Business computer networks in the state of Michigan can have fast and economical online technical support from Progent's certified security experts to fix complex security issues. Rates are competitive, charges are per minute, sign-up is immediate, and service is unbeatable. Progent also provides help for long-term engagements that demand the services of seasoned security consultants with high-level industry certifications.

In case your Michigan organization is situated some distance from major metropolitan neighborhoods like Detroit, Grand Rapids, Warren, Sterling Heights, Flint, Lansing, or Ann Arbor, access to nearby certified security engineers may be limited when there's a crisis. This could mean lost income for your company, upset customers, idle employees, and defocused executives. By utilizing Progent's remote support, you can get in touch with a qualified security professional ready to provide expertise when you need it to get your system operating and recover your information.

Progent can assist you in a variety of ways in your efforts to defend your network with support that ranges from security audits to developing a company-wide security strategy. Progent offers affordable service to help small and midsize companies to configure and maintain protected networks based on Microsoft Windows and Cisco technology and that may include computers based on UNIX, Linux, Sun Solaris, or Mac OS X operating systems plus mobile users with Apple iOS handhelds or Android or Windows Phone devices.

Progent can also show you how to outsource spam filtering and defense against e-mail-based attacks. Email Guard is Progent's email filtering and encryption solution that incorporates the technology of top information security vendors to provide centralized management and world-class security for all your inbound and outbound email. The hybrid architecture of Progent's Email Guard combines cloud-based filtering with an on-premises security gateway appliance to provide advanced protection against spam, viruses, Dos Attacks, DHAs, and other email-borne threats. ProSight Email Guard's Cloud Protection Layer serves as a first line of defense and keeps most threats from making it to your network firewall. This reduces your vulnerability to inbound attacks and conserves system bandwidth and storage space. ProSight Email Guard's on-premises gateway device provides a deeper level of analysis for incoming email. For outbound email, the on-premises security gateway offers anti-virus and anti-spam protection, policy-based Data Loss Prevention, and encryption. The on-premises gateway can also enable Exchange Server to track and safeguard internal email traffic that originates and ends within your security perimeter.

Progent's security consultants are accessible online or on site to offer a range of emergency or project-based computer security services such as:

If your company has an immediate requirement for computer security support, refer to Progent's Emergency Online Technical Help.

Progent's consultants offer advanced services in key fields of computer protection including analysis, firewall/VPN support, and high-level security consulting.

System Security Assessment
Progent's expert security engineers can assess the effectiveness of your current network security implementation by performing exhaustive remote automated analysis based on sophisticated utilities and tested techniques. Progent's experience in administering this service saves you money and assures an accurate picture of gaps. The knowledge your company is provided can be used as the basis of a security strategy that can allow your information system to operate safely and adapt rapidly to new risks.

Automated Network Security Analysis
Progent provides expertise in the application of security analysis products such as MBSA and LANguard from GFI for economically running a set of programmed network auditing checks to uncover possible security holes. Progent has extensive knowledge of additional network auditing products such as NMAP Port Scanner, AMAP Application Scanner, eEye, plus tools like Metasploit Framework, Hydra, and Nikto. Progent can show you how to understand testing reports and respond effectively.

Progent can show you how to build security into your business processes, install auditing applications, plan and deploy a secure system environment, and recommend policies to maximize the safety of your IT system. Progent's security engineers are able to assist you to set up a firewall, implement safe remote connectivity to email and business applications, and integrate VPN. Find out additional information on Progent's network security analysis.

Security Inventory Scanning Packages for Small Businesses
Progent has put together two low-cost security inventory and evaluation bundles designed to enable small companies to get an objective security evaluation from an accredited security specialist. With Progent's External Network Security Inventory Scan, an engineer runs an extensive examination of your network from beyond your firewalled perimeter to uncover potential weaknesses in the security profile you expose to the outside world. With Progent's Internal Network Security Inventory Scan, a certified security professional executes a network scan from a secure computer inside your company firewall to uncover the risk to inside attacks. The two security inventory packages are configured and run from a protected external site. The project is managed by an engineer who has earned top security credentials and who produces a document that details and interprets the data collected by the security scan and suggests practical improvements if appropriate.

Stealth Intrusion Testing Consulting
Stealth intrusion testing is a key part of any comprehensive IT system security plan. Progentís security professionals can perform extensive penetration tests without the knowledge of your company's in-house IT staff. Stealth penetration checking shows whether current security defense systems such as intrusion detection alerts and event log monitoring are properly configured and consistently monitored. Find out more on Progent's network security penetration analysis support services.

