Small business IT networks in the state of Michigan can depend on prompt and economical remote technical support from Progent's accredited network security support specialists to assist with the toughest security issues. Rates are reasonable, charges are per minute, sign-up is quick, and support is unbeatable. Progent also offers assistance for complex projects that requires the knowledge of seasoned security engineers with top industry certifications.

If your Michigan business is located away from major metropolitan neighborhoods like Detroit, Grand Rapids, Warren, Sterling Heights, Flint, Lansing, or Ann Arbor, help from local accredited network security support specialists is often problematic when there's an urgent situation. This could mean a loss of productivity for your company, angry clients, idle workers, and defocused management. By calling Progent's online services, you have access to a qualified security consultant who can offer assistance whenever you need it to keep your network operating and salvage your data.

Progent can assist you in a variety of ways in your efforts to guard your information system with support services that can range from security assessments to creating a company-wide security plan. Progent offers affordable support to help businesses of all sizes to set up and maintain secure IT environments powered by Microsoft Windows and Cisco products and that can include computers running UNIX, Linux, Solaris, or Apple Mac OS X platforms as well as mobile clients with Apple iPhones and iPads or Google Android or Windows Phone smart phones and tablets.

Progent can also assist you to outsource spam filtering and protection from email-borne security threats. Email Guard is Progent's email security platform that uses the technology of top information security vendors to deliver web-based control and world-class protection for all your inbound and outbound email. The hybrid architecture of Email Guard managed service combines cloud-based filtering with an on-premises security gateway device to offer advanced protection against spam, viruses, Denial of Service Attacks, DHAs, and other email-borne malware. ProSight Email Guard's Cloud Protection Layer acts as a preliminary barricade and keeps most threats from reaching your security perimeter. This reduces your exposure to external attacks and saves system bandwidth and storage space. ProSight Email Guard's on-premises gateway appliance adds a further layer of analysis for incoming email. For outbound email, the local security gateway offers anti-virus and anti-spam filtering, protection against data leaks, and encryption. The on-premises security gateway can also enable Exchange Server to monitor and safeguard internal email traffic that stays inside your security perimeter.

Progent's security professionals are available remotely or on site to provide a range of urgent or project-based computer security services which include:

  • Perform extensive security audits
  • Recover rapidly after virus and worm attacks
  • Install and troubleshoot firewalls
  • Implement safe techniques for offsite and mobile access
  • Deploy effective applications for defense against viruses, spam and directory harvest attacks
  • Help create a company-wide security strategy with round-the-clock monitoring
  • Offer outsourced Help Desk Call Center Services
  • Help Create a practical network backup and business continuity strategy centered on Data Protection Manager backup capability
If your network has an immediate need for IT security help, go to Progent's Emergency Remote Network Help.

Progent's consultants offer advanced support in key fields of network protection including analysis, firewall and VPN expertise, and high-level security consulting.

Security Audits
Progent's certified security consultants can assess the strength of your existing network security systems by performing comprehensive remote automated testing via sophisticated utilities and tested procedures. Progent's experience in administering this service saves your company consulting fees and offers an accurate picture of weaknesses. The knowledge your company gains can make up the foundation of a network protection strategy that will permit your network to run dependably and respond quickly to new threats.

Automated Network Vulnerability Assessment
Progent offers expertise in the application of security analysis utilities such as Microsoft's MBSA and GFI LANguard for economically running a variety of automatic network testing checks to identify potential security gaps. Progent has broad experience with other network analysis products including NMAP, AMAP application mapper, eEye Vulnerability Scanner, plus tools like Metasploit Framework, Netcat, and Nikto. Progent can help you to make sense of testing reports and respond appropriately.

Progent can help you design security into your company operations, configure auditing applications, plan and implement a secure network environment, and recommend policies to optimize the safety of your network. Progent's security consultants are able to assist you to configure a firewall, design secure remote access to email and business applications, and install VPN. Find out additional information on Progent's network security assessment.

