Small business information networks in the state of Michigan can now get fast and affordable online technical support from Progent's certified network security experts to fix critical security problems. The cost is reasonable, charges are by the minute, sign-up is fast, and support is unbeatable. Progent also offers assistance for complex engagements that demand the services of seasoned security engineers with high-level industry credentials.

If your Michigan organization is some distance from larger urban neighborhoods like Detroit, Grand Rapids, Warren, Sterling Heights, Flint, Lansing, or Ann Arbor, the availability of nearby qualified network security support specialists is often problematic when there's an urgent situation. This could mean a loss of revenue for your company, upset clients, unproductive workers, and defocused executives. By calling Progent, you have access to a certified security engineer ready to provide assistance whenever you need it to get your computer network running and restore your data.

Progent can assist you at any level in your initiatives to defend your IT environment with services ranging from security audits to creating a company-wide security plan. Progent offers affordable service to help businesses of all sizes to design and maintain safe IT environments powered by Windows and Cisco technology and that may include computers based on UNIX, Linux, Solaris, or Apple Mac OS X operating systems plus mobile clients with Apple handhelds or Android or Windows Phone handsets.

Progent can also help you outsource spam filtering and defense against email-borne security threats. Email Guard is Progent's email filtering and encryption platform that uses the technology of top data security vendors to deliver centralized control and world-class security for your inbound and outbound email. The hybrid structure of Progent's Email Guard managed service integrates a Cloud Protection Layer with an on-premises security gateway appliance to offer complete defense against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-based malware. The Cloud Protection Layer acts as a preliminary barricade and blocks the vast majority of threats from reaching your network firewall. This reduces your exposure to inbound threats and saves network bandwidth and storage space. ProSight Email Guard's onsite security gateway device provides a further layer of analysis for incoming email. For outbound email, the onsite gateway offers anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The local security gateway can also help Microsoft Exchange Server to track and safeguard internal email traffic that originates and ends inside your corporate firewall.

Progent's certified experts are accessible online or in person to offer a variety of urgent or longer-term network security services including:

  • Run thorough security audits
  • Clean up promptly after virus and worm attacks
  • Configure and troubleshoot firewalls
  • Implement secure methods for remote and mobile access
  • Install advanced applications for defense against spam and directory harvest attacks
  • Help create a comprehensive security plan with 24x7 monitoring
  • Provide outsourced Help Desk Call Center Support
  • Help Develop a practical network backup and recovery solution based on Microsoft DPM backup/restore capability
If your business has an emergency need for IT security help, refer to Progent's Emergency Remote Technical Support.

Progent's engineers can deliver world-class services in key areas of network security including security assessment, firewall and VPN solutions, and high-level security consulting.

Security Evaluation
Progent's certified security consultants can evaluate the effectiveness of your existing computer security implementation by performing exhaustive remote automated testing via sophisticated utilities and tested procedures. Progent's skill in administering this testing saves you money and offers a detailed portrayal of gaps. The information your company is provided can make up the basis of a network protection plan that can allow your network to run safely and react quickly to new risks.

Automated Security Assessment
Progent offers consulting in the use of security testing utilities such as Microsoft's MBSA and LANguard from GFI for affordably running a variety of programmed system testing checks to uncover potential security problems. Progent has broad knowledge of additional network analysis products including NMAP, AMAP, eEye, plus utilities such as Metasploit, Netcat, Socat, and Nikto. Progent can help you to understand testing reports and respond effectively.

Progent can help you build protection into your company processes, install scanning software, define and deploy a secure network environment, and recommend policies to maximize the security of your IT system. Progent's security professionals are able to assist you to configure a firewall, implement secure remote access to email and business applications, and integrate VPN. Find out more on Progent's automated security assessment.

