For fast online help with computer security issues, businesses in Grand Rapids, MI, have access to world-class expertise from Progent's certified security engineers. Progent's remote support consultants are available to provide efficient and economical assistance with security issues that are impacting the viability of your information system. Progent's accredited security consultants are certified to support environments powered by Windows, Linux, Apple macOS and OS X, Solaris, and major derivatives of UNIX. Progent's wide array of services covers firewall technology, email filtering and encryption, protected network infrastructure, and disaster recovery preparedness. Progent's technical support staff has earned the world's most advanced security accreditations including Certified Information Security Manager (CISM) and Certified Information Systems Security Professional (CISSP).
Progent provides remote security support services on a per-minute model with no minimum times and without additional charges for setup or after hours service. By billing by the minute and by delivering top-level support, Progent's pricing policy keeps expenses low and avoids situations where simple fixes turn into big bills.
We've Been Attacked: What Can We Do Now?
In case your business is currently faced with a security emergency, refer to Progent's Emergency Remote Technical Help to see how to receive immediate aid. Progent has a team of veteran network security specialists who can provide online and on-premises assistance that includes containment, mitigation, recovery, forensics, and enhancement of your security profile to protect against future exploits.
For businesses that have planned in advance for an attack, the step-by-step incident response procedure outlined by GIAC (Global Information Assurance Certification) is Progent's approved method of handling a serious security attack.
Overview of Security Support Services
Coordinating data security and preparation for recovering vital information and systems following an attack requires an on-going process involving a variety of technologies and procedures. Progent's certified consultants can assist your organization at any level in your efforts to protect your information system, from security assessments to designing a complete security strategy. Some areas covered by Progent's security consultants include Security Planning and Prevention, Data Restoration and Security Failure Analysis, and Outsourced Filtering of E-mail-Borne Spam and Viruses.
Planning and Building Secure Networks
Any organization ought to have a carefully thought out security plan that includes both preventive and reactive steps. The proactive strategy is a set of precautions that helps to reduce vulnerabilities. The post-attack plan defines procedures to help security staff to evaluate the damage resulting from an attack, repair the damage, record the experience, and revive network activity as soon as feasible. Progent can advise you how to design protection into your business processes. Progent can configure auditing utilities, define and implement a safe IT architecture, and propose processes and policies to optimize the safety of your computing environment. Progent's security experts are ready to help you to configure a firewall, design secure online and mobile connectivity to e-mail and information, and configure an efficient VPN.
If your company is looking for an affordable way for outsourcing your security administration, Progent's Round-the-clock Monitoring Options feature automated remote network tracking and fast resolution of problems.
Hybrid Cloud Solutions
Progent can help your company you to plan, implement, administer and troubleshoot enterprise hybrid cloud solutions that incorporate physical and cloud-based infrastructure and that comply with government and industry data security requirements. (Learn about Progent's Office 365 Exchange Online integration solutions with on-premises Exchange, Azure enterprise hybrid cloud integration and Progent's Amazon Web Services (AWS) enterprise hybrid cloud solutions.)
System Restoration and Security Forensics
Progent provides skill in recovering networks and servers that have been hacked, are in question, or have failed as a result of a security penetration. Progent can show you how to evaluate the losses caused by the attack, return your company to normal functions, and recover information compromised owing to the breach. Progent's certified specialists can also manage a thorough failure analysis by going over activity logs and using other proven assessment techniques. Progent's experience with security problems reduces your downtime and permits Progent to propose effective strategies to avoid or mitigate new attacks.
Ransomware Cleanup and Recovery Services
Progent can provide the services of seasoned ransomware recovery consultants with the skills to reconstruct an environment damaged by a ransomware cryptoworm like Ryuk, WannaCry, Hermes, or MongoLock. To learn more, visit ransomware cleanup and recovery consulting.
Progent's Fixed-price Managed Services for Information Security
Progent's value-priced ProSight series of network management outsourcing services is intended to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. Managed services available from Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring is an endpoint protection solution that utilizes cutting edge behavior-based analysis tools to guard endpoints as well as servers and VMs against new malware assaults such as ransomware and email phishing, which routinely escape traditional signature-based anti-virus tools. ProSight ASM safeguards on-premises and cloud resources and offers a single platform to manage the entire malware attack lifecycle including filtering, infiltration detection, mitigation, cleanup, and forensics. Key features include single-click rollback using Windows Volume Shadow Copy Service (VSS) and automatic network-wide immunization against newly discovered attacks. Read more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware defense.
ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Security
Progent's ProSight Enhanced Security Protection (ESP) managed services deliver economical multi-layer protection for physical servers and VMs, desktops, mobile devices, and Exchange email. ProSight ESP uses adaptive security and advanced machine learning for continuously monitoring and reacting to security assaults from all attack vectors. ProSight ESP offers two-way firewall protection, intrusion alarms, endpoint management, and web filtering via cutting-edge technologies packaged within a single agent accessible from a single control. Progent's security and virtualization experts can assist you to design and implement a ProSight ESP environment that meets your company's unique needs and that helps you achieve and demonstrate compliance with government and industry information security regulations. Progent will help you specify and implement policies that ProSight ESP will enforce, and Progent will monitor your IT environment and react to alarms that require urgent attention. Progent's consultants can also help your company to set up and test a backup and restore system like ProSight Data Protection Services (DPS) so you can get back in business quickly from a potentially disastrous security attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection unified endpoint security and Exchange email filtering.
ProSight DPS: Managed Cloud Backup and Recovery
ProSight Data Protection Services from Progent provide small and medium-sized organizations a low cost and fully managed solution for reliable backup/disaster recovery. For a low monthly price, ProSight DPS automates your backup activities and enables rapid restoration of critical files, applications and VMs that have become lost or damaged due to hardware breakdowns, software bugs, disasters, human error, or malware attacks such as ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, applications, system images, plus Hyper-V and VMware virtual machine images. Important data can be backed up on the cloud, to an on-promises device, or to both. Progent's backup and recovery specialists can deliver world-class expertise to set up ProSight Data Protection Services to to comply with government and industry regulatory standards such as HIPPA, FIRPA, and PCI and, when needed, can assist you to restore your critical data. Learn more about ProSight Data Protection Services Managed Cloud Backup.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering service that incorporates the technology of top data security vendors to provide web-based management and world-class security for your inbound and outbound email. The powerful architecture of Email Guard managed service integrates cloud-based filtering with an on-premises security gateway device to offer advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-borne malware. Email Guard's cloud filter serves as a preliminary barricade and blocks the vast majority of threats from reaching your security perimeter. This decreases your vulnerability to inbound threats and saves system bandwidth and storage space. Email Guard's on-premises security gateway device adds a deeper level of inspection for incoming email. For outgoing email, the on-premises gateway offers AV and anti-spam filtering, DLP, and email encryption. The on-premises gateway can also help Exchange Server to monitor and protect internal email that originates and ends inside your security perimeter. For more information, visit Email Guard spam and content filtering.
ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small organization can have its key servers and apps hosted in a secure fault tolerant data center on a fast virtual host configured and maintained by Progent's network support experts. With the ProSight Virtual Hosting model, the customer owns the data, the OS platforms, and the applications. Since the environment is virtualized, it can be ported easily to an alternate hardware solution without requiring a lengthy and difficult configuration procedure. With ProSight Virtual Hosting, you are not locked into a single hosting service. Find out more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to capture, update, find and safeguard data related to your IT infrastructure, processes, business apps, and services. You can instantly locate passwords or IP addresses and be warned automatically about impending expirations of SSL certificates ,domains or warranties. By updating and organizing your IT infrastructure documentation, you can save as much as half of time thrown away searching for critical information about your network. ProSight IT Asset Management includes a common repository for holding and sharing all documents required for managing your business network like standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also offers a high level of automation for collecting and associating IT data. Whether youíre planning improvements, performing regular maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the information you require the instant you need it. Find out more details about ProSight IT Asset Management service.
Specialized Security Expertise Available from Progent
Progent's veteran consultants offer world-class specialized help in vital areas of computer protection such as:
Information Risk Evaluation and Security Compliance Assessment
Progent provides expertise with security auditing utilities like Microsoft Baseline Security Analyzer or LANguard from GFI for conducting a set of automatic network scans to reveal possible security problems. Progent has extensive experience with these and similar utilities and can assist your company to understand audit results and react efficiently. Progent's security engineers also offer web application testing and can perform thorough evaluation of corporate-wide security to determine your organization's compliance with major worldwide security specifications such as HIPAA, NIST, and ISO. Also, Progent can assess the strength of your wireless protection covering stationary wireless equipment plus portable handsets. Learn more information about Progent's Information Risk Audits and Security Compliance Testing.
Cisco Network Security, PIX Firewall and ASA Firewall, VPN, Aironet and Meraki Wireless Consulting
Progent's Cisco CCIE engineers and Cisco Certified Network Professionals can provide world-class consulting expertise for Cisco's entire family of protection and Virtual Private Network (VPN) products such as PIX Series Firewalls and ASA Series Firewalls, Catalyst Firewall Services Module, protected high-speed and integrated services routers, Aironet wireless access points, Cisco Meraki cloud-managed access points, and Catalyst switches. Get more information concerning Cisco Security, Virtual Private Network (VPN) and Aironet Wireless Expertise.