Security Inventory Bundles for Small Businesses
Progent offers two low-cost security inventory service bundles intended to enable small companies to receive an independent security assessment from a qualified security specialist. With Progent's External Network Security Inventory Checkup, a security expert administers an extensive examination of your network from beyond your firewalled perimeter to determine possible risks in the security posture you present to the outside world. With Progent's Internal Network Security Inventory Scan, a security expert executes a network scan from an authorized computer inside your firewall to assess vulnerabilities to internal assaults. The two security inventory packages are set up and executed from a secured remote site. The project is overseen by a consultant who has earned top security accreditations and who generates a document that details and analyzes the data collected by the security scan and suggests practical improvements if appropriate.

Network Penetration Analysis Support Services
Stealth penetration checking is a key component of any comprehensive IT system security strategy. Progentís security professionals can run extensive intrusion tests without the awareness of your company's in-house network support resources. Unannounced penetration checking uncovers whether current security defense tools such as intrusion detection warnings and event history monitoring are correctly configured and consistently monitored. Learn additional information about Progent's network penetration testing support services.

Firewalls and VPN Support
Progent's background in network security technology includes extensive familiarity with major firewalls and VPN technology from multiple vendors such as Cisco, Microsoft, and Juniper. Progent offers the support of consultants with important industry accreditations including Cisco Certified Internetwork Expert and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Configuration and Troubleshooting
The new Cisco ASA 5500-X Series of firewalls with Firepower Services deliver significantly more performance than Cisco's previous firewalls and have superseded the ASA 5500 and PIX security appliances for new deployments. Since Cisco's purchase of Sourcefire, the entire line of ASA 5500-X firewalls can be provisioned to enable Firepower Services, based on Sourcefire's Snort technology, which is the market's most deployed intrusion protection system (IPS). Firepower services provide powerful new features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-certified CCIE network experts can help your company to maintain your existing PIX or Cisco ASA 5500 security appliances and migrate efficiently to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite help with ASA 5500-X firewalls with Firepower Services and can help your organization to design, deploy, optimize, manage and debug firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Find out more details about Cisco ASA 5500-X Firewalls with Firepower configuration and troubleshooting services.

Cisco Security and Virtual Private Network Consulting Expertise
Cisco's security and remote connection technology offer a complete line of manageable security solutions to help protect your wired and wireless network infrastructure. Cisco's VPN product family features switches, firewalls, intrusion detection devices and Virtual Private Network appliances. Progent's professional consulting staff includes field-proven specialists with Cisco's Certified Internetwork Expert and Cisco Certified Network Professional certifications who can help your business to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security technologies that align most closely with your business goals. Read additional information concerning Progent's Engineering Expertise for Cisco Security Technology and Virtual Private Network Appliances.

Engineering Expertise for Other Firewall and Virtual Private Network Products
Progent offers small and medium size businesses expert consulting for Intrusion Protection Systems and IPsec VPN technology from major firewall and Virtual Private Network security vendors such as WatchGuard, Juniper Networks, and Symantec. Progent can show you how to design a comprehensive security plan and select the right products from multiple suppliers to support your security goals while sticking within your spending restraints.

Progent's Low-Cost Managed Services for Information Assurance
Progent's low-cost ProSight series of managed services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring is an endpoint protection (EPP) service that utilizes cutting edge behavior-based analysis technology to defend endpoint devices and physical and virtual servers against new malware assaults like ransomware and email phishing, which routinely get by traditional signature-based AV products. ProSight ASM protects on-premises and cloud-based resources and provides a single platform to address the complete threat lifecycle including filtering, infiltration detection, containment, cleanup, and post-attack forensics. Top features include one-click rollback using Windows Volume Shadow Copy Service (VSS) and automatic network-wide immunization against newly discovered threats. Read more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense.

ProSight Enhanced Security Protection: Unified Endpoint Security
Progent's ProSight Enhanced Security Protection (ESP) managed services deliver ultra-affordable in-depth protection for physical and virtual servers, workstations, mobile devices, and Exchange Server. ProSight ESP uses adaptive security and advanced machine learning for continuously monitoring and reacting to cyber threats from all vectors. ProSight ESP delivers firewall protection, intrusion alerts, endpoint management, and web filtering through cutting-edge tools incorporated within one agent accessible from a unified console. Progent's data protection and virtualization consultants can help you to design and configure a ProSight ESP deployment that meets your organization's unique requirements and that allows you demonstrate compliance with government and industry information security regulations. Progent will assist you define and configure security policies that ProSight ESP will enforce, and Progent will monitor your network and respond to alarms that require immediate attention. Progent's consultants can also assist your company to set up and verify a backup and restore system such as ProSight Data Protection Services (DPS) so you can get back in business quickly from a potentially disastrous security attack such as ransomware. Read more about Progent's ProSight Enhanced Security Protection unified endpoint protection and Exchange email filtering.

