Small business networks in Michigan now have prompt and economical remote help from Progent's certified security professionals to assist with the toughest security problems. Rates are reasonable, charges are per minute, engagement is fast, and support is unbeatable. Progent also offers help for complex projects that demand the services of senior security consultants with high-level security certifications.
If your Michigan organization is some distance from larger urban neighborhoods including Detroit, Grand Rapids, Warren, Sterling Heights, Flint, Lansing, or Ann Arbor, support from local accredited network security experts could be limited when there's an emergency. This can cause a drop in income for your company, upset customers, idle workers, and defocused management. By calling Progent's online services, you can get in touch with a Certified security professional who can deliver expertise whenever you have to have it to get your network operating and restore your data.
Progent can help you in your efforts to guard your information system with services that ranges from security assessments to creating a comprehensive security strategy. Progent offers economical support to help small and midsize companies to design and manage protected networks powered by Microsoft Windows and Cisco technology and that can include servers and desktops based on UNIX, Linux, Solaris, or Apple Mac OS X platforms plus BYOD clients with Apple iOS handhelds or Android or Windows Phone smart phones and tablets.
Progent can also show you how to outsource spam blocking and protection from e-mail-based attacks. Email Guard is Progent's email security solution that incorporates the services and infrastructure of top data security companies to deliver centralized control and comprehensive security for your email traffic. The hybrid architecture of Email Guard managed service combines a Cloud Protection Layer with an on-premises security gateway device to provide advanced protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. ProSight Email Guard's cloud filter acts as a first line of defense and blocks most threats from reaching your security perimeter. This decreases your vulnerability to external attacks and conserves system bandwidth and storage. ProSight Email Guard's on-premises security gateway device adds a deeper level of inspection for incoming email. For outgoing email, the onsite gateway provides anti-virus and anti-spam protection, protection against data leaks, and email encryption. The local gateway can also enable Exchange Server to monitor and protect internal email that stays within your corporate firewall.
Progent's certified consultants are accessible remotely or on site to offer a variety of urgent or project-based network security services such as:
If your network has an emergency requirement for IT security support, go to Progent's Urgent Remote Technical Help.
Progent's engineers offer advanced support in key areas of computer security that include auditing, firewalls and VPN, and advanced security consulting.
Progent's expert security consultants can assess the strength of your existing network protection systems by performing exhaustive remote automated testing based on advanced utilities and proven procedures. Progent's experience in administering this testing saves your company time and money and offers an objective picture of system vulnerability. The information your company is provided can be used as the basis of a network protection plan that will permit your information system to operate safely and respond rapidly to future risks.
Automated Network Security Evaluation
Progent provides expertise in the application of security evaluation software such as Microsoft's MBSA and LANguard from GFI for affordably running a variety of programmed network auditing scans to identify possible security vulnerabilities. Progent has extensive knowledge of additional security analysis products including NMAP, AMAP application mapper, eEye Vulnerability Scanner, as well as utilities such as Metasploit, Netcat, Hydra, and Nikto. Progent can help you to make sense of audit reports and react effectively.
Progent can show you how to design security into your company operations, configure auditing applications, plan and deploy a protected network environment, and suggest procedures to optimize the security of your network. Progent's security consultants are able to show you how to set up a firewall, design safe remote connectivity to email and data, and integrate virtual private network. Find out additional information on Progent's network security audits.
Security Inventory and Evaluation Packages for Small Businesses
Progent has put together two ultra-affordable security inventory packages designed to enable small businesses to get an objective security evaluation from an accredited security expert. With Progent's External Security Inventory Scan, an engineer runs an extensive examination of your IT infrastructure from outside your firewall to uncover possible weaknesses in the security posture you present to the public. With Progent's Internal Network Security Inventory Checkup, an engineer executes a network scan from an authorized machine within your firewall to uncover vulnerabilities to inside attacks. The two security inventory services are set up and executed from a protected remote site. The project is directed by an engineer with high-level security accreditations and who produces a report that summarizes and analyzes the information captured by the scan and proposes practical improvements where appropriate.