Other Firewall and Virtual Private Network (VPN) Technologies
Stealth Intrusion Testing Services
In addition to supporting a broad range of protection technologies available from Microsoft and Cisco, Progent offers businesses of all sizes expert support for products from other popular firewall and Virtual Private Network (VPN) vendors. Progent's engineers can provide:
Stealth intrusion checking is a key method for allowing companies to understand how exposed their networks are to real-world attacks by testing how well network protection procedures and technologies hold up against authorized but unpublicized penetration efforts instigated by veteran security specialists using advanced intrusion methods. Learn more information about Progent's Penetration Testing Services.
CISM Security Consulting Services
Certified Information Security Manager defines the core competencies and international standards of performance that IT security managers are required to achieve. CISM provides executive management the assurance that consultants who have been awarded their certification possess the background and skill to provide efficient security management and consulting services. Progent can provide a CISM-certified support professional to help your enterprise in key security disciplines such as information security governance, risk management, information protection process control, and crisis response management.
Get additional information about Progent's Certified Information Security Manager (CISM) Security Consulting Services.
Certified Information Systems Security Professionals (CISSP) Security Support Services
Progent's CISSP experts are security engineers who have earned CISSP status through demonstrated experience, rigorous study, and formal testing. CISSP Certification indicates mastery of a worldwide standard for IT security. American National Standards Institute has given the CISSP credential official recognition in the field of IT security under ISO/IEC 17024. Areas of expertise covered under CISSP include security management procedures, security design and test systems, connection permission systems, software development security, operations security, hardware security, encryption, communications, Internet security, and business continuity planning.
Read additional information concerning Progent's Certified Information Systems Security Professionals (CISSP) Consulting Services.
CISSP-ISSAP Premier Experts for Secure System Infrastructure
Progent's ISSAP Premier security consultants have earned ISSAP accreditation as a result of thorough testing and substantial hands-on work with information security architecture. ISSAP consultants possess in-depth knowledge of access control mechanisms and techniques, phone system and network security, cryptography, requirements analysis, business continuity planning (BCP) and disaster recovery planning (DRP), and physical security. Progent's ISSAP-premier security specialists can assist your company with all aspects of secure network architecture.
Read additional information about Progent's ISSAP Accredited Protected Network Infrastructure Consulting Support.
CISSP-ISSEP Premier Cybersecurity Engineering Experts
Network Security consultants with CISSP-ISSEP (Information Systems Security Engineering Professional) certification have proven their ability to provide large organizations with the expertise expected of a senior systems engineer, information assurance systems engineer, information assurance officer, information assurance analyst, or senior cybersecurity analyst. Progent offers the skills of a certified CISSP-ISSEP cybersecurity consultant to assist your enterprise to utilize current system security engineering theory and processes in system development, review and evaluate system security designs according to security engineering leading practices, create cohesive system designs that include compliant cybersecurity mechanisms for all key system functions, define effective configuration strategies to provide operational security, perform in-depth risk analysis, and propose practical security solutions that balance your operational requirements with your organization's tolerance for risk.
Find out more about Progent's CISSP-ISSEP Cybersecurity Engineering Consulting Services.
Certified Information Systems Auditor Consulting Expertise
The Certified Information Systems Auditor credential is an important qualification that represents mastery in IS security audit and control. Accredited by the American National Standards Institute (ANSI), the CISA accreditation has candidates pass an extensive test administered by the ISACA international professional association. Progent offers the services of a CISA-Premier security audit consultant able to assist businesses in the fields of information systems audit services, IT administration, systems and architecture planned useful life, information technology support, protecting information assets, and business continuity preparedness.
Find out more details about Progent's Certified Information Systems Auditor Professional Services.
CRISC-certified Network Risk Mitigation Specialists
The Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA to validate a consultant's skills to plan, deploy, and maintain information system control mechanisms to reduce network risk. Progent offers the services of a CRISC-certified consultant to assist you to create and execute a workplace continuity strategy based on leading practices identified by CRISC and crafted to align with your organization's risk appetite, business goals, and IT budget. Progent's network risk mitigation expertise is a good fit the support provided by Progent's CISA-Certified security engineers for objectively assessing your IT control mechanisms and with the expertise of Progent's CISM-certified support professionals for implementing security policies and procedures.
Learn the details concerning Progent's CRISC-certified IT Risk Management Services.
Global Information Assurance Certification Support Expertise
Global Information Assurance Certification was established in 1999 to certify the skill of computer security engineers. GIAC's goal is to verify that an accredited professional has the knowledge necessary to deliver services in important categories of network, data, and application software security. GIAC accreditations are acknowledged by companies and government organizations throughout the world including U.S. NSA. Progent can provide the help of GIAC certified security engineers for all of the network security capabilities addressed under GIAC accreditation topics such as assessing perimeters, incident response, intrusion detection, web services security, and security information and event management (SIEM) solutions.
Find out more information concerning Progent's GIAC Information Assurance Expertise.
Contact Progent for Computer Security Expertise
If your business is located in Grand Rapids or anywhere in Michigan and you need cybersecurity support services, telephone Progent at 800-993-9400 or refer to Contact Progent.