Small business computer networks in the state ofMichigancan have quick and affordable online access to Progent's qualified security engineers to help with critical security issues. Rates are affordable, billing is per minute, engagement is quick, and service is world class. Progent also offers help for long-term engagements that requires the services of seasoned security engineers with high-level security credentials.
In case yourMichiganoffice is situated away from more populated metropolitan neighborhoods such asDetroit, Grand Rapids, Warren, Sterling Heights, Flint, Lansing, or Ann Arbor, access to nearby qualified security experts is often problematic when there's a security disaster. This could mean lost revenue for your company, angry clients, unproductive workers, and distracted management. By utilizing Progent's remote support, you have access to a Certified security engineer ready to deliver help whenever you have to have it to keep your computer network running and restore your data.
Progent can help you in a variety of ways in your initiatives to guard your network with support that ranges from security audits to creating a comprehensive security plan. Progent offers affordable support to help businesses of all sizes to design and maintain protected IT environments based on Microsoft Windows and Cisco products and that can include computers based on UNIX, Linux, Sun Solaris, or Mac OS X operating systems plus mobile users with Apple iPhones and iPads or Google Android or Windows Phone handsets.
Progent can also help you outsource spam blocking and defense against e-mail-based attacks. Email Guard is Progent's email security platform that uses the services and infrastructure of leading information security companies to deliver web-based control and world-class protection for your email traffic. The powerful structure of Progent's Email Guard integrates a Cloud Protection Layer with a local security gateway appliance to offer advanced defense against spam, viruses, Denial of Service Attacks, DHAs, and other email-borne threats. ProSight Email Guard's Cloud Protection Layer serves as a first line of defense and blocks the vast majority of threats from reaching your security perimeter. This decreases your vulnerability to external threats and conserves network bandwidth and storage. ProSight Email Guard's on-premises gateway appliance provides a further level of analysis for incoming email. For outgoing email, the local security gateway provides anti-virus and anti-spam protection, DLP, and email encryption. The on-premises security gateway can also help Microsoft Exchange Server to track and protect internal email that originates and ends inside your security perimeter.
Progent's security experts are available remotely or on premises to provide a range of urgent or project-based IT security services such as:
If your network has an urgent need for IT security help, refer to Progent's Urgent Online Technical Support.
- Run comprehensive network security evaluations
- Clean up rapidly after serious security breaches
- Set up hardware and software firewalls
- Implement safe solutions for offsite and mobile access
- Deploy effective software for automatic defense against spam and directory harvest attacks
- Develop a comprehensive security strategy with 24x7 network monitoring
- Offer comprehensive Call Center Services
- Help Develop an effective data backup and recovery solution built around Data Protection Manager (DPM) backup technology
Progent's support professionals can deliver advanced services in vital areas of system security that include security evaluation, firewall and VPN expertise, and advanced security planning.
System Security Assessment
Progent's expert security consultants can assess the strength of your current network security systems through exhaustive remote automated analysis based on sophisticated utilities and proven procedures. Progent's skill in administering this testing saves you money and offers an objective portrayal of system vulnerability. The information your company is provided can form the foundation of a security plan that can allow your network to operate dependably and react rapidly to future risks.
Automated Vulnerability Assessment
Progent provides expertise in the use of security auditing utilities such as MBSA and LANguard from GFI for economically performing a set of automatic network auditing checks to uncover possible security problems. Progent has broad experience with other network auditing tools such as NMAP Port Scanner, AMAP, eEye Vulnerability Scanner, as well as tools like SolarWinds, Hydra, and Nikto. Progent can show you how to make sense of audit reports and respond effectively.
Progent can help you design security into your business operations, install auditing tools, plan and implement a protected system architecture, and recommend policies to maximize the safety of your network. Progent's security professionals are ready to assist you to configure a firewall, implement safe remote access to email and data, and integrate VPN. Learn additional information concerning Progent's automated security assessment.