ProSight DPS: Managed Cloud Backup
ProSight Data Protection Services provide small and medium-sized businesses a low cost end-to-end solution for reliable backup/disaster recovery. For a fixed monthly cost, ProSight Data Protection Services automates and monitors your backup activities and allows rapid restoration of vital files, apps and VMs that have become unavailable or corrupted as a result of hardware failures, software glitches, natural disasters, human error, or malicious attacks such as ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, applications, system images, as well as Hyper-V and VMware images. Important data can be protected on the cloud, to an on-promises storage device, or to both. Progent's BDR consultants can provide world-class support to configure ProSight Data Protection Services to be compliant with regulatory requirements like HIPPA, FIRPA, and PCI and, whenever necessary, can assist you to restore your critical information. Find out more about ProSight DPS Managed Cloud Backup.

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering service that incorporates the technology of top information security vendors to deliver centralized management and comprehensive protection for all your inbound and outbound email. The powerful structure of Progent's Email Guard managed service integrates a Cloud Protection Layer with a local security gateway appliance to provide advanced defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. The cloud filter serves as a first line of defense and keeps the vast majority of threats from making it to your security perimeter. This decreases your exposure to inbound threats and conserves network bandwidth and storage. Email Guard's onsite gateway appliance provides a deeper level of inspection for inbound email. For outbound email, the local security gateway offers AV and anti-spam filtering, protection against data leaks, and email encryption. The onsite security gateway can also assist Exchange Server to monitor and protect internal email that originates and ends within your security perimeter. For more information, see ProSight Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small or mid-size business can have its critical servers and apps hosted in a protected Tier III data center on a fast virtual host set up and maintained by Progent's IT support professionals. With Progent's ProSight Virtual Hosting service model, the customer owns the data, the operating system platforms, and the apps. Since the environment is virtualized, it can be moved immediately to an alternate hardware environment without a lengthy and technically risky reinstallation procedure. With ProSight Virtual Hosting, you are not locked into one hosting provider. Learn more details about ProSight Virtual Hosting services.

ProSight IT Asset Management: Infrastructure Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, update, retrieve and protect information related to your network infrastructure, processes, applications, and services. You can quickly find passwords or serial numbers and be warned about impending expirations of SSL certificates or warranties. By cleaning up and organizing your network documentation, you can save up to half of time spent searching for vital information about your IT network. ProSight IT Asset Management features a centralized repository for holding and collaborating on all documents related to managing your business network like recommended procedures and self-service instructions. ProSight IT Asset Management also offers advanced automation for gathering and relating IT data. Whether youíre making enhancements, performing maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the data you need when you need it. Find out more about ProSight IT Asset Management service.

Certified Security Consulting
Every company ought to develop a carefully considered security strategy that includes both proactive processes and response plans. The pre-attack plan is a collection of steps that help to reduce vulnerabilities. The reactive strategy assists your security engineers to evaluate the damage resulting from a security penetration, repair the network, record the event, and get the IT network running as quickly as feasible.

Progent's certified IT security engineers can to assist your business to run a full vulnerability assessment and define a company-wide security strategy to establish security processes and mechanisms to mitigate ongoing assaults and dangers.

CISM Certified Information Security Support Assistance
The CISM organization defines the basic competencies and international standards of skill that IT security professionals are expected to learn. It provides business management the confidence that those who have earned their CISM credential possess the experience and knowledge to provide effective security administration and consulting consulting. Progent offers the support of CISM qualified security consultants to help businesses with:

  • Network Security Governance
  • Vulnerability Analysis
  • Information Security Implementation Management
  • Information Security Administration
  • Response Planning
Learn additional details concerning Progent's CISM Certified IS Security Support Expertise.

