Small business networks in Michigan can have quick and economical online access to Progent's accredited security engineers to resolve urgent security issues. The cost is competitive, billing is by the minute, sign-up is immediate, and service is unbeatable. Progent also offers help for complex projects that requires the knowledge of senior security engineers with top security credentials.

If your Michigan organization is situated away from major metropolitan areas such as Detroit, Grand Rapids, Warren, Sterling Heights, Flint, Lansing, or Ann Arbor, contact with nearby qualified security engineers may be problematic when you have a crisis. This can cause a loss of productivity for your business, angry clients, idle employees, and defocused management. By utilizing Progent, you have access to a qualified security engineer ready to offer expertise when you have to have it to get your information system on line and restore your information.

Progent can help you at any level in your initiatives to defend your information system with services that can range from security checks to creating a comprehensive security strategy. Progent provides affordable service to help companies of any size to design and manage protected networks powered by Windows and Cisco technology and that can include computers based on UNIX, Linux, Sun Solaris, or Mac OS X platforms as well as BYOD clients with Apple iOS handhelds or Google Android or Windows Phone handsets.

Progent can also show you how to outsource spam blocking and defense against email-borne attacks. Email Guard is Progent's email security platform that incorporates the services and infrastructure of leading information security vendors to deliver web-based control and comprehensive protection for all your email traffic. The hybrid architecture of Email Guard managed service integrates a Cloud Protection Layer with a local security gateway device to provide complete protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. The cloud filter serves as a preliminary barricade and blocks most unwanted email from reaching your network firewall. This decreases your exposure to inbound threats and conserves network bandwidth and storage. ProSight Email Guard's on-premises security gateway appliance provides a further level of inspection for inbound email. For outgoing email, the local security gateway provides anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The local security gateway can also enable Exchange Server to track and safeguard internal email traffic that originates and ends inside your security perimeter.

Progent's certified experts are available remotely or in person to offer a range of urgent or longer-term IT security services which include:

If your company has an urgent requirement for IT security support, refer to Progent's Emergency Remote Network Help.

Progent's consultants can deliver advanced services in vital facets of computer protection that include analysis, firewalls and VPN, and advanced security consulting.

System Security Assessment
Progent's certified security engineers can evaluate the strength of your current computer protection implementation through comprehensive remote automated analysis based on advanced software tools and proven techniques. Progent's experience in this testing saves you money and offers a detailed picture of system vulnerability. The information your company gains can be used as the basis of a security plan that will permit your network to run dependably and adapt quickly to new threats.

Automated Security Evaluation
Progent offers expertise in the use of security auditing packages including MBSA and GFI LANguard Network Security Scanner for affordably performing a set of automatic network testing checks to identify potential security holes. Progent has broad experience with other network auditing utilities such as NMAP, AMAP, eEye, plus tools like SolarWinds, Hydra, and Nikto. Progent can show you how to understand testing reports and react appropriately.

Progent can help you design protection into your business processes, configure scanning software, plan and deploy a protected network architecture, and suggest policies to maximize the safety of your network. Progent's security consultants are available to show you how to configure a firewall, design safe remote connectivity to email and data, and install VPN. Find out more concerning Progent's network security audits.

Security Inventory Bundles for Small Companies
Progent has put together two ultra-affordable security inventory packages designed to allow small companies to receive an independent network security evaluation from a qualified security specialist. With Progent's External Security Inventory Checkup, a security engineer runs a comprehensive test of your IT infrastructure from outside your company firewall to uncover potential weaknesses in the security profile you expose to the public. With Progent's Internal Network Security Inventory Checkup, a certified security professional runs a system scan from a secure computer within your firewall to evaluate your exposure to internal assaults. The two security inventory services are configured and run from a secured remote location. The process is managed by an engineer who has earned top security credentials and who produces a report that summarizes and interprets the data collected by the scan and suggests practical remediation if appropriate.

Network Penetration Testing Support Services
Stealth penetration testing is an important component of any successful IT system security plan. Progentís security experts can perform thorough penetration tests without the awareness of your organization's internal IT resources. Stealth penetration checking shows whether existing security monitoring systems such as intrusion detection alerts and event history monitoring are correctly configured and consistently monitored. Learn additional information about Progent's stealth security penetration testing consulting.

