Detroit Metro Area Contact Information:
Progent offers consulting services and onsite technical support throughout the Detroit Metro Area.
Progent locations in the Detroit Metro Area
For immediate remote help with data security issues, companies in Southfield, MI, have access to expert expertise from Progent's security professionals. Progent's online service consultants are available to provide efficient and economical assistance with security crises that threaten the viability of your network. Progent's accredited security engineers are certified to provide help for systems based on Windows, Linux, macOS and OS X, Solaris, and popular derivatives of UNIX. Progent's broad selection of consulting services covers firewall configuration, email security, protected network design, and disaster recovery preparedness. Progent's technical support team has earned the world's most advanced security credentials including GIAC and ISSAP.
Progent provides online security expertise on a per-minute basis without minimum call duration and without extra charges for setup or after hours service. By charging per minute and by providing world-class support, Progent's billing model keeps expenses under control and eliminates scenarios where simple fixes entail major bills.
We've Been Attacked: What Do We Do?
If your network is now faced with a network security crisis, go to Progent's Urgent Remote Computer Support to see how to receive immediate help. Progent has a pool of certified network security specialists who can provide remote and on-premises support that includes containment, mitigation, restoration, forensics, and hardening of your security defense to guard against future attacks.
For organizations that have planned carefully for being hacked, the formal post-attack handling procedure outlined by GIAC (Global Information Assurance Certification) is Progent's approved method of reacting to a major security penetration.
Overview of Security Services
Coordinating data security plus planning for recovering critical data and functions after a security breach requires an on-going effort involving an array of tools and procedures. Progent's certified consultants can support your organization at any level in your attempt to guard your IT network, from security audits to designing a complete security plan. Some technologies covered by Progent's security consultants include Planning and Implementation, Information Recovery and Security Failure Analysis, and Managed Protection from Email-Based Threats.
Planning and Building Protected Networks
Every company should have a thoroughly thought out security strategy that incorporates both preventive and reactive elements. The pre-attack strategy is a collection of precautions that helps to reduce security gaps. The post-attack strategy specifies procedures to assist security personnel to assess the losses caused by a breach, remediate the damage, record the event, and revive business activity as quickly as possible. Progent can show you how to design protection into your company processes. Progent can install scanning software, create and execute a safe computer infrastructure, and recommend processes and policies to optimize the safety of your computing environment. Progent's security experts are available to help you to set up a firewall, deploy secure offsite access to e-mail and data, and install an effective virtual private network.
If you are interested in an affordable way for outsourcing your network security management, Progent's Round-the-clock Network Support Packages include non-stop online system tracking and fast response to problems.
Hybrid Cloud Solutions
Progent can help your company you to design, deploy, manage and repair enterprise hybrid cloud solutions that combine local and cloud hosted infrastructure and that comply with government and industry security standards. (Find out about Progent's Office 365 Exchange Online integration with on-premises Exchange deployments, Azure enterprise hybrid cloud integration and Progent's Amazon Web Services enterprise hybrid cloud solutions.)
System Recovery and Security Forensics
Progent has skill in restoring networks and computers that have been hacked, are in question, or have ceased to function following a security breach. Progent can help determine the damage resulting from the attack, restore normal business operations, and retrieve information lost owing to the attack. Progent's security engineers can also manage a thorough forensic evaluation by going over activity logs and using a variety of proven assessment techniques. Progent's experience with security consulting minimizes your off-air time and permits Progent to propose effective measures to avoid or contain future attacks.
Ransomware Cleanup and Recovery Expertise
Progent can provide the services of proven ransomware recovery experts with the knowledge to restore an IT network victimized by a ransomware virus such as Ryuk, Dharma, Hermes, or Locky. To find out more, visit ransomware removal and recovery expertise.
Progent's Low-Cost Managed Services for Information Security
Progent's low-cost ProSight series of network management outsourcing services is designed to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all aspects of information assurance and compliance. ProSight managed services offered by Progent include:
ProSight Active Security Monitoring (ASM): Next Generation Endpoint Protection and Ransomware Recovery
Progent's ProSight Active Security Monitoring is an endpoint protection solution that incorporates cutting edge behavior machine learning technology to defend endpoints and servers and VMs against new malware assaults such as ransomware and file-less exploits, which routinely escape legacy signature-based anti-virus products. ProSight ASM safeguards local and cloud resources and provides a unified platform to manage the complete threat progression including protection, detection, mitigation, remediation, and forensics. Top features include single-click rollback with Windows VSS and real-time system-wide immunization against newly discovered threats. Find out more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection (ESP): Unified Endpoint Protection
Progent's ProSight Enhanced Security Protection (ESP) services offer affordable in-depth protection for physical servers and virtual machines, desktops, mobile devices, and Exchange email. ProSight ESP uses contextual security and modern behavior analysis for round-the-clock monitoring and responding to cyber threats from all attack vectors. ProSight ESP provides firewall protection, intrusion alarms, endpoint control, and web filtering via leading-edge tools packaged within one agent accessible from a unified control. Progent's security and virtualization consultants can assist you to design and implement a ProSight ESP deployment that meets your company's specific requirements and that allows you demonstrate compliance with legal and industry information protection regulations. Progent will help you specify and configure policies that ProSight ESP will enforce, and Progent will monitor your IT environment and respond to alerts that call for urgent attention. Progent's consultants can also assist your company to set up and verify a backup and restore solution such as ProSight Data Protection Services so you can get back in business quickly from a destructive cyber attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint security and Exchange filtering.