CISSP Accredited Security Engineering Expertise
The CISSP credential recognizes expertise with a global standard for network security. The American National Standards Institute has granted certification accreditation in the field of information protection under ISO 17024. Progent can provide the services of security experts who have earned CISSP accreditation. Progent can provide a CISSP-certified consultant to help your enterprise in a variety security fields such as:

  • Security Management Procedures
  • Security Architecture and Paradigms
  • Access Management Solutions and Processes
  • Applications Development Security
  • Operations Security
  • Physical Security
  • Data Encryption Mechanisms
  • Telecom, LAN and WAN Security
  • Disaster Recovery Planning
Read additional information about Progent's CISSP-certified Security Support Professionals.

ISSAP Certified Secure Information System Architecture Consulting Support
Progent's ISSAP certified IT architecture engineers are consultants who have been awarded ISSAP Certification as a result of thorough testing and significant work with network security architecture. The Information System Security Architecture Professional (ISSAP) certification indicates proven mastery in the most in-depth requirements of information system security architecture within the wider field of IS security knowledge needed for CISSP accreditation. Progent's ISSAP-qualified security specialists can help your business with all aspects of secure network architecture including.

  • Access Management Systems and Techniques
  • Phone System and Network Infrastructure Protection
  • Cryptography Solutions
  • Needs Evaluation and Security Standards
  • Business Continuity Planning (BCP) and DRP
  • Site Security
Read additional details about Progent's ISSAP Certified Secure Network Architecture Support Services.

CISA Qualified IS Security Auditing Consulting Services
The CISA credential is a prestigious achievement that signifies expertise in IS security audit and control. Accredited by the American National Standards Institute (ANSI), the CISA credential has consultants undergo a comprehensive examination administered by the ISACA professional association. Progent's CISA IS security audit engineers are available to assist your company with:

  • Information Systems Audit Process
  • IT Governance
  • Network Assets and Architecture Lifecycle
  • Information Technology Service Delivery
  • Safeguarding Data Assets
  • Business Continuity Planning
Find out additional information about Progent's CISA Certified IS Security Auditing Engineering Expertise.

CRISC Experts
The Certified in Risk and Information Systems Control (CRISC) program was established by ISACA in 2010 to validate an IT professional's ability to design, deploy, and maintain IS controls to mitigate network risk. Progent offers the services of a CRISC-certified consultant to help you to create and carry out a business continuity plan based on leading practices promoted by CRISC and crafted to align with your company's risk appetite, business objectives, and budgetary guidelines. Progent's CRISC network risk management consultants offer a range of risk evaluation services including:

  • Gather data and study documentation to evaluate major vulnerabilities
  • Inventory legal, regulatory, and contractual mandates and organizational standards associated with your information system to determine their possible influence on your business goals
  • Identify potential vulnerabilities for your operational workflows to assist in evaluating your enterprise risk
  • Create a risk awareness initiative and conduct training to make sure your organization understand information system risk so they can assist with your risk control program
  • Connect key risk vectors to related business procedures to help determine risk ownership
  • Determine risk tolerance with executive leadership and major stakeholders to ensure they are in agreement
Find out the details concerning Progent's CRISC Experts.

GIAC Qualified Network Security Consulting Support
Global Information Assurance Certification was established in 1999 to certify the skill of computer security experts. GIAC's mission is to verify that an accredited professional possesses the knowledge appropriate to provide support in important categories of system, information, and application software security. GIAC certifications are recognized by businesses and institutions around the world including and the U.S. National Security Agency (NSA). Progent's GIAC-certified network security audit engineers are available to help your IT organization in the areas of:

  • Auditing IT Infrastructure
  • Incident Handling
  • Intrusion Detection
  • Web-based Services Security
  • SIEM solutions
Learn additional information about Progent's GIAC Information Assurance Services.

Get in Touch with a Progent Security Engineer
To find out how to get in touch with a certified Progent security engineer for remote or on-premises expertise in Michigan, call 1-800-993-9400 or go to Remote Computer Help.














© 2002- 2018 Progent Corporation. All rights reserved.