how to build protection into your business processes, install scanning software, plan and deploy a secure network environment, and suggest procedures to optimize the security of your network. Progent's security professionals are able to assist you to set up a firewall, implement safe remote access to email and business applications, and integrate VPN. Find out additional information concerning Progent's network security audits.

Security Inventory Packages for Small Businesses
Progent has put together two ultra-affordable security inventory scanning bundles designed to allow small companies to get a professional security assessment from a qualified security engineer. With Progent's External Security Inventory Scan, a security engineer administers an extensive examination of your network from outside your firewalled perimeter to uncover possible risks in the security profile you present to the public. With Progent's Internal Security Inventory Scan, a security expert runs a system scan from a secure computer inside your firewall to uncover your exposure to inside attacks. The two security inventory packages are configured and executed from a secured remote site. The project is directed by an engineer who has earned top security credentials and who generates a document that summarizes and analyzes the information captured by the security scan and proposes practical improvements if called for.

Network Intrusion Analysis Support Services
Stealth intrusion checking is a key component of any comprehensive IT system security plan. Progentís security experts can perform extensive penetration checks without the knowledge of your company's internal IT resources. Stealth penetration checking uncovers whether current security monitoring systems such as intrusion detection alerts and event history monitoring are properly set up and consistently checked. Learn additional information concerning Progent's stealth security penetration analysis consulting.

Firewall and Virtual Private Network Expertise
Progent's background in network security technology encompasses in-depth familiarity with major firewalls and Virtual Private Network (VPN) technology offered by a variety of companies such as Cisco, Microsoft, and Juniper. Progent offers the support of consultants with important industry certifications such as Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Configuration and Debugging
The current ASA 5500-X Series Next-Generation Firewalls with Firepower Services provide substantially more value than Cisco's earlier firewalls and have replaced the ASA 5500 and PIX firewalls for new deployments. Since Cisco's purchase of Sourcefire, the entire line of ASA 5500-X firewalls can be configured to enable Firepower Services, based on Sourcefire's Snort product, which is the world's most deployed intrusion protection system (IPS). Firepower services bring enhanced features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-certified CCIE network consultants can assist your company to manage your existing PIX or Cisco ASA 5500 firewalls and migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite help with ASA 5500-X firewalls with Firepower Services and can assist your business to plan, deploy, optimize, administer and troubleshoot firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. Find out more details about Cisco ASA Firewalls with Firepower configuration and debugging services.

Cisco Network Security and VPN Consulting Expertise
Cisco's security and offsite access products offer a comprehensive line of manageable security solutions to help protect your local and remote information system. Cisco's VPN product family features switches, firewalls, intrusion detection systems and VPN concentrators. Progent's professional staff of consultants includes experienced engineers with Cisco Certified Internetwork Expert and CCNP certifications who are able to help your organization to evaluate Cisco VPN, Cisco RADIUS Security, and additional Cisco security technologies that fit most closely with your business objectives. Read more details concerning Progent's Engineering Expertise for Cisco Security Solutions and Virtual Private Network Products.

Engineering Expertise for Additional Firewall and VPN Products
Progent provides small and medium size businesses professional consulting for Intrusion Protection Systems and IPsec VPN technology from leading firewall and VPN security companies such as Check Point Software, Juniper, and Symantec. Progent can help you create a comprehensive security strategy and select the right technologies from multiple suppliers to support your security objectives while staying within your budget limits.

Progent's Low-Cost Managed Services for Information Security
Progent's low-cost ProSight line of network management outsourcing services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance and compliance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that incorporates next generation behavior-based machine learning technology to defend endpoint devices as well as physical and virtual servers against new malware assaults like ransomware and file-less exploits, which easily evade traditional signature-based anti-virus tools. ProSight ASM protects local and cloud-based resources and provides a unified platform to automate the entire malware attack lifecycle including protection, detection, containment, remediation, and forensics. Key capabilities include single-click rollback with Windows Volume Shadow Copy Service and automatic system-wide immunization against newly discovered threats. Find out more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware recovery.