ProSight Data Protection Services: Managed Backup and Recovery
ProSight Data Protection Services provide small and mid-sized organizations an affordable end-to-end service for reliable backup/disaster recovery (BDR). For a low monthly rate, ProSight Data Protection Services automates your backup processes and enables rapid restoration of critical files, apps and virtual machines that have become unavailable or damaged due to hardware breakdowns, software glitches, disasters, human error, or malware attacks such as ransomware. ProSight DPS can help you back up, retrieve and restore files, folders, applications, system images/, as well as Hyper-V and VMware images/. Important data can be protected on the cloud, to an on-promises device, or mirrored to both. Progent's BDR specialists can deliver advanced expertise to configure ProSight DPS to to comply with government and industry regulatory standards such as HIPPA, FIRPA, PCI and Safe Harbor and, when necessary, can help you to recover your critical data. Find out more about ProSight DPS Managed Cloud Backup and Recovery.
ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that uses the infrastructure of top data security companies to provide centralized management and world-class protection for your email traffic. The powerful architecture of Email Guard integrates cloud-based filtering with an on-premises security gateway device to provide advanced protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks, and other email-borne threats. Email Guard's cloud filter acts as a preliminary barricade and keeps most threats from making it to your security perimeter. This reduces your exposure to inbound threats and conserves network bandwidth and storage space. Email Guard's on-premises gateway device provides a deeper level of inspection for incoming email. For outbound email, the local security gateway offers AV and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The on-premises gateway can also help Exchange Server to monitor and protect internal email traffic that originates and ends inside your security perimeter. For more information, see Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With Progent's ProSight Virtual Hosting service, a small organization can have its critical servers and apps hosted in a secure Tier III data center on a high-performance virtual machine host configured and maintained by Progent's network support experts. With the ProSight Virtual Hosting service model, the customer retains ownership of the data, the operating system software, and the apps. Because the system is virtualized, it can be moved immediately to a different hardware environment without a lengthy and difficult reinstallation procedure. With ProSight Virtual Hosting, you are not locked into a single hosting service. Learn more about ProSight Virtual Hosting services.
ProSight IT Asset Management: Network Documentation and Password Management
Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to capture, maintain, find and protect data about your network infrastructure, processes, applications, and services. You can quickly locate passwords or IP addresses and be alerted automatically about upcoming expirations of SSL certificates or warranties. By cleaning up and managing your IT infrastructure documentation, you can save up to 50% of time spent looking for critical information about your IT network. ProSight IT Asset Management features a centralized location for storing and collaborating on all documents required for managing your network infrastructure such as recommended procedures and self-service instructions. ProSight IT Asset Management also offers advanced automation for gathering and associating IT information. Whether you’re planning enhancements, performing regular maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the information you need when you need it. Find out more details about Progent's ProSight IT Asset Management service.
Special Security Expertise Available from Progent
Progent's security engineers can provide unique consulting support in vital facets of network protection such as:
Information Risk Audits and Compliance Testing
Progent offers experience with information risk evaluation tools such as Microsoft Baseline Security Analyzer and LANguard for conducting a variety of comprehensive network scans to reveal potential security gaps. Progent has broad skills with these utilities and can assist you to understand assessment reports and react efficiently. Progent's certified security consultants also provide web application validation and can conduct thorough evaluation of corporate-wide security to assess your organization's compliance with important worldwide security specifications including FISMA, NIST, and ISO 17799. Also, Progent can assess the effectiveness of your wireless protection covering in-place wireless equipment plus portable handsets. Learn more details concerning Progent's Information Risk Evaluation and Compliance Assessment.
Cisco Security, PIX and ASA Firewall, VPN, Aironet and Meraki Wi-Fi Expertise
Progent's Cisco Certified Internetwork Experts (CCIEs) and Cisco Certified Network Professionals (CCNPs) can deliver in-depth consulting expertise for Cisco's entire family of protection and Virtual Private Network (VPN) products including PIX 500 Series Firewalls and ASA Series Firewalls, the Catalyst FWSM, protected broadband and integrated services routers, Aironet wireless access points and bridges, Cisco Meraki cloud-managed Wi-Fi access points, and Catalyst Series switches. Read the details concerning Cisco Security, VPN and Wireless Support.