Network Penetration Analysis Support Services
Stealth intrusion checking is an important component of any serious IT system security strategy. Progentís security professionals can perform thorough penetration checks without the knowledge of your company's in-house network support resources. Unannounced penetration testing uncovers whether current security monitoring systems such as intrusion detection alerts and event log analysis are properly set up and actively checked. Learn more about Progent's network penetration testing consulting.
Firewall And Virtual Private Network (VPN) Support
Progent's expertise in network security solutions encompasses extensive familiarity with leading firewalls and Virtual Private Network (VPN) products from a variety of vendors including Cisco, Microsoft, and Juniper. Progent can provide the services of engineers who have earned key networking certifications such as CCIE and Microsoft MCSE.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Integration and Troubleshooting
The latest generation of Cisco ASA 5500-X Series of firewalls with Firepower Services offer significantly more bang for the buck than Cisco's previous PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX firewalls for new installations. Since Cisco's acquisition of Sourcefire, the whole line of Cisco ASA 5500-X firewalls can be provisioned to support Firepower Services, built on Sourcefire's Snort technology, which is the market's most deployed network intrusion protection system (IPS). Firepower services provide enhanced features such as advanced malware protection (AMP), URL filtering, dynamic threat analytics, and automation. Progent's Cisco-premier CCIE network experts can assist your company to manage your current PIX or Cisco ASA 5500 firewalls and upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and on-premises support for ASA 5500-X firewalls with Firepower Services and can assist your business to plan, configure, tune, administer and troubleshoot firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services. Find out additional information about Cisco ASA 5500-X Firewalls with Firepower Services integration and debugging support.
Cisco Security and Virtual Private Network Engineering Services
Cisco's security and remote connection technology represent a complete line of easy-to-administer security products to help protect your wired and wireless information system. Cisco's Virtual Private Network product family includes switches, firewalls, intrusion detection devices and VPN appliances. Progent's expert staff of consultants includes field-proven specialists with Cisco's Certified Internetwork Expert and CCNP certifications who can help your business to select Cisco VPN, Cisco RADIUS Security, and other Cisco security technologies that fit best with your company objectives. Learn additional details concerning Progent's Support Expertise for Cisco Security Technology and VPN Products.
Consulting Expertise for Other Firewall and VPN Solutions
Progent provides small and medium size organizations professional consulting for Intrusion Protection Systems and IPsec VPN products from major firewall and Virtual Private Network security companies including Check Point Software, Juniper Networks, and Symantec. Progent can show you how to design a detailed security strategy and select appropriate technologies from a variety of vendors to achieve your security objectives while staying within your budget limits.
Progent's Fixed-price Managed Services for Information Assurance
Progent's low-cost ProSight line of outsourced network management services is designed to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all facets of information assurance and compliance. Managed services available from Progent include:
ProSight Active Security Monitoring: Next Generation Endpoint Protection and Ransomware Recovery
ProSight Active Security Monitoring (ASM) is an endpoint protection solution that utilizes cutting edge behavior-based analysis tools to guard endpoint devices as well as physical and virtual servers against new malware assaults like ransomware and email phishing, which routinely get by traditional signature-based anti-virus products. ProSight ASM safeguards local and cloud-based resources and offers a unified platform to manage the complete threat progression including filtering, identification, containment, cleanup, and forensics. Key features include single-click rollback using Windows Volume Shadow Copy Service (VSS) and real-time network-wide immunization against newly discovered attacks. Find out more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Protection
Progent's ProSight Enhanced Security Protection services offer ultra-affordable multi-layer security for physical and virtual servers, workstations, mobile devices, and Exchange email. ProSight ESP utilizes adaptive security and advanced heuristics for round-the-clock monitoring and reacting to security threats from all attack vectors. ProSight ESP delivers two-way firewall protection, penetration alerts, endpoint management, and web filtering through leading-edge technologies incorporated within one agent accessible from a single console. Progent's security and virtualization experts can assist you to plan and configure a ProSight ESP deployment that addresses your organization's specific needs and that helps you prove compliance with legal and industry information security standards. Progent will help you specify and configure policies that ProSight ESP will manage, and Progent will monitor your IT environment and respond to alarms that call for urgent attention. Progent's consultants can also assist you to set up and verify a backup and restore system like ProSight Data Protection Services so you can get back in business quickly from a potentially disastrous cyber attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint security and Exchange email filtering.
