Company networks in the state of Michigan can depend on quick and affordable remote technical support from Progent's qualified network security experts to help with urgent security issues. Rates are affordable, charges are by the minute, engagement is quick, and support is world class. Progent also offers help for long-term projects that demand the services of senior security engineers with high-level security credentials.
In case your Michigan organization is outside of larger urban neighborhoods such as Detroit, Grand Rapids, Warren, Sterling Heights, Flint, Lansing, or Ann Arbor, access to nearby accredited network security consultants is often limited when there's an urgent situation. This could mean a loss of revenue for your company, angry clients, idle workers, and distracted management. By contacting Progent's remote support, you have access to a Certified security consultant ready to deliver help whenever you require it to keep your network running and recover your data.
Progent can help you in your initiatives to guard your IT environment with services that can range from network security audits to creating a company-wide security plan. Progent offers affordable support to assist businesses of all sizes to set up and maintain protected networks based on Windows and Cisco technology and that may include computers based on UNIX or Linux platforms plus mobile users with Apple iOS handhelds or Android or Windows Phone handsets.
Progent can also help you outsource spam filtering and defense against email-borne assaults. Email Guard is Progent's email security solution that incorporates the services and infrastructure of top data security vendors to provide web-based management and comprehensive protection for all your email traffic. The powerful architecture of Progent's Email Guard integrates a Cloud Protection Layer with an on-premises security gateway appliance to offer advanced protection against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. The Cloud Protection Layer acts as a first line of defense and blocks most threats from making it to your network firewall. This decreases your exposure to inbound threats and conserves network bandwidth and storage space. ProSight Email Guard's onsite security gateway device adds a deeper layer of analysis for incoming email. For outgoing email, the onsite security gateway provides AV and anti-spam protection, protection against data leaks, and email encryption. The onsite gateway can also help Microsoft Exchange Server to track and safeguard internal email traffic that stays inside your corporate firewall.
Progent's security consultants are accessible remotely or on site to provide a range of urgent or project-based IT security services including:
If your company has an urgent need for IT security support, refer to Progent's Emergency Remote Technical Support.
- Run extensive network security audits
- Clean up quickly after virus and worm attacks
- Install firewalls from multiple vendors
- Configure secure techniques for offsite and mobile connectivity
- Install advanced solutions for automatic defense against viruses, spam and DHAs
- Help create a comprehensive security plan with 24x7 security monitoring
- Provide outsourced Call Center Services
- Help Create an effective data backup and recovery plan built around Data Protection Manager (DPM) backup/restore capability
Progent's consultants offer world-class support in key areas of network protection including auditing, firewall/VPN support, and advanced security planning.
Progent's certified security engineers can evaluate the vulnerability of your existing network security environment through comprehensive remote automated analysis via sophisticated utilities and tested techniques. Progent's experience in this testing saves you consulting fees and offers an objective picture of gaps. The knowledge your business gains can be used as the basis of a network protection plan that can allow your network to run dependably and adapt quickly to new risks.
Automated Network Security Evaluation
Progent offers consulting in the use of security testing packages such as MBSA and GFI LANguard Network Security Scanner for affordably running a set of automatic network testing checks to uncover potential security gaps. Progent has broad knowledge of other security auditing utilities including NMAP, AMAP application mapper, eEye, as well as utilities such as Metasploit, Netcat, Socat, and Nikto. Progent can show you how to make sense of audit reports and respond effectively.
Progent can show you how to build protection into your business processes, install scanning software, plan and implement a protected system environment, and recommend procedures to maximize the safety of your IT system. Progent's security professionals are ready to show you how to set up a firewall, implement safe remote connectivity to email and business applications, and integrate virtual private network. Learn more about Progent's automated security assessment.