Firewalls and VPN Expertise
Progent's expertise in network security solutions includes in-depth familiarity with major firewalls and Virtual Private Network technology offered by multiple companies such as Cisco, Microsoft, and CheckPoint. Progent can provide the support of engineers who have earned important networking accreditations including Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer (MCSE).

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Firewalls Integration and Debugging
The latest generation of ASA 5500-X Family of firewalls with Firepower Services offer significantly more bang for the buck than Cisco's previous firewalls and have superseded the ASA 5500 and PIX firewalls for new deployments. Since Cisco's purchase of Sourcefire, the entire family of Cisco ASA 5500-X firewalls can be provisioned to support Firepower Services, based on Sourcefire's Snort product, which is the market's most popular network intrusion protection system. Firepower services bring enhanced features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-qualified CCIE network experts can help you to manage your existing PIX or ASA 5500 security appliances or upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite support for ASA 5500-X firewalls with Firepower Services and can assist you to plan, configure, optimize, administer and debug firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. See additional information about ASA 5500-X Firewalls with Firepower integration and troubleshooting support.

Cisco Security and VPN Engineering Services
Cisco's security and offsite access technology provide a complete range of manageable security solutions to help protect your local and remote network infrastructure. Cisco's VPN line includes switches, firewalls, intrusion detection devices and VPN appliances. Progent's professional consulting staff includes field-proven specialists with Cisco Certified Internetwork Expert and CCNP qualifications who can assist your organization to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security technologies that fit most closely with your business goals. Find out more information concerning Progent's Support Services for Cisco Security Technology and Virtual Private Network Appliances.

Consulting Services for Other Firewall and VPN Technology
Progent provides small and mid-size businesses expert support for Intrusion Protection products and IPsec VPN products from leading firewall and Virtual Private Network security companies including WatchGuard, Juniper, and SonicWALL. Progent can show you how to design a comprehensive security plan and select the right products from a variety of vendors to support your security goals while staying within your budget restraints.

Progent's Low-Cost Managed Services for Information Security
Progent offers a portfolio of affordable, set-price monthly managed services intended to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. Managed services available from Progent include:
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's email security platform that uses the technology of top information security companies to provide centralized control and comprehensive security for all your email traffic. The powerful structure of Progent's Email Guard managed service integrates cloud-based filtering with an on-premises gateway device to offer advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. The cloud filter acts as a first line of defense and keeps most unwanted email from reaching your security perimeter. This decreases your vulnerability to external threats and conserves network bandwidth and storage. ProSight Email Guard's onsite security gateway device provides a further level of inspection for inbound email. For outgoing email, the local security gateway provides AV and anti-spam filtering, protection against data leaks, and email encryption. The onsite gateway can also help Microsoft Exchange Server to track and safeguard internal email traffic that originates and ends within your corporate firewall. Learn more about Progent's ProSight Email Guard Spam Filtering, Virus Defense, Content Filtering and Data Leakage Protection.

ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that incorporates next generation behavior-based analysis tools to guard endpoints and physical and virtual servers against modern malware attacks such as ransomware and email phishing, which easily get by traditional signature-matching AV tools. ProSight Active Security Monitoring safeguards local and cloud-based resources and offers a unified platform to automate the complete malware attack progression including filtering, detection, mitigation, remediation, and forensics. Key capabilities include single-click rollback using Windows Volume Shadow Copy Service (VSS) and real-time network-wide immunization against newly discovered threats. Read more about Progent's ProSight Active Security Monitoring Next-Generation Endpoint Protection and Ransomware Recovery.

ProSight DPS: Managed Cloud Backup and Recovery
ProSight Data Protection Services offer small and medium-sized businesses an affordable and fully managed service for reliable backup/disaster recovery (BDR). Available at a fixed monthly price, ProSight Data Protection Services automates your backup processes and enables fast recovery of critical files, apps and virtual machines that have become lost or corrupted due to hardware failures, software bugs, disasters, human error, or malicious attacks such as ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, apps, system images, plus Microsoft Hyper-V and VMware virtual machine images. Important data can be protected on the cloud, to a local device, or to both. Progent's backup and recovery consultants can deliver advanced expertise to set up ProSight DPS to to comply with regulatory standards like HIPPA, FINRA, and PCI and, whenever necessary, can assist you to restore your business-critical data. Find out more about ProSight DPS Managed Cloud Backup.

Certified Network Security Consulting
Any business should have a thoroughly thought out security program that includes both pre-attack processes and response plans. The proactive plan is a collection of steps intended to reduce security weaknesses. The reactive strategy assists your security personnel to evaluate the impact resulting from a security penetration, fix the damage, document the event, and get business functions restored as quickly as feasible.

