Company information networks in the state ofMichigancan depend on prompt and economical remote access to Progent's qualified network security experts to help with complex security problems. The cost is affordable, charges are by the minute, sign-up is immediate, and support is world class. Progent also offers help for complex projects that requires the expertise of senior security engineers with high-level security credentials.
In case yourMichigancompany is located some distance from larger urban areas such asDetroit, Grand Rapids, Warren, Sterling Heights, Flint, Lansing, or Ann Arbor, support from nearby accredited network security consultants may be problematic when you have an urgent situation. This can cause a loss of revenue for your business, upset clients, idle employees, and defocused management. By contacting Progent, you have access to a Certified security professional ready to provide help when you need it to get your network on line and restore your information.
Progent can help you in a variety of ways in your efforts to defend your IT environment with support services ranging from security audits to creating a comprehensive security plan. Progent offers affordable service to help businesses of all sizes to set up and manage protected IT environments powered by Microsoft Windows and Cisco technology and that may include computers based on UNIX, Linux, Solaris, or Apple Mac OS X platforms as well as mobile clients with Apple iPhones and iPads or Android or Windows Phone handsets.
Progent can also show you how to outsource spam filtering and defense against e-mail-based assaults. Email Guard is Progent's email security solution that incorporates the technology of top data security vendors to deliver centralized management and comprehensive protection for all your email traffic. The powerful architecture of Progent's Email Guard combines a Cloud Protection Layer with a local security gateway appliance to offer complete protection against spam, viruses, Dos Attacks, DHAs, and other email-based threats. ProSight Email Guard's Cloud Protection Layer acts as a first line of defense and keeps most unwanted email from reaching your network firewall. This reduces your exposure to inbound attacks and saves network bandwidth and storage space. ProSight Email Guard's onsite security gateway appliance provides a further layer of analysis for incoming email. For outbound email, the on-premises security gateway provides anti-virus and anti-spam filtering, protection against data leaks, and encryption. The onsite security gateway can also enable Exchange Server to track and safeguard internal email that originates and ends within your corporate firewall.
Progent's security professionals are accessible remotely or on site to provide a range of emergency or project-based network security services such as:
If your company has an immediate need for computer security help, refer to Progent's Emergency Online Technical Support.
Progent's security experts provide advanced support in key facets of network protection including security assessment, firewalls and VPN, and high-level security planning.
Progent's certified security engineers can evaluate the vulnerability of your existing network security implementation by performing comprehensive remote automated testing based on sophisticated software tools and tested techniques. Progent's experience in this service saves your company money and offers an accurate portrayal of system vulnerability. The knowledge your company is provided can make up the basis of a security strategy that can allow your network to run dependably and react rapidly to new threats.
Automated Vulnerability Assessment
Progent provides expertise in the application of security auditing utilities including MBSA and GFI LANguard for affordably running a variety of programmed system auditing checks to identify potential security gaps. Progent has broad experience with other network auditing products such as NMAP, AMAP application mapper, eEye Vulnerability Scanner, as well as tools like Metasploit Framework, Netcat, Socat, and Nikto. Progent can show you how to understand testing reports and respond effectively.
Progent can show you how to build security into your business operations, install auditing software, plan and deploy a secure network environment, and recommend procedures to optimize the security of your IT system. Progent's security engineers are ready to assist you to configure a firewall, implement safe remote connectivity to email and data, and integrate virtual private network. Learn additional information concerning Progent's automated security evaluation.
Security Inventory Packages for Small Businesses
Progent offers two low-cost security inventory service packages intended to enable small companies to receive a professional security assessment from an accredited security engineer. With Progent's External Security Inventory Scan, a security expert runs a comprehensive test of your network from beyond your firewall to uncover possible weaknesses in the security posture you expose to the outside world. With Progent's Internal Network Security Inventory Checkup, a certified security professional runs a network scan from an authorized computer inside your firewall to assess the risk to inside assaults. Both security inventory packages are configured and executed from a protected remote location. The process is managed by an engineer with high-level security credentials and who generates a document that summarizes and analyzes the data collected by the scan and suggests practical remediation where called for.