Security Inventory Scanning Bundles for Small Companies
Progent offers two low-cost security inventory packages designed to allow small companies to receive an impartial network security evaluation from a qualified security engineer. With Progent's External Network Security Inventory Checkup, an engineer runs an extensive test of your network from outside your company firewall to determine potential risks in the security posture you expose to the public. With Progent's Internal Security Inventory Scan, an engineer runs a network scan from a secure machine inside your company firewall to uncover the risk to internal attacks. The two security inventory packages are set up and executed from a protected external location. The project is overseen by a consultant with top security accreditations and who generates a report that summarizes and interprets the information collected by the security scan and proposes cost-effective remediation where called for.
Network Intrusion Analysis Consulting
Stealth penetration testing is an important component of any successful network security plan. Progentís security experts can run extensive intrusion checks without the awareness of your organization's internal network support resources. Unannounced penetration checking shows whether current security defense tools such as intrusion detection alerts and event history monitoring are properly set up and consistently checked. Learn more on Progent's network security penetration analysis consulting.
Progent's expertise in network security technology encompasses in-depth field work with major firewalls and VPN products from a variety of vendors such as Cisco, Microsoft, and Symantec. Progent offers the services of consultants who have earned important networking accreditations including Cisco Certified Internetwork Expert (CCIE) and Microsoft MCSE.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Firewalls Configuration and Debugging
The new Cisco ASA 5500-X Family Next-Generation Firewalls with Firepower Services provide substantially more value than Cisco's legacy firewalls and have superseded the ASA 5500 and PIX 500 security appliances for all new deployments. Following Cisco's acquisition of Sourcefire, the whole line of Cisco ASA 5500-X firewalls can be provisioned to enable Firepower Services, built on Sourcefire's Snort technology, which is the world's most popular network intrusion protection system (IPS). Firepower services provide powerful new features including advanced malware protection (AMP), URL filtering, real-time threat analytics, and security automation. Progent's Cisco-premier CCIE network consultants can help your company to maintain your current PIX or ASA 5500 security appliances or migrate to ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide remote and onsite help with ASA 5500-X firewalls with Firepower Services and can help you to design, deploy, tune, administer and troubleshoot firewall environments based on Cisco ASA 5500-X firewalls with Firepower Services. Learn more details about ASA Firewalls with Firepower configuration and debugging support.
Cisco Network Security and Virtual Private Network Engineering Expertise
Cisco's security and offsite access technology represent a full line of easy-to-administer security solutions to help safeguard your wired and wireless network infrastructure. Cisco's VPN line includes switches, firewalls, intrusion detection devices and Virtual Private Network appliances. Progent's expert staff of consultants includes experienced engineers with Cisco's CCIE and Cisco Certified Network Professional qualifications who are able to help your company to evaluate Cisco VPN, Cisco RADIUS Security, and additional Cisco security solutions that fit best with your company goals. Find out more information concerning Progent's Engineering Expertise for Cisco Security and VPN Products.
Engineering Services for Other Firewall and Virtual Private Network Products
Progent provides small and mid-size organizations expert consulting for Intrusion Protection Systems and IPsec VPN solutions from leading firewall and VPN security companies such as Check Point Software, Juniper, and Symantec. Progent can help you create a comprehensive security strategy and choose appropriate products from a variety of suppliers to achieve your security goals while staying within your budget limits.
Progent's Fixed-price Managed Services for Information Security
Progent's affordable ProSight portfolio of outsourced network management services is designed to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all facets of information assurance and compliance. Managed services available from Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring is an endpoint protection service that utilizes next generation behavior analysis technology to defend endpoint devices as well as physical and virtual servers against new malware assaults like ransomware and email phishing, which easily get by traditional signature-based AV products. ProSight ASM safeguards local and cloud-based resources and provides a unified platform to address the entire threat lifecycle including blocking, detection, mitigation, cleanup, and forensics. Top features include one-click rollback using Windows VSS and automatic system-wide immunization against newly discovered threats. Learn more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense.