Progent's certified information security engineers can to assist you to perform a complete risk assessment and create a company-wide security strategy to implement security policies and controls to mitigate ongoing attacks and dangers.

CISM Qualified Security Support Expertise
The Certified Information Security Manager (CISM) committee describes the basic capabilities and international standards of performance that information security professionals are expected to learn. It gives executive management the assurance that those who have qualified for their CISM credential possess the background and capability to deliver efficient security management and support services. Progent can provide the support of CISM qualified security consultants to assist businesses with:

  • Information Security Processes
  • Risk Analysis
  • Information Security Program Management
  • IS Security Management
  • Response Management
Find out more information concerning Progent's CISM Certified Network Security Consulting Professionals.

CISSP Certified Security Consulting Support
CISSP certification recognizes mastery of a global standard for data security. The American National Standards Institute has granted certification accreditation in the field of data security defined by ISO 17024. Progent offers the services of security experts who have qualified for CISSP accreditation. Progent can provide a CISSP-certified professional to help your business in a broad range of security fields such as:

  • Security Management Procedures
  • Security Infrastructure and Paradigms
  • Access Management Solutions and Methodology
  • Software Development Security
  • Secure Operations
  • Physical Security
  • Encryption/Decryption Mechanisms
  • Telecommunications, Network and Internet Security
  • Disaster Recovery Planning
Read more information about Progent's CISSP Qualified Information Security Engineering Services.

ISSAP Accredited Secure System Architecture Engineering Support
Progent's ISSAP certified IT architecture professionals are consultants who have been awarded ISSAP Certification through rigorous testing and extensive experience with network security design. The Information System Security Architecture Professional (ISSAP) certification indicates proven skill in the most in-depth demands of information system security architecture bounded by the wider field of information system security knowledge needed for CISSP accreditation. Progent's ISSAP-qualified security consultants can help your company with all phases of secure network architecture including.

  • Access Management Mechanisms and Methodologies
  • Telecom and System Infrastructure Security
  • Encryption/Decryption Solutions
  • Needs Evaluation and Security Guidelines
  • Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)
  • Physical Security
Learn more information concerning Progent's ISSAP Qualified Secure IT Architecture Support Professionals.

CISA Qualified Security Auditing Consulting Assistance
The CISA accreditation is a prestigious achievement that signifies expertise in network security audit and control. Accredited by ANSI, the CISA credential requires that consultants undergo an extensive test given by the ISACA professional association. Progent's CISA-qualified IS security audit experts can help your IT organization with:

  • IS Audit Process
  • IT Enforcement
  • Systems and Infrastructure Lifecycle
  • Information Technology Support
  • Protecting Data Assets
  • Disaster Recovery Planning
Read more details about Progent's CISA Accredited IS Security Auditing Consulting Services.

Certified in Risk and Information Systems Control (CRISC) Consultants
The CRISC certification program was initiated by ISACA in 2010 to verify a consultant's skills to design, deploy, and maintain IS control mechanisms to reduce risk. Progent can provide the services of a CRISC-certified consultant to assist you to create and carry out a business continuity strategy that follows leading practices promoted by CRISC and crafted to match your company's risk tolerance, business goals, and IT budget. Progent's CRISC-qualified network risk management experts can provide a range of risk evaluation services such as:

  • Gather data and review documentation to evaluate significant vulnerabilities
  • Inventory legal, regulatory, and business requirements and organizational standards related to your network to assess their potential influence on your strategic objectives
  • Point out potential threats for your operational workflows to assist in evaluating your corporate risk
  • Create a risk awareness program and provide training to make sure your stakeholders understand information system risk so they can assist with your risk control process
  • Connect key risk scenarios to related business processes to help assign risk ownership
  • Determine risk appetite with your senior management and key stakeholders to ensure they are in agreement
Find out the details concerning Progent's CRISC Experts.

GIAC Qualified Information System Security Engineering Support
GIAC (Global Information Assurance Certification) was established in 1999 to certify the skill of information technology security engineers. GIAC's goal is to verify that an accredited professional has the skills necessary to deliver support in vital categories of network, information, and software security. GIAC certifications are acknowledged by companies and government organizations all over the world including and the United States NSA. Progent's GIAC security audit experts can help your IT organization in the areas of:

  • Auditing IT Infrastructure
  • Security Incident Response
  • Traffic Analysis
  • Web-based Application Security
  • SIEM solutions
Learn more details about Progent's GIAC Information Assurance Support.

Contact a Security Specialist
To find out how to contact a Progent security engineer for online or on-premises help in Michigan, phone 1-800-993-9400 or visit Remote Network Help.














© 2002- 2018 Progent Corporation. All rights reserved.