Network Intrusion Testing Support Services
Stealth intrusion checking is a key component of any comprehensive network security plan. Progentís security professionals can run thorough intrusion checks without the awareness of your company's in-house IT resources. Stealth penetration testing shows whether current security monitoring systems such as intrusion detection alerts and event log monitoring are correctly configured and consistently monitored. Learn additional information on Progent's stealth penetration analysis consulting.
Progent's background in network security technology encompasses extensive field work with leading firewalls and Virtual Private Network (VPN) products from a variety of companies such as Cisco, Microsoft, and CheckPoint. Progent can provide the services of consultants who have earned important industry accreditations such as Cisco Certified Internetwork Expert (CCIE) and Microsoft Certified Systems Engineer.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Series Firewalls, and PIX Security Appliances Integration and Debugging
The latest generation of Cisco ASA 5500-X Family of firewalls with Firepower Services provide substantially more bang for the buck than Cisco's legacy PIX and ASA 5500 firewalls and have replaced the ASA 5500 and PIX 500 firewalls for new installations. Following Cisco's acquisition of Sourcefire, the entire family of ASA 5500-X devices can be provisioned to support Firepower Services, based on Sourcefire's Snort product, which is the market's most deployed intrusion protection system. Firepower services bring powerful new capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-premier CCIE network experts can help you to maintain your current PIX or ASA 5500 firewalls or migrate efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite support for ASA 5500-X firewalls with Firepower Services and can assist your organization to design, integrate, tune, administer and debug firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. Find out more details about Cisco ASA 5500-X Firewalls with Firepower Services configuration and troubleshooting support.
Cisco Network Security and Virtual Private Network Consulting Services
Cisco's network security and remote connection technology provide a full range of manageable security solutions to help protect your local and remote information system. Cisco's Virtual Private Network line includes routers, firewalls, intrusion detection devices and VPN concentrators. Progent's professional consulting staff includes field-proven specialists with Cisco Certified Internetwork Expert and Cisco Certified Network Professional certifications who can assist your organization to select Cisco VPN, Cisco RADIUS Security, and other Cisco security technologies that align best with your company objectives. Learn additional information concerning Progent's Engineering Services for Cisco Security Technology and VPN Appliances.
Engineering Expertise for Additional Firewall and Virtual Private Network Technology
Progent offers small and mid-size companies professional consulting for Intrusion Protection Systems and IPsec VPN technology from major firewall and VPN security vendors such as WatchGuard, Juniper, and Symantec. Progent can show you how to design a detailed security strategy and select the right technologies from a variety of vendors to achieve your security goals while sticking within your spending limits.
Progent's Fixed-price Managed Services for Information Assurance
Progent's affordable ProSight portfolio of network management outsourcing services is intended to provide small and mid-size businesses with enterprise-class support and state-of-the-art technology for all aspects of information assurance. ProSight managed services available from Progent include:
ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring is an endpoint protection (EPP) solution that utilizes next generation behavior analysis technology to guard endpoints and servers and VMs against modern malware attacks like ransomware and file-less exploits, which routinely evade legacy signature-matching AV products. ProSight Active Security Monitoring protects on-premises and cloud resources and provides a single platform to manage the complete malware attack lifecycle including filtering, infiltration detection, containment, remediation, and forensics. Key capabilities include one-click rollback using Windows Volume Shadow Copy Service and real-time network-wide immunization against newly discovered threats. Find out more about Progent's ProSight Active Security Monitoring (ASM) endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Protection
ProSight Enhanced Security Protection (ESP) managed services deliver economical in-depth protection for physical and virtual servers, desktops, mobile devices, and Microsoft Exchange. ProSight ESP utilizes contextual security and advanced machine learning for round-the-clock monitoring and responding to cyber threats from all attack vectors. ProSight ESP offers two-way firewall protection, intrusion alarms, device management, and web filtering via leading-edge tools packaged within one agent managed from a unified console. Progent's security and virtualization consultants can assist you to plan and configure a ProSight ESP environment that addresses your organization's unique requirements and that helps you achieve and demonstrate compliance with government and industry information protection standards. Progent will help you define and configure security policies that ProSight ESP will manage, and Progent will monitor your IT environment and react to alerts that require urgent attention. Progent can also assist you to install and verify a backup and restore solution such as ProSight Data Protection Services (DPS) so you can recover rapidly from a potentially disastrous security attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Microsoft Exchange email filtering.