ProSight Enhanced Security Protection (ESP): Unified Endpoint Security
Progent's ProSight Enhanced Security Protection services deliver ultra-affordable in-depth security for physical and virtual servers, desktops, smartphones, and Exchange Server. ProSight ESP uses contextual security and modern behavior analysis for round-the-clock monitoring and reacting to cyber assaults from all vectors. ProSight ESP offers two-way firewall protection, penetration alerts, device control, and web filtering through cutting-edge technologies packaged within one agent managed from a single console. Progent's data protection and virtualization consultants can help your business to design and configure a ProSight ESP deployment that meets your organization's unique needs and that helps you achieve and demonstrate compliance with government and industry data protection regulations. Progent will help you define and configure security policies that ProSight ESP will enforce, and Progent will monitor your network and react to alerts that call for urgent action. Progent can also assist your company to set up and verify a backup and restore system like ProSight Data Protection Services (DPS) so you can get back in business quickly from a potentially disastrous cyber attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint security and Exchange email filtering.
ProSight Data Protection Services: Managed Cloud Backup and Recovery
ProSight Data Protection Services provide small and mid-sized organizations an affordable and fully managed solution for reliable backup/disaster recovery (BDR). Available at a low monthly rate, ProSight Data Protection Services automates and monitors your backup processes and enables rapid restoration of critical data, applications and virtual machines that have become lost or corrupted due to hardware breakdowns, software bugs, natural disasters, human error, or malware attacks such as ransomware. ProSight Data Protection Services can help you protect, recover and restore files, folders, applications, system images, plus Microsoft Hyper-V and VMware images/. Critical data can be protected on the cloud, to an on-promises device, or mirrored to both. Progent's BDR consultants can provide world-class expertise to set up ProSight Data Protection Services to be compliant with regulatory standards like HIPAA, FINRA, PCI and Safe Harbor and, when necessary, can assist you to recover your business-critical data. Read more about ProSight DPS Managed Backup and Recovery.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering and email encryption service that uses the technology of leading data security companies to provide centralized control and world-class security for your inbound and outbound email. The hybrid structure of Email Guard integrates cloud-based filtering with an on-premises gateway device to provide advanced protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. Email Guard's cloud filter acts as a first line of defense and blocks most unwanted email from reaching your network firewall. This reduces your vulnerability to external attacks and conserves system bandwidth and storage. Email Guard's onsite security gateway appliance adds a further level of inspection for inbound email. For outgoing email, the local security gateway provides anti-virus and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The on-premises security gateway can also help Microsoft Exchange Server to track and protect internal email traffic that originates and ends inside your corporate firewall. For more information, visit ProSight Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted VMs at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small organization can have its critical servers and apps hosted in a protected fault tolerant data center on a high-performance virtual machine host configured and managed by Progent's IT support professionals. Under Progent's ProSight Virtual Hosting service model, the customer retains ownership of the data, the operating system software, and the apps. Since the environment is virtualized, it can be ported immediately to a different hosting solution without a lengthy and difficult configuration procedure. With ProSight Virtual Hosting, your business is not locked into one hosting provider. Learn more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to create, maintain, retrieve and protect information about your IT infrastructure, processes, business apps, and services. You can instantly find passwords or IP addresses and be alerted about upcoming expirations of SSLs or warranties. By cleaning up and organizing your network documentation, you can save as much as 50% of time spent searching for vital information about your IT network. ProSight IT Asset Management features a common repository for holding and collaborating on all documents related to managing your network infrastructure like recommended procedures and How-To's. ProSight IT Asset Management also supports a high level of automation for gathering and associating IT information. Whether youíre making enhancements, performing maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the information you require the instant you need it. Learn more about Progent's ProSight IT Asset Management service.
Certified Network Security Planning
Any company ought to develop a carefully thought out security strategy that incorporates both pre-attack processes and response planning. The pre-attack plan is a collection of mechanisms intended to minimize vulnerabilities. The post-attack strategy helps your company's security personnel to assess the damage resulting from a security penetration, repair the damage, document the experience, and get business functions restored as rapidly as possible.
Progent's certified information security engineers are available to assist your business to perform a comprehensive vulnerability evaluation and define a network security strategy to establish security policies and mechanisms to reduce ongoing attacks and dangers.
CISM Accredited Security Consulting Services
The Certified Information Security Manager (CISM) committee describes the core competencies and worldwide standards of performance that IT security professionals are required to master. It provides business management the confidence that consultants who have earned their CISM certification possess the background and capability to deliver effective security management and support consulting. Progent offers the services of CISM Premier security professionals to help companies with:
Read more details concerning Progent's CISM Accredited IS Security Engineering Expertise.