Firewall And Virtual Private Network (VPN) Expertise
Progent's background in security technology encompasses extensive field work with leading firewalls and Virtual Private Network (VPN) products offered by multiple vendors including Cisco, Microsoft, and CheckPoint. Progent can provide the services of consultants who have earned important industry accreditations including Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Integration and Troubleshooting
The latest generation of Cisco ASA 5500-X Family of firewalls with Firepower Services provide significantly more performance than Cisco's legacy firewalls and have superseded the ASA 5500 and PIX security appliances for all new deployments. Since Cisco's purchase of Sourcefire, the whole line of ASA 5500-X firewalls can be configured to support Firepower Services, built on Sourcefire's Snort product, which is the world's most popular intrusion protection system (IPS). Firepower services bring powerful new capabilities including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-qualified CCIE network experts can assist your company to manage your legacy PIX or Cisco ASA 5500 firewalls or upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and onsite help with ASA 5500-X firewalls with Firepower Services and can help your organization to plan, deploy, optimize, manage and debug firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. See additional information about Cisco ASA 5500-X Firewalls with Firepower integration and debugging services.

Cisco Security and VPN Consulting Expertise
Cisco's security and remote connection technology offer a comprehensive range of manageable security solutions to help safeguard your wired and wireless network infrastructure. Cisco's VPN product family includes routers, firewalls, intrusion detection devices and Virtual Private Network appliances. Progent's professional staff of consultants includes field-proven engineers with Cisco's CCIE and Cisco Certified Network Professional certifications who are able to help your business to evaluate Cisco VPN, Cisco RADIUS Security, and additional Cisco security solutions that fit best with your company objectives. Find out more details concerning Progent's Support Expertise for Cisco Security Solutions and VPN Appliances.

Consulting Services for Other Firewall and VPN Technology
Progent offers small and medium size organizations professional consulting for Intrusion Protection products and IPsec VPN technology from major firewall and Virtual Private Network security vendors such as Check Point Software, Juniper, and SonicWALL. Progent can help you create a detailed security plan and choose the right technologies from a variety of vendors to achieve your security objectives while sticking within your budget limits.

Progent's Fixed-price Managed Services for Information Assurance
Progent's low-cost ProSight line of outsourced network management services is designed to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all facets of information assurance. Managed services offered by Progent include:
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam filtering and email encryption service that uses the technology of leading data security companies to provide web-based control and world-class protection for your email traffic. The powerful structure of Progent's Email Guard managed service combines cloud-based filtering with a local gateway device to provide advanced protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne malware. The cloud filter acts as a preliminary barricade and keeps most threats from making it to your network firewall. This decreases your vulnerability to inbound threats and saves system bandwidth and storage space. Email Guard's on-premises security gateway appliance adds a further level of inspection for inbound email. For outgoing email, the on-premises security gateway provides anti-virus and anti-spam filtering, protection against data leaks, and email encryption. The on-premises security gateway can also help Microsoft Exchange Server to track and protect internal email traffic that originates and ends inside your corporate firewall. For more details, see ProSight Email Guard spam filtering and data leakage protection.

ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring is an endpoint protection service that utilizes next generation behavior-based machine learning technology to guard endpoints as well as servers and VMs against modern malware attacks like ransomware and email phishing, which routinely evade traditional signature-based anti-virus products. ProSight Active Security Monitoring safeguards on-premises and cloud resources and offers a single platform to address the complete threat lifecycle including blocking, detection, containment, cleanup, and forensics. Top capabilities include single-click rollback using Windows VSS and automatic system-wide immunization against new attacks. Find out more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware recovery.

ProSight Data Protection Services: Managed Cloud Backup and Recovery
ProSight Data Protection Services provide small and mid-sized businesses a low cost end-to-end service for reliable backup/disaster recovery (BDR). Available at a low monthly price, ProSight DPS automates and monitors your backup processes and enables rapid restoration of vital data, applications and VMs that have become unavailable or corrupted due to hardware failures, software glitches, natural disasters, human error, or malware attacks like ransomware. ProSight DPS can help you back up, recover and restore files, folders, apps, system images, plus Microsoft Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to an on-promises device, or to both. Progent's backup and recovery consultants can provide world-class expertise to set up ProSight DPS to to comply with government and industry regulatory standards like HIPPA, FIRPA, and PCI and, whenever necessary, can assist you to recover your critical information. Learn more about ProSight Data Protection Services Managed Cloud Backup.

ProSight IT Asset Management: Network Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to capture, maintain, find and protect information about your IT infrastructure, processes, business apps, and services. You can instantly locate passwords or serial numbers and be warned automatically about impending expirations of SSL certificates or domains. By cleaning up and managing your IT documentation, you can save as much as 50% of time thrown away trying to find vital information about your network. ProSight IT Asset Management includes a centralized location for storing and collaborating on all documents related to managing your business network such as standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also offers a high level of automation for gathering and relating IT information. Whether youíre planning improvements, performing maintenance, or responding to an emergency, ProSight IT Asset Management gets you the information you require when you need it. Find out more details about ProSight IT Asset Management service.

Expert Security Consulting
Any business should have a thoroughly thought out security program that includes both pre-attack processes and reaction plans. The proactive strategy is a collection of mechanisms designed to minimize vulnerabilities. The post-attack strategy helps your company's IT security personnel to assess the damage caused by an attack, fix the network, record the experience, and get the IT network operational as soon as feasible.