ProSight DPS: Managed Backup and Recovery
ProSight Data Protection Services from Progent provide small and medium-sized organizations an affordable end-to-end solution for secure backup/disaster recovery. For a fixed monthly rate, ProSight DPS automates your backup activities and enables fast restoration of critical files, applications and virtual machines that have become lost or damaged due to component failures, software bugs, natural disasters, human mistakes, or malicious attacks like ransomware. ProSight Data Protection Services can help you protect, recover and restore files, folders, apps, system images, as well as Microsoft Hyper-V and VMware virtual machine images. Critical data can be protected on the cloud, to a local device, or to both. Progent's BDR specialists can provide advanced support to set up ProSight Data Protection Services to be compliant with government and industry regulatory requirements such as HIPPA, FINRA, and PCI and, when necessary, can help you to recover your business-critical data. Learn more about ProSight DPS Managed Backup.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that uses the infrastructure of top data security companies to deliver centralized management and world-class security for all your inbound and outbound email. The hybrid structure of Email Guard managed service combines cloud-based filtering with an on-premises gateway device to offer complete defense against spam, viruses, Denial of Service Attacks, DHAs, and other email-borne malware. Email Guard's Cloud Protection Layer acts as a preliminary barricade and keeps most unwanted email from making it to your network firewall. This reduces your exposure to external attacks and conserves system bandwidth and storage space. Email Guard's onsite security gateway device provides a deeper layer of analysis for incoming email. For outgoing email, the on-premises gateway provides AV and anti-spam protection, protection against data leaks, and email encryption. The on-premises security gateway can also help Microsoft Exchange Server to track and safeguard internal email traffic that stays within your corporate firewall. For more information, see ProSight Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's World-class Data Center
With ProSight Virtual Hosting service, a small organization can have its key servers and applications hosted in a secure Tier III data center on a fast virtual host set up and maintained by Progent's network support experts. Under the ProSight Virtual Hosting service model, the client owns the data, the OS platforms, and the apps. Because the environment is virtualized, it can be ported immediately to an alternate hardware environment without a lengthy and difficult configuration procedure. With ProSight Virtual Hosting, your business is not locked into a single hosting provider. Learn more about ProSight Virtual Hosting services.
ProSight IT Asset Management: IT Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to capture, maintain, retrieve and protect data related to your IT infrastructure, procedures, applications, and services. You can instantly locate passwords or serial numbers and be alerted about upcoming expirations of SSLs ,domains or warranties. By updating and organizing your IT documentation, you can eliminate up to half of time thrown away trying to find critical information about your IT network. ProSight IT Asset Management features a common location for holding and sharing all documents related to managing your network infrastructure like standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also supports advanced automation for gathering and associating IT data. Whether youíre planning improvements, doing maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the data you require when you need it. Learn more about Progent's ProSight IT Asset Management service.
Certified Network Security Planning
Every business should have a thoroughly thought out security strategy that includes both pre-attack processes and response planning. The pre-attack plan is a set of steps that help to reduce security weaknesses. The post-attack plan helps your company's IT security engineers to assess the impact caused by a security penetration, repair the network, record the experience, and get the IT network running as rapidly as feasible.
Progent's certified information security consultants are available to assist your company to perform a full vulnerability assessment and define a company-wide security strategy to implement security policies and controls to mitigate future attacks and threats.
CISM Qualified Security Engineering Services
The Certified Information Security Manager (CISM) committee describes the basic capabilities and global standards of performance that information security managers are expected to learn. It provides business management the confidence that consultants who have qualified for their CISM credential possess the experience and capability to deliver efficient security administration and support services. Progent offers the support of CISM Premier security professionals to help companies with:
Read more information concerning Progent's CISM Security Support Expertise.