- Information Security Strategies
- Risk Analysis
- Network Security Program Management
- Information Security Management
- Response Planning
CISSP Certified Security Consulting Assistance
CISSP certification denotes expertise with a worldwide standard for information security. ANSI (American National Standards Institute) has granted certification recognition in the field of information protection defined by ISO 17024. Progent can provide the services of security professionals who have earned CISSP accreditation. Progent can give you access to a CISSP-certified professional to help your company in a broad range of security areas such as:
Find out more details about Progent's CISSP Qualified Network Security Consulting Services.
- Security Administration Practices
- Security Infrastructure and Paradigms
- Access Control Systems and Processes
- Applications Development Security
- Operations Security
- Physical Security
- Encryption/Decryption Technology
- Telecommunications, Network and WAN Security
- Disaster Recovery Planning
CISSP-ISSAP Certified Secure System Architecture Consulting Expertise
Progent's CISSP-ISSAP Certified IT architecture engineers are experts who have earned ISSAP status as a result of thorough examination and extensive work with information security design. The Information System Security Architecture Professional (ISSAP) certification represents proven competence in the most challenging demands of information security architecture within the broader field of information security knowledge needed for CISSP certification. Progent's ISSAP-premier security specialists can assist your business with all aspects of secure network architecture including.
Learn additional information concerning Progent's ISSAP Qualified Secure IT Architecture Consulting Expertise.
- Access Management Mechanisms and Techniques
- Telecom and System Infrastructure Security
- Data Encryption Solutions
- Requirements Analysis and Security Criteria
- Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)
- Physical Security
CISA Accredited Network Security Auditing Engineering Support
The Certified Information Systems Auditor accreditation is a globally recognized achievement that indicates mastery in information system security auditing. Certified by the American National Standards Institute, the CISA credential requires that candidates undergo a comprehensive test given by the ISACA professional group. Progent's CISA-certified IS security audit specialists are available to assist your business in the areas of:
Find out the details concerning Progent's CISA Accredited IS Security Auditing Engineering Services.
- IS Audit Services
- Information Technology Enforcement
- Network Assets and Architecture Lifecycle Planning
- IT Service Delivery
- Safeguarding Data Resources
- Business Continuity Preparedness
The CRISC certification program was initiated by ISACA to verify a consultant's skills to plan, implement, and maintain IS control mechanisms to mitigate risk. Progent offers the expertise of a CRISC-certified consultant to assist your company to create and execute a business continuity strategy based on industry best practices identified by CRISC and geared to align with your organization's risk appetite, business goals, and budgetary guidelines. Progent's CRISC-qualified IT risk management experts offer a variety of risk identification services such as:
Learn more details concerning Progent's Certified in Risk and Information Systems Control (CRISC) Experts.
- Collect information and study documentation to help identify significant vulnerabilities
- Identify legal, regulatory, and contractual mandates and company standards associated with your information system to assess their possible influence on your strategic objectives
- Identify possible threats for your operational workflows to assist in analyzing your corporate risk
- Develop a risk awareness initiative and provide training to ensure your stakeholders appreciate information system risk so they can assist with your risk control process
- Connect key risk scenarios to your associated business procedures to help determine risk ownership
- Validate risk tolerance with your senior management and key stakeholders to ensure they align
GIAC Accredited Information System Security Consulting Expertise
Global Information Assurance Certification was established in 1999 to validate the skill of information technology security experts. GIAC's mission is to assure that an accredited professional possesses the knowledge needed to deliver support in vital areas of system, information, and application program security. GIAC accreditations are recognized by companies and institutions throughout the world including and the United States National Security Agency (NSA). Progent's GIAC IS security audit consultants can help your IT organization in the areas of:
Read additional details concerning Progent's GIAC Information Assurance Support.
- Auditing IT Infrastructure
- Security Incident Handling
- Traffic Analysis
- Web-based Services Security
- SIEM solutions
Talk to a Certified Progent Security Expert
To see how you can access a Progent security consultant for online or onsite help in Michigan, call 1-800-993-9400 or visit Online Network Support.