Company information networks in Michigan now have quick and economical online help from Progent's qualified security support specialists to fix urgent security problems. Rates are competitive, charges are by the minute, sign-up is quick, and service is world class. Progent also provides help for long-term projects that demand the expertise of seasoned security consultants with high-level security certifications.
In case your Michigan small business is located away from larger metropolitan neighborhoods such as Detroit, Grand Rapids, Warren, Sterling Heights, Flint, Lansing, or Ann Arbor, access to local certified network security support specialists could be limited during a security disaster. This can result in a drop in income for your company, angry customers, unproductive employees, and defocused management. By contacting Progent's online services, you have access to a Certified security consultant ready to deliver help whenever you have to have it to keep your information system on line and restore your information.
Progent can help you at any level in your efforts to guard your network with support that can range from network security checks to developing a company-wide security plan. Progent provides economical service to help companies of any size to configure and maintain protected IT environments powered by Windows and Cisco technology and that may include servers and desktops based on UNIX or Linux platforms plus BYOD clients with Apple iOS handhelds or Google Android or Windows Phone devices.
Progent can also assist you to outsource spam blocking and protection from email-borne assaults. Email Guard is Progent's email security platform that uses the technology of leading data security vendors to provide centralized control and world-class protection for your email traffic. The powerful architecture of Email Guard managed service integrates cloud-based filtering with an on-premises security gateway appliance to offer advanced defense against spam, viruses, Dos Attacks, Directory Harvest Attacks, and other email-borne malware. The Cloud Protection Layer acts as a preliminary barricade and keeps most unwanted email from reaching your network firewall. This decreases your exposure to external threats and conserves network bandwidth and storage space. ProSight Email Guard's on-premises gateway device provides a further level of inspection for incoming email. For outbound email, the on-premises security gateway provides AV and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The local gateway can also enable Exchange Server to track and safeguard internal email traffic that stays within your corporate firewall.
Progent's security professionals are accessible online or on premises to provide a variety of emergency or longer-term network security services such as:
If your company has an urgent need for IT security support, go to Progent's Emergency Online Technical Support.
- Run thorough network security evaluations
- Recuperate rapidly after attacks
- Install hardware and software firewalls
- Implement safe techniques for offsite and mobile connectivity
- Deploy advanced software for automatic protection against spam and directory harvest attacks
- Help create a company-wide security strategy with proactive security monitoring
- Provide comprehensive Call Center Services
- Help Create a practical network backup and recovery plan built around Microsoft Data Protection Manager backup technology
Progent's support professionals can deliver advanced services in vital facets of computer protection that include security assessment, firewall/VPN support, and advanced security consulting.
Progent's expert security consultants can assess the vulnerability of your current network protection environment through comprehensive remote automated testing based on advanced utilities and tested techniques. Progent's skill in administering this testing saves your company consulting fees and assures an accurate picture of security holes. The knowledge your business gains can make up the basis of a network protection strategy that can allow your information system to operate safely and react rapidly to new risks.
Automated Network Security Analysis
Progent provides expertise in the use of security testing packages such as Microsoft's MBSA and LANguard from GFI for affordably performing a set of automatic system auditing scans to uncover possible security gaps. Progent has broad experience with other network auditing products such as NMAP Port Scanner, AMAP application mapper, eEye Vulnerability Scanner, plus tools like Metasploit, Netcat, and Nikto. Progent can help you to make sense of testing reports and react effectively.
Progent can help you design security into your company operations, configure scanning tools, plan and deploy a secure network architecture, and recommend policies to maximize the safety of your network. Progent's security professionals are ready to show you how to configure a firewall, design secure remote access to email and business applications, and integrate virtual private network. Find out more concerning Progent's automated security analysis.
Security Inventory Service Packages for Small Companies
Progent offers two low-cost security inventory scanning packages intended to enable small businesses to get an independent network security evaluation from a qualified security expert. With Progent's External Network Security Inventory Scan, a security expert runs a comprehensive test of your network from beyond your firewall to uncover potential risks in the security posture you present to the public. With Progent's Internal Security Inventory Checkup, a security expert runs a system scan from an authorized machine within your company firewall to uncover vulnerabilities to internal attacks. Both security inventory packages are set up and executed from a protected remote site. The project is managed by an engineer who has earned top security accreditations and who produces a document that details and interprets the information collected by the security scan and suggests practical improvements if called for.