ProSight Data Protection Services: Managed Cloud Backup
ProSight Data Protection Services provide small and mid-sized businesses an affordable and fully managed solution for secure backup/disaster recovery (BDR). For a fixed monthly price, ProSight Data Protection Services automates and monitors your backup processes and enables fast restoration of critical data, applications and VMs that have become unavailable or damaged due to component failures, software glitches, natural disasters, human error, or malicious attacks like ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, applications, system images, plus Hyper-V and VMware images/. Important data can be protected on the cloud, to a local storage device, or mirrored to both. Progent's backup and recovery consultants can deliver world-class expertise to configure ProSight DPS to be compliant with regulatory requirements like HIPPA, FIRPA, and PCI and, whenever needed, can assist you to restore your business-critical data. Read more about ProSight DPS Managed Cloud Backup.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that uses the infrastructure of top data security vendors to deliver centralized management and comprehensive security for your email traffic. The powerful architecture of Progent's Email Guard managed service combines cloud-based filtering with a local gateway device to offer complete defense against spam, viruses, Dos Attacks, DHAs, and other email-based threats. The cloud filter serves as a preliminary barricade and blocks the vast majority of threats from making it to your security perimeter. This reduces your vulnerability to inbound attacks and conserves system bandwidth and storage space. Email Guard's onsite gateway device provides a further layer of analysis for inbound email. For outbound email, the on-premises security gateway provides AV and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The local gateway can also help Microsoft Exchange Server to monitor and safeguard internal email that stays within your security perimeter. For more information, see Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small business can have its critical servers and apps hosted in a secure Tier III data center on a high-performance virtual machine host set up and managed by Progent's network support experts. With the ProSight Virtual Hosting service model, the customer owns the data, the operating system platforms, and the applications. Because the environment is virtualized, it can be moved immediately to an alternate hardware solution without a lengthy and technically risky reinstallation procedure. With ProSight Virtual Hosting, you are not locked into one hosting service. Learn more about ProSight Virtual Hosting services.
ProSight IT Asset Management: Infrastructure Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, maintain, find and safeguard data related to your IT infrastructure, processes, applications, and services. You can quickly locate passwords or IP addresses and be alerted about impending expirations of SSL certificates or warranties. By updating and organizing your IT documentation, you can save as much as 50% of time wasted searching for vital information about your IT network. ProSight IT Asset Management includes a common location for storing and sharing all documents related to managing your business network like recommended procedures and How-To's. ProSight IT Asset Management also supports a high level of automation for collecting and relating IT data. Whether youíre planning enhancements, doing regular maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the information you require the instant you need it. Find out more details about Progent's ProSight IT Asset Management service.
Expert Security Design
Any business ought to have a carefully considered security program that incorporates both preventive processes and response planning. The proactive strategy is a collection of mechanisms designed to minimize vulnerabilities. The reactive strategy assists your security engineers to evaluate the impact caused by a security penetration, fix the damage, record the experience, and get business functions running as quickly as possible.
Progent's certified IS security engineers are available to help your company to run a complete vulnerability assessment and create a computer security strategy to implement security processes and mechanisms to mitigate future attacks and threats.
CISM Qualified Information Security Engineering Expertise
The CISM organization describes the basic capabilities and international standards of skill that information security professionals are required to learn. It gives business management the assurance that consultants who have earned their CISM certification have the experience and knowledge to provide efficient security administration and consulting consulting. Progent can provide the expertise of CISM Certified security consultants to help businesses with:
Learn additional details about Progent's CISM Qualified Information Security Engineering Expertise.