Progent's certified IT security engineers can to assist your business to perform a full risk assessment and define a computer security plan to establish security processes and mechanisms to minimize ongoing attacks and dangers.

CISM Certified Network Security Support Expertise
The CISM committee describes the core capabilities and worldwide standards of performance that information security professionals are required to learn. CISM provides executive management the confidence that consultants who have earned their CISM certification possess the experience and capability to provide effective security management and support services. Progent can provide the expertise of CISM certified security professionals to assist businesses with:

  • IS Security Governance
  • Risk Analysis
  • Network Security Program Management
  • Information Security Administration
  • Response Management
Read more information concerning Progent's CISM Certified Network Security Engineering Professionals.

CISSP Qualified Security Engineering Services
CISSP certification recognizes mastery of a worldwide standard for network security. ANSI (American National Standards Institute) has granted certification accreditation in the field of information protection stipulated by ISO/IEC 17024. Progent offers the services of security experts who have earned CISSP accreditation. Progent can give you access to a CISSP-certified expert to help your company in a variety security areas including:

  • Security Administration Procedures
  • Security Infrastructure and Models
  • Access Management Systems and Processes
  • Applications Development Security
  • Secure Operations
  • Site Security
  • Encryption/Decryption Mechanisms
  • Telecom, Network and Internet Security
  • Disaster Recovery Preparedness
Find out additional information concerning Progent's CISSP Qualified Network Security Engineering Expertise.

ISSAP Accredited Secure Network Architecture Engineering Support
Progent's ISSAP certified system architecture engineers are experts who have been awarded ISSAP Certification as a result of rigorous testing and significant work with information security architecture. The Information System Security Architecture Professional (ISSAP) credential indicates proven skill in the more complex requirements of information system security architecture bounded by the wider scope of information security expertise required for CISSP accreditation. Progent's ISSAP-certified security experts can assist your company with all phases of architecture security such as.

  • Access Management Systems and Techniques
  • Telecom and Network Infrastructure Security
  • Data Encryption Options
  • Requirements Evaluation and Security Criteria
  • BCP and Disaster Recovery Planning (DRP)
  • Hardware Security
Learn more details about Progent's ISSAP Certified Secure Information System Architecture Support Expertise.

CISA Certified IS Security Auditing Consulting Expertise
The Certified Information Systems Auditor (CISA) accreditation is a prestigious achievement that signifies mastery in network security auditing. Accredited by the American National Standards Institute (ANSI), the CISA credential requires that consultants pass an extensive examination administered by the ISACA professional group. Progent's CISA-qualified information security audit consultants can assist your IT organization with:

  • Information Systems Audit Services
  • IT Governance
  • Network Assets and Infrastructure Planned Useful Life
  • Information Technology Support
  • Safeguarding Information Resources
  • Business Continuity Planning
Read more details concerning Progent's CISA Certified Network Security Auditing Consulting Expertise.

CRISC Consultants
The CRISC certification program was initiated by ISACA in 2010 to validate an IT professional's ability to plan, deploy, and maintain information system control mechanisms to mitigate network risk. Progent offers the services of a CRISC-certified consultant to assist your company to create and carry out a workplace continuity strategy that follows leading practices identified by CRISC and crafted to match your organization's risk tolerance, business goals, and budgetary guidelines. Progent's CRISC-qualified IT risk mitigation experts offer a range of risk identification services including:

  • Collect data and study documentation to identify major risk scenarios
  • Inventory legal, industry, and business requirements and company policies related to your information system to assess their potential influence on your business objectives
  • Identify potential vulnerabilities for your operational workflows to assist in analyzing your corporate risk
  • Develop a risk awareness program and conduct training to ensure your stakeholders appreciate information system risk so they can assist with your risk management process
  • Connect key risk scenarios to related business procedures to help assign risk responsibility
  • Determine risk appetite with your senior leadership and key stakeholders to ensure they align
Find out the details about Progent's Certified in Risk and Information Systems Control (CRISC) Consultants.

GIAC Certified Information System Security Engineering Assistance
Global Information Assurance Certification was established in 1999 to validate the knowledge of information technology security engineers. GIAC's goal is to assure that a certified security consultant has the skills appropriate to provide support in vital categories of system, information, and application software security. GIAC certifications are recognized by businesses and institutions around the world including and the United States NSA. Progent's GIAC-qualified security audit consultants are available to assist your IT organization with:

Learn additional details concerning Progent's GIAC Information Assurance Support.

Talk to a Certified Security Expert
To find out how to access a Progent security engineer for online or on-premises support in Michigan, phone 1-800-993-9400 or go to Remote Network Help.














© 2002- 2018 Progent Corporation. All rights reserved.