ProSight Enhanced Security Protection (ESP): Unified Endpoint Security
ProSight Enhanced Security Protection (ESP) managed services deliver economical multi-layer security for physical and virtual servers, workstations, smartphones, and Exchange Server. ProSight ESP uses adaptive security and advanced machine learning for round-the-clock monitoring and reacting to security assaults from all attack vectors. ProSight ESP offers two-way firewall protection, intrusion alerts, endpoint management, and web filtering via leading-edge technologies packaged within a single agent accessible from a single console. Progent's security and virtualization experts can assist your business to plan and implement a ProSight ESP environment that addresses your company's unique requirements and that helps you prove compliance with government and industry information security regulations. Progent will assist you define and implement policies that ProSight ESP will manage, and Progent will monitor your network and react to alerts that require immediate action. Progent can also assist your company to install and test a backup and restore solution like ProSight Data Protection Services (DPS) so you can recover rapidly from a potentially disastrous cyber attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint security and Microsoft Exchange email filtering.

ProSight DPS: Managed Backup
ProSight Data Protection Services from Progent offer small and medium-sized organizations a low cost and fully managed service for secure backup/disaster recovery (BDR). Available at a low monthly cost, ProSight Data Protection Services automates your backup activities and enables rapid restoration of critical data, apps and VMs that have become lost or damaged due to component failures, software bugs, natural disasters, human error, or malware attacks such as ransomware. ProSight DPS can help you protect, recover and restore files, folders, apps, system images, as well as Microsoft Hyper-V and VMware images. Important data can be backed up on the cloud, to a local device, or to both. Progent's cloud backup specialists can provide world-class support to configure ProSight DPS to be compliant with government and industry regulatory standards such as HIPPA, FIRPA, PCI and Safe Harbor and, when needed, can help you to recover your critical data. Read more about ProSight Data Protection Services Managed Cloud Backup and Recovery.

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering service that incorporates the infrastructure of leading data security companies to provide centralized control and world-class security for all your email traffic. The powerful architecture of Email Guard integrates cloud-based filtering with an on-premises gateway appliance to offer advanced protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne malware. Email Guard's cloud filter acts as a preliminary barricade and blocks the vast majority of unwanted email from making it to your security perimeter. This reduces your exposure to inbound attacks and saves system bandwidth and storage space. Email Guard's onsite security gateway device provides a further level of inspection for inbound email. For outgoing email, the local gateway provides anti-virus and anti-spam protection, protection against data leaks, and email encryption. The on-premises gateway can also assist Exchange Server to monitor and safeguard internal email traffic that originates and ends within your corporate firewall. For more details, see Email Guard spam and content filtering.

ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size organization can have its key servers and applications hosted in a secure Tier III data center on a high-performance virtual host configured and managed by Progent's IT support experts. Under Progent's ProSight Virtual Hosting service model, the client retains ownership of the data, the OS software, and the applications. Because the system is virtualized, it can be moved immediately to a different hardware environment without requiring a lengthy and difficult reinstallation procedure. With ProSight Virtual Hosting, you are not locked into a single hosting service. Learn more details about ProSight Virtual Hosting services.

ProSight IT Asset Management: Infrastructure Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to capture, maintain, find and protect data about your IT infrastructure, procedures, applications, and services. You can instantly find passwords or serial numbers and be alerted about upcoming expirations of SSL certificates or warranties. By updating and managing your IT infrastructure documentation, you can eliminate as much as 50% of time thrown away searching for vital information about your IT network. ProSight IT Asset Management features a common location for holding and collaborating on all documents required for managing your network infrastructure such as recommended procedures and self-service instructions. ProSight IT Asset Management also supports advanced automation for gathering and relating IT information. Whether youíre planning improvements, performing regular maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the knowledge you require the instant you need it. Find out more about Progent's ProSight IT Asset Management service.

Expert Security Planning
Any company should have a carefully thought out security strategy that includes both pre-attack processes and response plans. The proactive plan is a collection of mechanisms intended to reduce vulnerabilities. The reactive plan helps your company's security engineers to assess the impact resulting from an attack, repair the damage, record the event, and get business functions running as quickly as possible.

Progent's certified IS security engineers are available to help you to perform a comprehensive risk assessment and create a computer security plan to establish security policies and controls to minimize ongoing assaults and dangers.