Network Intrusion Analysis Consulting
Stealth intrusion testing is a key component of any comprehensive network security plan. Progentís security experts can run extensive penetration tests without the knowledge of your organization's in-house network support resources. Stealth penetration testing uncovers whether current security monitoring systems such as intrusion detection alerts and event log monitoring are properly set up and consistently monitored. Find out additional information on Progent's stealth security penetration analysis consulting.
Firewall and Virtual Private Network Expertise
Progent's expertise in network security solutions includes extensive familiarity with leading firewalls and VPN products from multiple vendors including Cisco, Microsoft, and Symantec. Progent offers the support of consultants with key industry certifications including CCIE and Microsoft Certified Systems Engineer (MCSE).
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX 500 Firewalls Integration and Troubleshooting
The new ASA 5500-X Series Next-Generation Firewalls with Firepower Services provide substantially more performance than Cisco's previous firewalls and have superseded the ASA 5500 and PIX firewalls for all new installations. Following Cisco's purchase of Sourcefire, the entire family of ASA 5500-X firewalls can be configured to enable Firepower Services, based on Sourcefire's Snort technology, which is the market's most popular network intrusion protection system (IPS). Firepower services provide powerful new capabilities including advanced malware protection (AMP), URL filtering, dynamic threat analytics, and security automation. Progent's Cisco-premier CCIE network consultants can assist you to maintain your legacy PIX or ASA 5500 security appliances and migrate to Cisco ASA 5500-X firewalls with Firepower Services. Progent's consultants can provide online and onsite support for ASA 5500-X firewalls with Firepower Services and can assist your organization to design, configure, tune, administer and troubleshoot firewall solutions built around Cisco ASA 5500-X firewalls with Firepower Services. Read more information about Cisco ASA 5500-X Firewalls with Firepower configuration and troubleshooting services.
Cisco Security and VPN Support Expertise
Cisco's network security and offsite connection technology provide a full line of manageable security products to help protect your local and remote information system. Cisco's VPN product family includes switches, firewalls, intrusion detection systems and Virtual Private Network appliances. Progent's professional staff of consultants includes field-proven specialists with Cisco Certified Internetwork Expert and Cisco Certified Network Professional qualifications who are able to help your business to evaluate Cisco VPN, Cisco RADIUS Security, and additional Cisco security technologies that fit most closely with your business objectives. Learn more details about Progent's Engineering Expertise for Cisco Security and Virtual Private Network Appliances.
Engineering Expertise for Additional Firewall and Virtual Private Network Products
Progent offers small and mid-size companies expert consulting for Intrusion Protection Systems and IPsec VPN technology from leading firewall and VPN security vendors such as Check Point Software, Juniper Networks, and Symantec. Progent can show you how to create a detailed security plan and select the right products from multiple vendors to achieve your security goals while staying within your budget limits.
Progent's Low-Cost Managed Services for Information Security
Progent's low-cost ProSight line of network management outsourcing services is designed to provide small and mid-size organizations with enterprise-class support and cutting-edge technology for all facets of information assurance and compliance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection solution that utilizes cutting edge behavior-based analysis tools to defend endpoint devices as well as physical and virtual servers against modern malware attacks such as ransomware and file-less exploits, which routinely escape legacy signature-matching AV products. ProSight ASM protects on-premises and cloud resources and provides a unified platform to address the complete threat lifecycle including protection, infiltration detection, containment, remediation, and forensics. Key capabilities include single-click rollback with Windows Volume Shadow Copy Service (VSS) and real-time network-wide immunization against newly discovered attacks. Find out more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware defense.