Additional Firewall and Virtual Private Network (VPN) Solutions
Unannounced Penetration Checking Services
In addition to being expert in a wide range of protection solutions available from Microsoft and Cisco, Progent offers organizations of all sizes expert support for technologies from other important firewall and VPN vendors. Progent's engineers can provide:
Stealth intrusion testing is a valuable technique for helping businesses to understand how exposed their networks are to serious threats by showing how effectively corporate protection processes and technologies hold up to planned but unannounced intrusion attempts instigated by seasoned security engineers utilizing advanced hacking techniques. Learn additional details about Progent's Penetration Testing Services.
CISM Security Consulting Expertise
Certified Information Security Manager (CISM) defines the fundamental competencies and international benchmarks of performance that information technology security managers are expected to achieve. It provides executive management the assurance that consultants who have earned their accreditation have the experience and skill to offer efficient security management and consulting support. Progent can offer a CISM support professional to assist your enterprise in vital security disciplines including data protection governance, risk assessment, information security program control, and crisis response support.
Read the details about Progent's CISM Security Support Services.
CISSP Security Support Expertise
Progent's Certified Information Systems Security Professionals (CISSPs) are security specialists who have earned CISSP certification through verified professional work, rigorous study, and formal testing. CISSP qualification indicates mastery of an international standard for information security. American National Standards Institute has granted the CISSP credential official recognition in the field of information security under ISO/IEC 17024. Fields of knowledge covered within CISSP include security management practices, security design and test systems, access control systems, software development security, business processes security, hardware security, cryptography, telecommunications, Internet security, and business continuity planning.
Find out more information about Progent's Certified Information Systems Security Professionals (CISSP) Consulting Expertise.
CISSP-ISSAP Certified Experts for Secure System Architecture
Progent's ISSAP certified security experts are specialists who have been awarded ISSAP accreditation following rigorous testing and extensive hands-on work with information security architecture. ISSAP security experts have comprehensive knowledge of access control systems and methodologies, telecommunications and network security, cryptography, requirements analysis, business continuity and DRP, and physical security integration. Progent's ISSAP-qualified security consultants can help your business with all phases of secure network architecture.
Read more information about Progent's ISSAP Certified Secure IT Infrastructure Consulting Support.
CISSP-ISSEP Certified Security Engineering Experts
Network Security consultants who have earned CISSP-ISSEP (Information Systems Security Engineering Professional) certification have shown their ability to provide enterprises with the expertise expected of a senior systems engineer, information assurance systems engineer, information assurance officer, information assurance analyst, or senior security analyst. Progent offers the skills of a certified CISSP-ISSEP cybersecurity expert to assist your organization to utilize current system security engineering principles and techniques in system development, evaluate system security designs based on security engineering best practices, produce cohesive system designs that incorporate compliant cybersecurity features for all key system functions, develop efficient design and configuration strategies to deliver protection for operations, perform in-depth risk analysis, and propose realistic cybersecurity solutions that balance your operational requirements with your organization's risk tolerance.
Find out more about Progent's CISSP-ISSEP Cybersecurity Engineering Consulting.
CISA Security Auditor Professional Expertise
The Certified Information Systems Auditor (CISA) credential is a globally recognized qualification that signifies expertise in network security audit and control. Certified by the American National Standards Institute, the CISA credential requires that consultants undergo an exhaustive test overseen by the ISACA professional association. Progent can provide the expertise of a CISA-qualified security professional able to help companies in the fields of information systems audit process, IT enforcement, systems and architecture lifecycle, information technology service delivery, protecting information resources, and disaster recovery planning.
Learn the details concerning Progent's Certified Information Systems Auditor Support Expertise.
CRISC IT Risk Management Specialists
The CRISC program was established by ISACA in 2010 to verify an IT professional's ability to design, implement, and support information system control mechanisms to reduce network risk. Progent can provide the expertise of a CRISC-certified engineer to help you to develop and execute a business continuity or disaster recovery strategy based on leading practices promoted by CRISC and geared to align with your organization's risk tolerance, business goals, and IT budget. Progent's risk mitigation expertise is a good fit the services available from Progent's CISA-certified consultants for objectively auditing your IS management mechanisms and with the services of Progent's CISM experts for implementing company-wide security policies and procedures.
Find out more details about Progent's CRISC-certified Network Risk Mitigation Expertise.
Global Information Assurance Certification Professional Expertise
GIAC (Global Information Assurance Certification) was founded in 1999 to validate the skill of IT security experts. GIAC's goal is to ensure that an accredited professional possesses the knowledge appropriate to provide support in vital areas of system, information, and application program security. GIAC accreditations are recognized by businesses and government organizations throughout the world including United States National Security Agency. Progent offers the help of certified professionals for all of the security capabilities covered within GIAC certification topics such as auditing perimeters, security incident handling, traffic analysis, web services security, and SIEM solutions.
Learn more information concerning Progent's GIAC Information Assurance Support.
Depend on Progent for Computer Security Expertise
If your business is situated in Southfield or anywhere in the state of Michigan and you want network security consulting expertise, phone Progent at 800-993-9400 or see Contact Progent.