- Network Security Governance
- Vulnerability Management
- IS Security Program Management
- Network Security Administration
- Recovery Planning
CISSP Certified Security Consulting Assistance
The CISSP credential recognizes expertise with a global standard for network security. The American National Standards Institute has granted the CISSP credential recognition in the area of data protection defined by ISO/IEC 17024. Progent offers access to of security experts who have earned CISSP accreditation. Progent can give you access to a CISSP-certified expert to help your organization in a variety security fields such as:
Find out additional information about Progent's CISSP Accredited Network Security Consulting Services.
- Security Administration Procedures
- Security Architecture and Models
- Access Control Systems and Methodology
- Applications Development Security
- Secure Operations
- Site Security
- Data Encryption Mechanisms
- Telecommunications, LAN and Internet Security
- Business Continuity Preparedness
CISSP-ISSAP Certified Secure System Architecture Consulting Services
Progent's CISSP-ISSAP Certified network architecture engineers are experts who have earned ISSAP Certification through thorough testing and extensive experience with network security architecture. The Information System Security Architecture Professional (ISSAP) credential represents demonstrated mastery in the most in-depth requirements of IS security architecture bounded by the broader field of IS security knowledge needed for CISSP certification. Progent's ISSAP-premier security experts can help your business with all aspects of architecture security such as.
Learn additional information concerning Progent's ISSAP Accredited Secure Network Architecture Support Professionals.
- Access Control Systems and Techniques
- Telecommunications and Network Security
- Data Encryption Options
- Requirements Evaluation and Security Standards
- Business Continuity Planning and DRP
- Hardware Security
CISA Qualified Network Security Auditing Consulting Support
The CISA accreditation is an important qualification that indicates mastery in IS security auditing. Certified by the American National Standards Institute (ANSI), the CISA accreditation has candidates pass an extensive examination administered by the ISACA professional association. Progent's CISA network security audit specialists are available to assist your IT organization in the areas of:
Learn more information concerning Progent's CISA Certified Network Security Auditing Consulting Support.
- Information Systems Audit Process
- Information Technology Governance
- Network Assets and Infrastructure Lifecycle
- IT Support
- Safeguarding Information Assets
- Business Continuity Planning
Certified in Risk and Information Systems Control (CRISC) Experts
The Certified in Risk and Information Systems Control (CRISC) program was established by ISACA to validate a consultant's ability to design, implement, and support IS control mechanisms to mitigate risk. Progent can provide the services of a CRISC-certified engineer to assist you to develop and execute a workplace continuity plan based on leading practices identified by CRISC and crafted to align with your organization's risk tolerance, business objectives, and budgetary guidelines. Progent's CRISC network risk management specialists offer a range of risk assessment services including:
Learn additional details concerning Progent's CRISC Risk Management Experts.
- Collect data and review documentation to identify major vulnerabilities
- Inventory legal, industry, and business requirements and organizational standards associated with your network to assess their potential impact on your business objectives
- Point out potential vulnerabilities for your operational workflows to assist in evaluating your enterprise risk
- Create a risk awareness initiative and provide training to ensure your stakeholders understand information system risk so they can contribute to your risk management process
- Match key risk scenarios to related business processes to help determine risk ownership
- Determine risk tolerance with executive management and key stakeholders to make sure they match
GIAC Qualified Security Consulting Assistance
Find out additional information concerning Progent's GIAC Information Assurance Services.
GIAC (Global Information Assurance Certification) was founded in 1999 to validate the skill of IT security engineers. GIAC's goal is to assure that an accredited security consultant possesses the skills necessary to deliver services in vital categories of system, data, and software security. GIAC certifications are recognized by businesses and institutions around the world including and the U.S. National Security Agency. Progent's GIAC-qualified information security audit specialists can help your IT organization with:
Contact a Certified Progent Security Expert
To find out how to contact a certified security engineer for online or on-premises help in Michigan, call 1-800-993-9400 or go to Remote Computer Support.