ProSight Enhanced Security Protection: Unified Endpoint Security
Progent's ProSight Enhanced Security Protection managed services offer economical in-depth security for physical and virtual servers, desktops, smartphones, and Exchange Server. ProSight ESP uses contextual security and advanced heuristics for round-the-clock monitoring and responding to cyber assaults from all vectors. ProSight ESP offers two-way firewall protection, intrusion alarms, device control, and web filtering via leading-edge tools packaged within one agent managed from a single control. Progent's security and virtualization experts can assist you to design and configure a ProSight ESP deployment that meets your company's unique requirements and that helps you achieve and demonstrate compliance with legal and industry information protection standards. Progent will assist you specify and implement policies that ProSight ESP will enforce, and Progent will monitor your network and respond to alarms that call for immediate action. Progent can also help your company to install and verify a backup and restore system such as ProSight Data Protection Services (DPS) so you can get back in business rapidly from a potentially disastrous cyber attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Exchange email filtering.
ProSight Data Protection Services: Managed Backup
ProSight Data Protection Services from Progent offer small and mid-sized businesses an affordable and fully managed solution for reliable backup/disaster recovery. For a fixed monthly rate, ProSight Data Protection Services automates your backup activities and enables fast recovery of critical data, apps and VMs that have become unavailable or corrupted due to component breakdowns, software glitches, disasters, human error, or malicious attacks like ransomware. ProSight DPS can help you protect, recover and restore files, folders, applications, system images, plus Microsoft Hyper-V and VMware images/. Important data can be backed up on the cloud, to a local storage device, or to both. Progent's cloud backup specialists can provide advanced expertise to set up ProSight DPS to to comply with government and industry regulatory standards like HIPPA, FINRA, PCI and Safe Harbor and, whenever necessary, can help you to restore your business-critical data. Learn more about ProSight DPS Managed Cloud Backup and Recovery.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam filtering service that uses the technology of leading information security companies to provide web-based control and comprehensive security for all your inbound and outbound email. The powerful structure of Email Guard managed service combines a Cloud Protection Layer with a local security gateway device to provide complete protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. The cloud filter serves as a preliminary barricade and blocks the vast majority of threats from reaching your network firewall. This decreases your vulnerability to inbound attacks and saves network bandwidth and storage. Email Guard's onsite security gateway appliance provides a further level of inspection for incoming email. For outgoing email, the local security gateway offers AV and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The local gateway can also assist Microsoft Exchange Server to track and protect internal email traffic that originates and ends inside your security perimeter. For more details, see Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small business can have its key servers and applications hosted in a protected Tier III data center on a high-performance virtual machine host set up and maintained by Progent's network support professionals. Under Progent's ProSight Virtual Hosting model, the customer retains ownership of the data, the OS software, and the applications. Since the system is virtualized, it can be ported easily to an alternate hosting environment without requiring a time-consuming and technically risky reinstallation procedure. With ProSight Virtual Hosting, you are not locked into one hosting provider. Find out more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: IT Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to capture, maintain, retrieve and protect information related to your IT infrastructure, processes, business apps, and services. You can quickly find passwords or IP addresses and be alerted automatically about upcoming expirations of SSL certificates ,domains or warranties. By updating and managing your network documentation, you can eliminate up to half of time wasted looking for critical information about your IT network. ProSight IT Asset Management features a common repository for storing and collaborating on all documents related to managing your network infrastructure such as standard operating procedures (SOPs) and How-To's. ProSight IT Asset Management also offers a high level of automation for collecting and associating IT data. Whether youíre making enhancements, performing maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the information you require the instant you need it. Learn more about Progent's ProSight IT Asset Management service.
Certified Security Planning
Any business ought to develop a thoroughly considered security strategy that includes both preventive procedures and reaction planning. The proactive strategy is a collection of mechanisms that help to minimize security weaknesses. The post-attack plan assists your company's IT security personnel to evaluate the impact caused by an attack, repair the system, document the event, and get the IT network restored as rapidly as feasible.
Progent's certified information security consultants can to help your business to run a full risk evaluation and create a network security plan to establish security policies and mechanisms to mitigate ongoing assaults and threats.
CISM Qualified Security Engineering Assistance
The Certified Information Security Manager (CISM) organization defines the core competencies and global standards of skill that IT security managers are required to master. CISM provides business management the confidence that consultants who have earned their CISM certification have the experience and knowledge to deliver effective security management and consulting consulting. Progent can provide the support of CISM Premier security consultants to assist companies with:
Find out additional information about Progent's CISM Network Security Consulting Professionals.