Security Inventory Service Bundles for Small Companies
Progent has put together two ultra-affordable security inventory scanning packages designed to enable small companies to receive an independent security assessment from an accredited security expert. With Progent's External Network Security Inventory Scan, a security expert runs a comprehensive examination of your IT infrastructure from outside your firewalled perimeter to determine possible weaknesses in the security posture you expose to the public. With Progent's Internal Network Security Inventory Scan, a certified security professional runs a network scan from a secure computer within your company firewall to uncover your exposure to inside attacks. The two security inventory packages are configured and executed from a protected external location. The project is overseen by an engineer who has earned top security credentials and who generates a report that summarizes and analyzes the data captured by the security scan and proposes practical improvements if appropriate.

Network Intrusion Testing Consulting
Stealth penetration testing is a key component of any successful network security plan. Progentís security professionals can run extensive intrusion checks without the knowledge of your company's in-house network support staff. Unannounced penetration testing shows whether current security monitoring tools such as intrusion detection warnings and event history analysis are correctly configured and consistently monitored. Learn more concerning Progent's stealth penetration analysis support services.

Firewall/VPN Expertise
Progent's background in network security technology includes extensive familiarity with leading firewalls and Virtual Private Network products offered by a variety of vendors such as Cisco, Microsoft, and CheckPoint. Progent can provide the support of engineers who have earned important networking accreditations such as Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Integration and Troubleshooting
The latest generation of ASA 5500-X Series of firewalls with Firepower Services deliver substantially more value than Cisco's legacy PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX security appliances for new deployments. Since Cisco's acquisition of Sourcefire, the entire line of ASA 5500-X devices can be configured to support Firepower Services, based on Sourcefire's Snort product, which is the market's most deployed intrusion protection system. Firepower services provide powerful new features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-qualified CCIE network experts can assist your company to maintain your existing PIX or ASA 5500 firewalls and upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite help with ASA 5500-X firewalls with Firepower Services and can assist you to design, deploy, optimize, administer and debug firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Read more details about ASA Firewalls with Firepower configuration and debugging support.

Cisco Network Security and VPN Consulting Services
Cisco's network security and remote connection products offer a complete line of manageable security solutions to help safeguard your local and remote network infrastructure. Cisco's VPN line includes switches, firewalls, intrusion detection devices and Virtual Private Network appliances. Progent's expert staff of consultants includes field-proven engineers with Cisco CCIE and CCNP certifications who are able to help your business to select Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security technologies that fit most closely with your company objectives. Read additional information about Progent's Consulting Expertise for Cisco Security and Virtual Private Network Products.

Engineering Services for Additional Firewall and VPN Technology
Progent offers small and mid-size organizations professional support for Intrusion Protection products and IPsec VPN technology from major firewall and VPN security companies including Check Point Software, Juniper Networks, and Symantec. Progent can show you how to design a comprehensive security strategy and choose the right products from a variety of vendors to support your security goals while staying within your budget limits.

Progent's Fixed-price Managed Services for Information Security
Progent's low-cost ProSight portfolio of managed services is intended to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all aspects of information assurance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring is an endpoint protection service that incorporates next generation behavior-based analysis technology to defend endpoints and physical and virtual servers against modern malware attacks like ransomware and file-less exploits, which routinely get by traditional signature-based anti-virus tools. ProSight Active Security Monitoring safeguards local and cloud resources and offers a single platform to address the entire malware attack lifecycle including protection, identification, mitigation, remediation, and forensics. Top capabilities include single-click rollback with Windows Volume Shadow Copy Service and real-time network-wide immunization against newly discovered threats. Read more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware recovery.

ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Protection
Progent's ProSight Enhanced Security Protection (ESP) services offer economical in-depth protection for physical servers and VMs, desktops, mobile devices, and Exchange Server. ProSight ESP uses contextual security and advanced heuristics for round-the-clock monitoring and responding to cyber assaults from all vectors. ProSight ESP offers firewall protection, intrusion alarms, endpoint control, and web filtering through leading-edge technologies incorporated within one agent accessible from a single console. Progent's security and virtualization consultants can assist you to design and implement a ProSight ESP environment that addresses your company's specific needs and that allows you achieve and demonstrate compliance with legal and industry information protection standards. Progent will help you define and implement policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alerts that require urgent attention. Progent's consultants can also help you to set up and test a backup and restore system such as ProSight Data Protection Services so you can get back in business quickly from a destructive security attack like ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint security and Exchange email filtering.