Security Inventory and Evaluation Packages for Small Businesses
Progent has put together two low-cost security inventory packages intended to enable small businesses to get a professional security evaluation from a certified security engineer. With Progent's External Network Security Inventory Scan, a security engineer administers a comprehensive test of your IT infrastructure from outside your company firewall to determine possible weaknesses in the security posture you present to the public. With Progent's Internal Network Security Inventory Checkup, a security expert executes a system scan from a secure computer within your company firewall to evaluate vulnerabilities to internal assaults. Both security inventory packages are set up and executed from a secured remote location. The project is managed by an engineer with high-level security accreditations and who produces a report that summarizes and analyzes the information collected by the security scan and suggests practical remediation where called for.
Network Security Penetration Testing Consulting
Stealth intrusion testing is a key component of any successful network security strategy. Progentís security professionals can run extensive intrusion checks without the awareness of your company's internal IT staff. Stealth penetration testing shows whether current security defense tools such as intrusion detection warnings and event history monitoring are correctly configured and consistently checked. Learn additional information concerning Progent's network penetration analysis consulting.
Firewall and Virtual Private Network Expertise
Progent's background in network security technology encompasses in-depth familiarity with leading firewalls and Virtual Private Network technology offered by a variety of vendors such as Cisco, Microsoft, and Juniper. Progent can provide the services of engineers who have earned important industry certifications including Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer (MCSE).
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Configuration and Troubleshooting
The new ASA 5500-X Family of firewalls with Firepower Services provide substantially more value than Cisco's earlier firewalls and have superseded the ASA 5500 and PIX security appliances for new deployments. After Cisco's purchase of Sourcefire, the entire family of Cisco ASA 5500-X firewalls can be provisioned to enable Firepower Services, based on Sourcefire's Snort product, which is the world's most deployed intrusion protection system. Firepower services provide powerful new features including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-premier CCIE network experts can help you to manage your current PIX or Cisco ASA 5500 security appliances and migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite support for ASA 5500-X firewalls with Firepower Services and can assist your company to plan, deploy, optimize, manage and debug firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. See more information about Cisco ASA Firewalls with Firepower Services configuration and troubleshooting support.
Cisco Security and VPN Engineering Expertise
Cisco's network security and offsite connection technology provide a full range of easy-to-administer security solutions to help safeguard your wired and wireless information system. Cisco's VPN product family features switches, firewalls, intrusion detection devices and Virtual Private Network appliances. Progent's professional staff of consultants includes field-proven specialists with Cisco's Certified Internetwork Expert and Cisco Certified Network Professional qualifications who can assist your business to select Cisco VPN, Cisco RADIUS Security, and additional Cisco security solutions that fit most closely with your business objectives. Read more information concerning Progent's Support Expertise for Cisco Security Technology and VPN Products.
Consulting Expertise for Additional Firewall and VPN Products
Progent provides small and mid-size companies professional support for Intrusion Protection Systems and IPsec VPN products from leading firewall and Virtual Private Network security vendors such as Check Point Software, Juniper Networks, and Symantec. Progent can help you create a comprehensive security plan and choose appropriate products from a variety of suppliers to support your security objectives while staying within your spending limits.
Progent's Flat-rate Managed Services for Information Security
Progent's affordable ProSight portfolio of managed services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance and compliance. Managed services offered by Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that incorporates next generation behavior-based machine learning technology to defend endpoint devices and physical and virtual servers against new malware assaults like ransomware and file-less exploits, which easily get by legacy signature-matching anti-virus products. ProSight ASM safeguards on-premises and cloud resources and provides a unified platform to automate the complete threat progression including filtering, detection, mitigation, remediation, and forensics. Top features include single-click rollback using Windows Volume Shadow Copy Service (VSS) and real-time system-wide immunization against new threats. Read more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware defense.
ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Protection
Progent's ProSight Enhanced Security Protection (ESP) services deliver ultra-affordable in-depth protection for physical servers and virtual machines, desktops, mobile devices, and Exchange Server. ProSight ESP uses contextual security and modern behavior analysis for continuously monitoring and reacting to cyber assaults from all attack vectors. ProSight ESP offers firewall protection, intrusion alarms, device management, and web filtering through leading-edge tools incorporated within one agent accessible from a single console. Progent's security and virtualization consultants can assist you to plan and implement a ProSight ESP environment that addresses your organization's specific requirements and that helps you demonstrate compliance with legal and industry data security regulations. Progent will assist you specify and configure security policies that ProSight ESP will enforce, and Progent will monitor your network and react to alarms that call for immediate action. Progent can also help your company to set up and test a backup and restore solution such as ProSight Data Protection Services (DPS) so you can get back in business rapidly from a potentially disastrous cyber attack such as ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint security and Microsoft Exchange filtering.