- Information Security Governance
- Vulnerability Analysis
- Information Security Program Management
- Network Security Administration
- Response Management
CISSP Accredited Security Consulting Assistance
CISSP certification recognizes expertise with a worldwide standard for information security. ANSI has awarded the CISSP credential recognition in the area of information security defined by ISO 17024. Progent offers the services of security consultants who have earned CISSP accreditation. Progent can give you access to a CISSP-certified expert to help your organization in a broad range of security fields including:
Find out more information about Progent's CISSP Security Support Professionals.
- Security Management Procedures
- Security Architecture and Paradigms
- Access Management Solutions and Methodology
- Software Development Security
- Operations Security
- Site Security
- Encryption/Decryption Technology
- Telecom, Network and Internet Security
- Disaster Recovery Preparedness
CISSP-ISSAP Accredited Secure IT Architecture Consulting Support
Progent's CISSP-ISSAP Certified network architecture professionals are experts who have earned ISSAP Certification through rigorous examination and extensive experience with network security design. The ISSAP certification indicates proven mastery in the more challenging requirements of information system security architecture within the broader scope of information security expertise required for CISSP certification. Progent's ISSAP-certified security experts can assist your company with all phases of architecture security such as.
Read more details concerning Progent's ISSAP Accredited Secure System Architecture Support Professionals.
- Access Control Systems and Techniques
- Telecom and Network Infrastructure Protection
- Encryption/Decryption Solutions
- Requirements Analysis and Security Standards
- Business Continuity Planning and Disaster Recovery Planning (DRP)
- Hardware Security
CISA Qualified Information System Security Auditing Engineering Expertise
The CISA accreditation is a globally recognized qualification that indicates mastery in information system security audit and control. Certified by the American National Standards Institute, the CISA credential has consultants pass a comprehensive examination administered by the ISACA professional group. Progent's CISA security audit specialists are available to help your IT organization in the areas of:
Read additional information concerning Progent's CISA Accredited Network Security Auditing Consulting Services.
- Information Systems Audit Process
- Information Technology Governance
- Network Assets and Architecture Planned Useful Life
- IT Support
- Protecting Information Resources
- Business Continuity Planning
Certified in Risk and Information Systems Control (CRISC) Consultants
The CRISC program was initiated by ISACA to validate a consultant's skills to plan, deploy, and maintain IS controls to mitigate network risk. Progent can provide the services of a CRISC-certified consultant to assist you to develop and carry out a business continuity or disaster recovery plan based on leading practices identified by CRISC and crafted to match your company's risk tolerance, business goals, and IT budget. Progent's CRISC-qualified network risk mitigation specialists can provide a range of risk identification services such as:
Find out more information concerning Progent's CRISC Risk Management Consultants.
- Gather information and review documentation to evaluate significant risk scenarios
- Identify legal, regulatory, and business requirements and company policies related to your information system to assess their possible impact on your business objectives
- Identify potential vulnerabilities for your business workflows to help in evaluating your enterprise risk
- Create a risk awareness initiative and provide seminars to make sure your organization appreciate IT risk so they can assist with your risk management program
- Match identified risk scenarios to related business procedures to help assign risk ownership
- Determine risk tolerance with executive leadership and major stakeholders to ensure they are in agreement
GIAC Qualified Security Consulting Assistance
Read additional information about Progent's GIAC Information Assurance Support.
Global Information Assurance Certification was established in 1999 to certify the knowledge of IT security professionals. GIAC's mission is to make sure that a certified professional possesses the skills necessary to provide services in key categories of network, information, and application program security. GIAC accreditations are recognized by businesses and institutions around the world including and the U.S. National Security Agency (NSA). Progent's GIAC-certified IS security audit engineers are available to assist your IT organization in the areas of:
Get in Touch with a Progent Security Expert
To find out how you can get in touch with a Progent security engineer for online or onsite expertise in Michigan, call 1-800-993-9400 or visit Online Network Support.