ProSight DPS: Managed Backup and Recovery
ProSight Data Protection Services provide small and medium-sized organizations a low cost and fully managed service for reliable backup/disaster recovery. For a low monthly price, ProSight DPS automates and monitors your backup activities and allows fast recovery of critical data, applications and VMs that have become lost or damaged as a result of component breakdowns, software glitches, natural disasters, human mistakes, or malware attacks such as ransomware. ProSight Data Protection Services can help you protect, recover and restore files, folders, applications, system images, plus Hyper-V and VMware images. Critical data can be protected on the cloud, to a local storage device, or to both. Progent's cloud backup consultants can provide world-class support to configure ProSight DPS to to comply with government and industry regulatory standards like HIPPA, FINRA, and PCI and, whenever needed, can assist you to restore your critical information. Learn more about ProSight DPS Managed Backup and Recovery.

ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering service that uses the infrastructure of top data security vendors to provide centralized control and comprehensive security for all your inbound and outbound email. The hybrid architecture of Email Guard combines a Cloud Protection Layer with a local gateway device to offer complete defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-borne threats. The cloud filter acts as a preliminary barricade and blocks most unwanted email from reaching your security perimeter. This reduces your exposure to inbound attacks and conserves network bandwidth and storage. Email Guard's onsite gateway device provides a deeper level of analysis for incoming email. For outbound email, the local gateway offers anti-virus and anti-spam protection, protection against data leaks, and email encryption. The on-premises gateway can also help Exchange Server to track and protect internal email traffic that stays inside your security perimeter. For more information, see Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small organization can have its critical servers and applications hosted in a protected fault tolerant data center on a high-performance virtual machine host set up and managed by Progent's network support experts. With Progent's ProSight Virtual Hosting service model, the client retains ownership of the data, the OS software, and the apps. Since the environment is virtualized, it can be moved easily to a different hardware environment without a time-consuming and difficult reinstallation procedure. With ProSight Virtual Hosting, your business is not tied a single hosting provider. Learn more about ProSight Virtual Hosting services.

ProSight IT Asset Management: IT Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, maintain, retrieve and protect data related to your IT infrastructure, procedures, applications, and services. You can quickly find passwords or serial numbers and be alerted about impending expirations of SSLs or warranties. By updating and managing your IT documentation, you can save up to half of time thrown away trying to find critical information about your IT network. ProSight IT Asset Management features a centralized repository for holding and sharing all documents related to managing your business network like recommended procedures and self-service instructions. ProSight IT Asset Management also offers advanced automation for collecting and relating IT information. Whether youíre planning enhancements, doing regular maintenance, or reacting to an emergency, ProSight IT Asset Management delivers the knowledge you require as soon as you need it. Learn more details about Progent's ProSight IT Asset Management service.

Certified Security Planning
Every business should develop a carefully thought out security strategy that incorporates both preventive procedures and response planning. The proactive plan is a set of steps designed to minimize vulnerabilities. The reactive plan assists your company's security engineers to evaluate the damage resulting from an attack, fix the damage, record the experience, and get business functions running as quickly as feasible.

Progent's expert IT security engineers are available to help your company to run a comprehensive risk evaluation and create a network security strategy to establish security policies and mechanisms to minimize ongoing attacks and dangers.

CISM Certified Network Security Consulting Expertise
The CISM committee defines the core capabilities and international standards of performance that IT security professionals are expected to master. CISM provides executive management the confidence that consultants who have qualified for their CISM certification have the background and capability to deliver effective security management and consulting services. Progent offers the support of CISM certified security consultants to assist companies with:

  • Information Security Processes
  • Risk Management
  • Network Security Implementation Management
  • Information Security Administration
  • Recovery Planning
Learn additional details about Progent's CISM Certified Network Security Consulting Expertise.