ProSight DPS: Managed Cloud Backup and Recovery
ProSight Data Protection Services provide small and mid-sized organizations a low cost end-to-end solution for secure backup/disaster recovery (BDR). Available at a fixed monthly price, ProSight DPS automates your backup processes and allows fast restoration of critical data, applications and VMs that have become lost or damaged as a result of component breakdowns, software bugs, disasters, human mistakes, or malware attacks such as ransomware. ProSight DPS can help you protect, retrieve and restore files, folders, apps, system images, plus Hyper-V and VMware images/. Critical data can be backed up on the cloud, to a local device, or to both. Progent's backup and recovery specialists can deliver world-class expertise to configure ProSight Data Protection Services to to comply with government and industry regulatory standards like HIPPA, FINRA, PCI and Safe Harbor and, whenever necessary, can assist you to recover your critical information. Learn more about ProSight Data Protection Services Managed Cloud Backup and Recovery.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering service that uses the infrastructure of leading data security companies to provide web-based control and comprehensive security for all your inbound and outbound email. The powerful structure of Email Guard managed service integrates a Cloud Protection Layer with an on-premises gateway appliance to offer advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-borne threats. Email Guard's cloud filter acts as a preliminary barricade and blocks most unwanted email from making it to your security perimeter. This decreases your exposure to inbound threats and saves system bandwidth and storage. Email Guard's on-premises gateway device provides a deeper layer of inspection for incoming email. For outgoing email, the onsite security gateway offers AV and anti-spam protection, protection against data leaks, and email encryption. The local gateway can also assist Microsoft Exchange Server to monitor and protect internal email traffic that stays within your corporate firewall. For more details, visit ProSight Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small organization can have its critical servers and applications hosted in a protected fault tolerant data center on a fast virtual machine host configured and managed by Progent's network support experts. Under the ProSight Virtual Hosting service model, the customer owns the data, the operating system software, and the apps. Because the environment is virtualized, it can be moved immediately to an alternate hardware solution without a lengthy and technically risky reinstallation process. With ProSight Virtual Hosting, your business is not locked into one hosting service. Find out more about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to create, maintain, find and protect information related to your IT infrastructure, processes, applications, and services. You can instantly find passwords or serial numbers and be warned automatically about upcoming expirations of SSLs or domains. By cleaning up and organizing your IT infrastructure documentation, you can save as much as half of time thrown away searching for vital information about your network. ProSight IT Asset Management features a common repository for holding and sharing all documents related to managing your business network such as standard operating procedures and How-To's. ProSight IT Asset Management also offers a high level of automation for collecting and associating IT information. Whether youíre making enhancements, performing maintenance, or responding to an emergency, ProSight IT Asset Management delivers the data you require the instant you need it. Learn more details about Progent's ProSight IT Asset Management service.
Certified Security Design
Any company ought to develop a carefully considered security strategy that includes both pre-attack procedures and reaction plans. The proactive strategy is a set of steps intended to reduce security weaknesses. The reactive plan helps your company's IT security engineers to assess the damage caused by an attack, fix the damage, record the experience, and get business functions operational as soon as possible.
Progent's expert IT security consultants are available to help your business to run a comprehensive risk assessment and define a computer security plan to establish security policies and controls to minimize ongoing assaults and dangers.
CISM Accredited Network Security Engineering Services
The CISM committee defines the basic capabilities and worldwide standards of performance that information security professionals are expected to master. It gives executive management the assurance that those who have qualified for their CISM credential have the experience and capability to provide efficient security administration and support consulting. Progent can provide the services of CISM Premier security professionals to help businesses with:
Learn additional information about Progent's CISM IS Security Support Services.