- Network Security Processes
- Vulnerability Management
- Information Security Implementation Management
- Information Security Administration
- Response Management
CISSP Certified Security Consulting Support
CISSP recognizes mastery of a global standard for information security. ANSI has granted certification accreditation in the area of data protection under ISO 17024. Progent can provide access to of security experts who have qualified for CISSP accreditation. Progent can provide a CISSP-certified consultant to help your company in a broad range of security areas including:
Read more details about Progent's CISSP Information Security Consulting Professionals.
- Security Management Practices
- Security Architecture and Paradigms
- Access Management Solutions and Processes
- Software Development Security
- Operations Security
- Physical Security
- Encryption/Decryption Mechanisms
- Telecommunications, LAN and WAN Security
- Disaster Recovery Planning
CISSP-ISSAP Qualified Secure System Architecture Engineering Support
Progent's CISSP-ISSAP Premier IT architecture professionals are experts who have been awarded ISSAP Certification as a result of thorough testing and significant experience with network security architecture. The Information System Security Architecture Professional (ISSAP) credential indicates demonstrated mastery in the most challenging demands of information security architecture within the wider scope of IS security expertise needed for CISSP certification. Progent's ISSAP-certified security specialists can assist your company with all phases of architecture security including.
Read more details concerning Progent's ISSAP Certified Secure System Architecture Support Professionals.
- Access Management Systems and Techniques
- Phone System and System Infrastructure Protection
- Data Encryption Options
- Needs Evaluation and Security Standards
- BCP and DRP
- Physical Security
CISA Accredited IS Security Auditing Consulting Assistance
The Certified Information Systems Auditor (CISA) credential is a recognized achievement that represents mastery in IS security audit and control. Certified by the American National Standards Institute, the CISA credential requires that candidates undergo a comprehensive examination given by the ISACA professional association. Progent's CISA-qualified IS security audit specialists can help your company with:
Find out more information concerning Progent's CISA Accredited Information System Security Auditing Engineering Expertise.
- IS Audit Process
- IT Governance
- Systems and Infrastructure Lifecycle Planning
- IT Service Delivery
- Protecting Information Assets
- Business Continuity Planning
The CRISC certification program was established by ISACA to verify a consultant's skills to design, deploy, and support IS control mechanisms to mitigate network risk. Progent can provide the expertise of a CRISC-certified engineer to help your company to create and execute a workplace continuity or disaster recovery strategy that follows leading practices promoted by CRISC and crafted to align with your organization's risk appetite, business objectives, and budgetary guidelines. Progent's CRISC-qualified network risk management specialists can provide a range of risk identification services such as:
Get more details concerning Progent's CRISC Risk Management Experts.
- Collect data and review documentation to evaluate major vulnerabilities
- Inventory statutory, regulatory, and business requirements and company policies associated with your network to determine their potential impact on your business objectives
- Point out potential threats for your business processes to assist in evaluating your enterprise risk
- Create a risk awareness program and provide training to make sure your organization understand IT risk so they can assist with your risk control program
- Match key risk scenarios to your associated business procedures to help assign risk responsibility
- Validate risk tolerance with your senior leadership and key stakeholders to make sure they are in agreement
GIAC Qualified Security Consulting Expertise
Find out more information about Progent's GIAC Information Assurance Expertise.
GIAC (Global Information Assurance Certification) was founded in 1999 to validate the skill of computer security engineers. GIAC's mission is to ensure that an accredited security consultant possesses the knowledge needed to deliver services in important categories of system, information, and application security. GIAC accreditations are recognized by businesses and institutions all over the world including and the U.S. NSA. Progent's GIAC-qualified network security audit consultants are available to help your company with:
Talk to a Certified Progent Security Expert
To learn how to access a certified Progent security consultant for online or onsite support in Michigan, call 1-800-993-9400 or visit Remote Computer Help.