CISSP Certified Security Engineering Assistance
CISSP certification recognizes mastery of a global standard for data security. ANSI has granted the CISSP credential recognition in the field of data protection defined by ISO 17024. Progent offers the services of security experts who have earned CISSP accreditation. Progent can provide a CISSP-certified expert to help your business in a variety security fields such as:

  • Security Administration Practices
  • Security Infrastructure and Models
  • Access Control Systems and Processes
  • Software Development Security
  • Operations Security
  • Physical Security
  • Data Encryption Technology
  • Telecommunications, LAN and Internet Security
  • Disaster Recovery Planning
Learn more information concerning Progent's CISSP Accredited Network Security Consulting Professionals.

ISSAP Certified Secure Network Architecture Engineering Services
Progent's ISSAP qualified system architecture engineers are consultants who have earned ISSAP Certification as a result of thorough testing and extensive experience with information security design. The Information System Security Architecture Professional (ISSAP) credential indicates demonstrated competence in the more challenging requirements of information security architecture within the broader field of information security knowledge required for CISSP certification. Progent's ISSAP-qualified security specialists can assist your business with all aspects of secure network architecture including.

  • Access Control Mechanisms and Techniques
  • Phone System and System Infrastructure Security
  • Data Encryption Solutions
  • Requirements Analysis and Security Standards
  • Business Continuity Planning (BCP) and DRP
  • Hardware Security
Read more details about Progent's ISSAP Accredited Secure System Architecture Engineering Professionals.

CISA Accredited Security Auditing Consulting Expertise
The Certified Information Systems Auditor (CISA) accreditation is an important achievement that represents mastery in information system security audit and control. Certified by the American National Standards Institute (ANSI), the CISA accreditation has consultants undergo a comprehensive examination given by the ISACA professional association. Progent's CISA-certified network security audit engineers can assist your IT organization in the areas of:

  • Information Systems Audit Services
  • Information Technology Enforcement
  • Systems and Infrastructure Lifecycle Planning
  • Information Technology Service Delivery
  • Protecting Data Assets
  • Disaster Recovery Preparedness
Read additional details concerning Progent's CISA Accredited Network Security Auditing Engineering Expertise.

Certified in Risk and Information Systems Control (CRISC) Experts
The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA to verify a consultant's skills to plan, deploy, and support information system control mechanisms to mitigate risk. Progent can provide the expertise of a CRISC-certified engineer to assist your company to create and carry out a workplace continuity or disaster recovery plan that follows industry best practices promoted by CRISC and geared to align with your organization's risk tolerance, business objectives, and budgetary guidelines. Progent's CRISC IT risk mitigation consultants can provide a variety of risk assessment services such as:

  • Collect information and review documentation to evaluate major vulnerabilities
  • Identify legal, industry, and business mandates and organizational policies associated with your information system to determine their potential impact on your strategic goals
  • Point out possible vulnerabilities for your business workflows to help in evaluating your enterprise risk
  • Develop a risk awareness initiative and provide training to ensure your organization appreciate IS risk so they can assist with your risk control process
  • Match key risk vectors to related business processes to help assign risk ownership
  • Determine risk appetite with executive management and key stakeholders to ensure they match
Read more details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Experts.

GIAC Qualified Network Security Consulting Assistance
GIAC (Global Information Assurance Certification) was founded in 1999 to certify the skill of computer security experts. GIAC's mission is to verify that an accredited professional has the skills necessary to provide services in key areas of network, data, and application security. GIAC certifications are acknowledged by businesses and government organizations all over the world including and the U.S. NSA. Progent's GIAC-qualified information security audit specialists can assist your company in the areas of:

  • Assessing Networks
  • Incident Handling
  • Intrusion Detection
  • Web Services Security
  • SIEM solutions
Read additional information about Progent's GIAC Information Assurance Services.

Talk to a Security Specialist
To learn how you can get in touch with a certified Progent security engineer for online or on-premises help in Michigan, phone 1-800-993-9400 or visit Remote Computer Support.

© 2002- 2018 Progent Corporation. All rights reserved.