- IS Security Strategies
- Vulnerability Analysis
- Network Security Program Management
- Network Security Administration
- Response Planning
CISSP Accredited Security Engineering Support
CISSP certification recognizes expertise with an international standard for network security. ANSI has awarded certification recognition in the field of data security defined by ISO/IEC 17024. Progent can provide access to of security professionals who have earned CISSP accreditation. Progent can provide a CISSP-certified professional to help your organization in a variety security fields such as:
Learn additional information concerning Progent's CISSP Information Security Consulting Services.
- Security Administration Practices
- Security Architecture and Models
- Access Management Solutions and Processes
- Applications Development Security
- Secure Operations
- Physical Security
- Data Encryption Mechanisms
- Telecom, LAN and Internet Security
- Business Continuity Planning
CISSP-ISSAP Certified Secure IT Architecture Consulting Support
Progent's CISSP-ISSAP Certified network architecture engineers are consultants who have been awarded ISSAP status as a result of thorough examination and significant experience with network security design. The Information System Security Architecture Professional (ISSAP) certification indicates demonstrated mastery in the more in-depth requirements of IS security architecture bounded by the broader field of IS security knowledge required for CISSP accreditation. Progent's ISSAP-premier security experts can help your company with all phases of secure network architecture including.
Find out additional details about Progent's ISSAP Certified Secure System Architecture Support Services.
- Access Management Mechanisms and Techniques
- Telecom and System Infrastructure Protection
- Data Encryption Options
- Needs Analysis and Security Standards
- BCP and DRP
- Hardware Security
CISA Certified Information System Security Auditing Engineering Services
The Certified Information Systems Auditor (CISA) credential is a globally recognized qualification that signifies mastery in information system security auditing. Certified by the American National Standards Institute, the CISA credential has consultants undergo a comprehensive test administered by the ISACA international professional group. Progent's CISA-certified IS security audit specialists are available to assist your business in the areas of:
Get additional information concerning Progent's CISA Certified Information System Security Auditing Consulting Expertise.
- Information Systems Audit Process
- IT Governance
- Network Assets and Architecture Planned Useful Life
- Information Technology Support
- Protecting Information Assets
- Disaster Recovery Planning
The CRISC certification program was initiated by ISACA in 2010 to validate an IT professional's ability to design, implement, and maintain information system control mechanisms to mitigate risk. Progent can provide the services of a CRISC-certified engineer to assist your company to develop and execute a business continuity plan based on industry best practices identified by CRISC and geared to align with your company's risk appetite, business goals, and budgetary guidelines. Progent's CRISC-qualified network risk mitigation engineers can provide a variety of risk identification services such as:
Read the details about Progent's CRISC Risk Management Consultants.
- Gather information and review documentation to evaluate significant risk scenarios
- Inventory statutory, regulatory, and contractual requirements and organizational policies related to your information system to assess their possible influence on your business goals
- Identify possible vulnerabilities for your operational processes to help in analyzing your corporate risk
- Create a risk awareness program and provide training to make sure your stakeholders understand IS risk so they can contribute to your risk management program
- Connect identified risk scenarios to your associated operational procedures to help assign risk responsibility
- Validate risk tolerance with executive leadership and key stakeholders to make sure they align
GIAC Accredited Security Consulting Expertise
GIAC (Global Information Assurance Certification) was founded in 1999 to certify the skill of computer security professionals. GIAC's mission is to make sure that an accredited security consultant possesses the knowledge needed to provide support in important categories of system, information, and software security. GIAC accreditations are recognized by businesses and government organizations all over the world including and the U.S. National Security Agency. Progent's GIAC network security audit engineers are available to help your company with:
Learn more information about Progent's GIAC Information Assurance Support.
- Assessing Networks
- Security Incident Response
- Traffic Analysis
- Web-based Application Security
- SIEM solutions
Talk to a Security Engineer
To find out how to contact a security consultant for remote or onsite assistance in Michigan, phone 1-800-993-9400 or go to Online Computer Help.