CISM Certified Information Security Support Services
The Certified Information Security Manager (CISM) committee describes the core competencies and worldwide standards of skill that information security professionals are expected to master. CISM gives business management the assurance that those who have qualified for their CISM certification possess the background and knowledge to deliver effective security administration and consulting consulting. Progent offers the support of CISM qualified security professionals to help companies with:

  • IS Security Strategies
  • Vulnerability Analysis
  • Network Security Implementation Management
  • Network Security Management
  • Recovery Management
Read more details about Progent's CISM Network Security Engineering Services.

CISSP Certified Security Consulting Services
CISSP denotes mastery of a worldwide standard for data security. ANSI (American National Standards Institute) has granted the CISSP credential accreditation in the area of data protection defined by ISO 17024. Progent offers access to of security experts who have earned CISSP certification. Progent can give you access to a CISSP-certified expert to help your company in a variety security fields including:

  • Security Management Procedures
  • Security Infrastructure and Paradigms
  • Access Management Solutions and Methodology
  • Applications Development Security
  • Operations Security
  • Site Security
  • Encryption/Decryption Mechanisms
  • Telecom, Network and WAN Security
  • Business Continuity Planning
Find out additional information about Progent's CISSP Accredited Network Security Consulting Professionals.

CISSP-ISSAP Certified Secure Network Architecture Engineering Services
Progent's CISSP-ISSAP qualified system architecture engineers are consultants who have earned ISSAP Certification through rigorous testing and significant experience with network security architecture. The ISSAP certification indicates proven mastery in the most in-depth requirements of information security architecture bounded by the broader field of information security expertise needed for CISSP certification. Progent's ISSAP-certified security specialists can help your business with all phases of architecture security such as.

  • Access Control Mechanisms and Techniques
  • Phone System and System Infrastructure Protection
  • Encryption/Decryption Options
  • Needs Evaluation and Security Guidelines
  • Business Continuity Planning (BCP) and DRP
  • Site Security
Learn more information concerning Progent's ISSAP Accredited Secure IT Architecture Engineering Professionals.

CISA Qualified Security Auditing Engineering Assistance
The CISA credential is a prestigious qualification that represents mastery in IS security audit and control. Certified by the American National Standards Institute, the CISA accreditation requires that candidates undergo an extensive examination administered by the ISACA professional association. Progent's CISA-certified network security audit experts can help your business in the areas of:

  • Information Systems Audit Process
  • IT Governance
  • Network Assets and Infrastructure Planned Useful Life
  • IT Support
  • Protecting Data Resources
  • Disaster Recovery Preparedness
Find out additional details about Progent's CISA Accredited IS Security Auditing Consulting Assistance.

Certified in Risk and Information Systems Control (CRISC) Consultants
The Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA to verify an IT professional's skills to plan, implement, and support IS controls to reduce risk. Progent can provide the services of a CRISC-certified consultant to help your company to develop and carry out a workplace continuity or disaster recovery plan that follows industry best practices promoted by CRISC and crafted to align with your organization's risk tolerance, business objectives, and IT budget. Progent's CRISC-qualified IT risk mitigation engineers can provide a range of risk assessment services including:

  • Gather information and study documentation to help identify significant risk scenarios
  • Identify statutory, industry, and contractual mandates and company policies related to your information system to assess their potential influence on your strategic goals
  • Identify possible vulnerabilities for your operational processes to assist in evaluating your corporate risk
  • Create a risk awareness program and provide seminars to ensure your organization appreciate IS risk so they can contribute to your risk control program
  • Connect key risk vectors to your associated operational processes to help assign risk responsibility
  • Determine risk tolerance with executive management and key stakeholders to make sure they match
Learn more details concerning Progent's CRISC Risk Management Consultants.

GIAC Certified IS Security Consulting Expertise
GIAC (Global Information Assurance Certification) was established in 1999 to validate the knowledge of IT security professionals. GIAC's mission is to assure that an accredited security consultant possesses the knowledge necessary to provide services in key categories of network, information, and program security. GIAC accreditations are recognized by businesses and government organizations around the world including and the U.S. National Security Agency. Progent's GIAC security audit specialists are available to help your company with:

Read more details concerning Progent's GIAC Information Assurance Support.

Contact a Security Engineer
To see how to access a Progent security consultant for remote or onsite assistance in Michigan, call 1-800-993-9400 or visit Online Computer Help.














© 2002- 2019 Progent Corporation. All rights reserved.