Business IT networks in the state of Michigan can have quick and economical remote access to Progent's accredited security consultants to resolve the toughest security issues. The cost is affordable, charges are by the minute, sign-up is quick, and support is world class. Progent also offers help for complex projects that requires the knowledge of senior security consultants with high-level security credentials.
In case your Michigan business is based outside of more populated metropolitan areas such as Detroit, Grand Rapids, Warren, Sterling Heights, Flint, Lansing, or Ann Arbor, support from local accredited network security support specialists could be limited when there's a crisis. This could mean a drop in income for your business, angry clients, idle workers, and distracted executives. By utilizing Progent, you have access to a certified security professional who can offer assistance when you need it to keep your system on line and salvage your information.
Progent can assist you at any level in your efforts to guard your information system with services that ranges from network security checks to creating a company-wide security strategy. Progent provides affordable service to assist companies of any size to set up and maintain safe IT environments powered by Windows and Cisco technology and that may include computers running UNIX, Linux, Sun Solaris, or Mac OS X platforms as well as mobile users with Apple handhelds or Google Android or Windows Phone smart phones and tablets.
Progent can also assist you to outsource spam filtering and protection from e-mail-based security threats. Email Guard is Progent's email security platform that uses the technology of top data security vendors to provide web-based control and comprehensive security for your email traffic. The hybrid structure of Progent's Email Guard managed service integrates cloud-based filtering with an on-premises gateway device to provide advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. The Cloud Protection Layer acts as a preliminary barricade and blocks most unwanted email from making it to your security perimeter. This decreases your vulnerability to inbound attacks and saves system bandwidth and storage. ProSight Email Guard's onsite security gateway appliance adds a deeper layer of analysis for incoming email. For outbound email, the on-premises security gateway provides anti-virus and anti-spam filtering, DLP, and encryption. The on-premises security gateway can also enable Microsoft Exchange Server to monitor and protect internal email traffic that stays inside your corporate firewall.
Progent's security experts are available online or on site to provide a range of emergency or longer-term computer security services including:
If your business has an immediate need for IT security help, refer to Progent's Emergency Online Network Support.
Progent's security experts provide world-class support in key areas of network protection including auditing, firewall/VPN support, and high-level security consulting.
Progent's certified security engineers can assess the strength of your existing network security systems by performing comprehensive remote automated testing via sophisticated software tools and tested procedures. Progent's experience in this testing saves you time and money and assures a detailed portrayal of security holes. The information your company is provided can be used as the basis of a security strategy that will allow your network to operate safely and adapt rapidly to future risks.
Automated Security Analysis
Progent offers expertise in the use of security analysis products including MBSA and GFI LANguard Network Security Scanner for economically running a set of programmed network testing scans to uncover potential security weaknesses. Progent has broad experience with other network analysis utilities including NMAP Port Scanner, AMAP, eEye Vulnerability Scanner, as well as utilities like Metasploit, Netcat, Socat, and Nikto. Progent can show you how to make sense of audit reports and react effectively.
Progent can help you design protection into your business operations, configure scanning tools, define and deploy a secure system architecture, and recommend procedures to optimize the safety of your network. Progent's security consultants are available to show you how to set up a firewall, design secure remote access to email and data, and install virtual private network. Find out more concerning Progent's automated security evaluation.
Security Inventory Service Packages for Small Companies
Progent has put together two ultra-affordable security inventory bundles intended to enable small companies to get an objective security evaluation from a qualified security consultant. With Progent's External Security Inventory Scan, a security engineer administers an extensive examination of your network from beyond your company firewall to uncover possible weaknesses in the security profile you present to the outside world. With Progent's Internal Security Inventory Scan, a security engineer runs a system scan from an authorized machine inside your company firewall to uncover your exposure to inside attacks. The two security inventory packages are set up and run from a secured external location. The process is directed by a consultant with high-level security accreditations and who generates a report that details and interprets the information captured by the security scan and proposes practical improvements where called for.
Stealth Security Penetration Testing Consulting
Stealth penetration checking is a key part of any serious IT system security plan. Progentís security experts can run extensive intrusion tests without the knowledge of your company's in-house network support staff. Stealth penetration checking uncovers whether existing security monitoring tools such as intrusion incident alerts and event history analysis are correctly set up and consistently checked. Learn more about Progent's network penetration testing consulting.
Progent's expertise in network security solutions includes extensive field work with leading firewalls and VPN technology from a variety of companies such as Cisco, Microsoft, and Symantec. Progent offers the services of engineers who have earned key industry certifications including Cisco Certified Internetwork Expert and Microsoft Certified Systems Engineer.
Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX Security Appliances Configuration and Debugging
The new Cisco ASA 5500-X Family Next-Generation Firewalls with Firepower Services provide substantially more bang for the buck than Cisco's previous firewalls and have superseded the ASA 5500 and PIX 500 security appliances for all new installations. After Cisco's acquisition of Sourcefire, the whole line of Cisco ASA 5500-X firewalls can be configured to enable Firepower Services, based on Sourcefire's Snort product, which is the world's most popular intrusion protection system (IPS). Firepower services provide powerful new capabilities such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-qualified CCIE network consultants can help you to maintain your legacy PIX or Cisco ASA 5500 security appliances or migrate efficiently to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer online and onsite support for ASA 5500-X firewalls with Firepower Services and can assist your business to design, configure, optimize, manage and debug firewall environments based around Cisco ASA 5500-X firewalls with Firepower Services. See more information about ASA 5500-X Firewalls with Firepower configuration and debugging services.
Cisco Security and Virtual Private Network Engineering Expertise
Cisco's network security and offsite access products offer a complete range of manageable security solutions to help protect your wired and wireless information system. Cisco's VPN line includes routers, firewalls, intrusion detection systems and Virtual Private Network concentrators. Progent's expert staff of consultants includes field-proven engineers with Cisco's CCIE and Cisco Certified Network Professional qualifications who can help your company to select Cisco Virtual Private Network, Cisco RADIUS Security, and additional Cisco security solutions that fit most closely with your company objectives. Find out additional details concerning Progent's Engineering Services for Cisco Security Solutions and Virtual Private Network Products.
Support Services for Other Firewall and VPN Products
Progent offers small and medium size companies expert consulting for Intrusion Protection products and IPsec VPN technology from leading firewall and Virtual Private Network security companies including WatchGuard, Juniper, and SonicWALL. Progent can show you how to design a comprehensive security plan and choose appropriate technologies from multiple suppliers to support your security objectives while staying within your spending restraints.
Progent's Fixed-price Managed Services for Information Security
Progent's affordable ProSight series of network monitoring and management services is designed to provide small and mid-size businesses with enterprise-class support and cutting-edge technology for all facets of information assurance. ProSight managed services offered by Progent include:
ProSight Active Security Monitoring (ASM): Endpoint Protection and Ransomware Defense
Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection solution that utilizes cutting edge behavior machine learning tools to guard endpoints and servers and VMs against modern malware assaults such as ransomware and file-less exploits, which easily evade traditional signature-based anti-virus tools. ProSight Active Security Monitoring safeguards local and cloud-based resources and provides a unified platform to automate the entire malware attack progression including protection, detection, containment, cleanup, and post-attack forensics. Top features include one-click rollback with Windows VSS and real-time network-wide immunization against new threats. Read more about Progent's ProSight Active Security Monitoring endpoint protection and ransomware recovery.
ProSight Enhanced Security Protection (ESP): Unified Physical and Virtual Endpoint Security
ProSight Enhanced Security Protection (ESP) services deliver affordable multi-layer security for physical and virtual servers, workstations, mobile devices, and Microsoft Exchange. ProSight ESP utilizes contextual security and advanced heuristics for round-the-clock monitoring and responding to cyber threats from all attack vectors. ProSight ESP provides two-way firewall protection, intrusion alarms, endpoint management, and web filtering via leading-edge tools packaged within one agent accessible from a single console. Progent's security and virtualization consultants can assist you to plan and implement a ProSight ESP deployment that meets your organization's specific requirements and that helps you prove compliance with government and industry information security standards. Progent will assist you specify and implement security policies that ProSight ESP will manage, and Progent will monitor your network and react to alerts that require immediate attention. Progent's consultants can also assist your company to install and test a backup and restore system like ProSight Data Protection Services (DPS) so you can get back in business quickly from a potentially disastrous security attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Exchange email filtering.
ProSight Data Protection Services: Managed Backup
ProSight Data Protection Services from Progent provide small and medium-sized organizations an affordable and fully managed solution for secure backup/disaster recovery (BDR). Available at a low monthly cost, ProSight Data Protection Services automates and monitors your backup activities and allows rapid restoration of vital files, apps and VMs that have become lost or damaged as a result of hardware breakdowns, software glitches, disasters, human mistakes, or malware attacks like ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, apps, system images/, plus Hyper-V and VMware virtual machine images/. Important data can be protected on the cloud, to a local device, or mirrored to both. Progent's backup and recovery consultants can deliver world-class support to set up ProSight Data Protection Services to to comply with regulatory requirements such as HIPPA, FINRA, and PCI and, whenever needed, can help you to restore your critical data. Find out more about ProSight Data Protection Services Managed Backup and Recovery.
ProSight Email Guard: Spam Filtering, Data Leakage Protection and Content Filtering
ProSight Email Guard is Progent's spam and virus filtering and email encryption service that uses the technology of leading information security vendors to provide web-based management and world-class protection for all your email traffic. The hybrid structure of Email Guard integrates cloud-based filtering with a local gateway device to provide advanced defense against spam, viruses, Denial of Service (DoS) Attacks, Directory Harvest Attacks (DHAs), and other email-borne malware. Email Guard's Cloud Protection Layer serves as a preliminary barricade and keeps the vast majority of unwanted email from reaching your security perimeter. This reduces your vulnerability to external threats and conserves network bandwidth and storage. Email Guard's onsite gateway device adds a deeper layer of inspection for incoming email. For outbound email, the on-premises gateway offers anti-virus and anti-spam filtering, protection against data leaks, and email encryption. The on-premises gateway can also assist Microsoft Exchange Server to monitor and protect internal email that originates and ends within your corporate firewall. For more details, see Email Guard spam filtering and data leakage protection.
ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
With ProSight Virtual Hosting service, a small or mid-size organization can have its key servers and apps hosted in a secure fault tolerant data center on a fast virtual host set up and managed by Progent's network support professionals. With the ProSight Virtual Hosting model, the customer owns the data, the operating system software, and the applications. Because the system is virtualized, it can be moved easily to a different hosting solution without a lengthy and technically risky reinstallation process. With ProSight Virtual Hosting, you are not tied a single hosting provider. Find out more details about ProSight Virtual Hosting services.
ProSight IT Asset Management: IT Documentation and Password Management
ProSight IT Asset Management service is a cloud-based IT documentation management service that makes it easy to create, maintain, retrieve and protect information about your IT infrastructure, procedures, applications, and services. You can quickly find passwords or IP addresses and be warned about upcoming expirations of SSL certificates ,domains or warranties. By updating and organizing your network documentation, you can save as much as 50% of time spent looking for critical information about your network. ProSight IT Asset Management includes a common location for holding and collaborating on all documents related to managing your network infrastructure such as recommended procedures and How-To's. ProSight IT Asset Management also offers advanced automation for gathering and associating IT information. Whether youíre planning enhancements, performing maintenance, or responding to a crisis, ProSight IT Asset Management gets you the information you need when you need it. Find out more details about Progent's ProSight IT Asset Management service.
Certified Security Planning
Every company ought to have a thoroughly considered security program that includes both preventive procedures and response planning. The proactive strategy is a set of steps that help to reduce vulnerabilities. The post-attack strategy helps your company's network security engineers to assess the impact caused by an attack, fix the system, document the experience, and get business functions restored as rapidly as feasible.
Progent's certified information security consultants are available to assist you to run a comprehensive risk evaluation and create a company-wide security plan to implement security processes and controls to minimize future assaults and dangers.
CISM Accredited Information Security Engineering Assistance
The Certified Information Security Manager (CISM) organization describes the basic capabilities and global standards of performance that information security managers are expected to master. CISM gives business management the confidence that those who have qualified for their CISM certification have the background and knowledge to deliver effective security management and consulting consulting. Progent can provide the expertise of CISM qualified security consultants to help businesses with:
Read additional details about Progent's CISM Certified Network Security Consulting Expertise.
- Network Security Governance
- Vulnerability Analysis
- Network Security Implementation Management
- Information Security Administration
- Recovery Planning
CISSP Accredited Security Engineering Assistance
The CISSP credential denotes expertise with an international standard for data security. ANSI (American National Standards Institute) has granted certification accreditation in the area of data security under ISO/IEC 17024. Progent can provide the services of security professionals who have qualified for CISSP certification. Progent can provide a CISSP-certified consultant to help your company in a variety security areas including:
Find out more details about Progent's CISSP Information Security Consulting Services.
- Security Administration Procedures
- Security Infrastructure and Models
- Access Control Solutions and Processes
- Software Development Security
- Operations Security
- Site Security
- Encryption/Decryption Mechanisms
- Telecommunications, LAN and Internet Security
- Business Continuity Preparedness
CISSP-ISSAP Certified Secure Network Architecture Consulting Services
Progent's CISSP-ISSAP qualified IT architecture professionals are consultants who have earned ISSAP status through thorough testing and extensive experience with information security architecture. The ISSAP certification indicates demonstrated skill in the more complex requirements of information security architecture bounded by the wider field of IS security expertise needed for CISSP certification. Progent's ISSAP-certified security specialists can help your company with all phases of secure network architecture such as.
Learn additional details concerning Progent's ISSAP Certified Secure Information System Architecture Support Professionals.
- Access Management Mechanisms and Methodologies
- Telecom and System Infrastructure Protection
- Data Encryption Options
- Needs Analysis and Security Guidelines
- Business Continuity Planning and Disaster Recovery Planning (DRP)
- Physical Security
CISA Certified Information System Security Auditing Consulting Services
The Certified Information Systems Auditor (CISA) accreditation is a recognized qualification that indicates mastery in network security audit and control. Accredited by ANSI, the CISA credential requires that consultants undergo a comprehensive test administered by the ISACA professional group. Progent's CISA-qualified information security audit consultants can assist your company in the areas of:
Learn additional information concerning Progent's CISA Accredited IS Security Auditing Consulting Expertise.
- Information Systems Audit Services
- IT Administration
- Network Assets and Infrastructure Lifecycle
- Information Technology Service Delivery
- Safeguarding Data Resources
- Business Continuity Preparedness
Certified in Risk and Information Systems Control (CRISC) Consultants
The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA in 2010 to verify a consultant's skills to design, implement, and support information system control mechanisms to mitigate network risk. Progent offers the services of a CRISC-certified consultant to assist your company to create and execute a business continuity or disaster recovery strategy based on leading practices promoted by CRISC and geared to match your organization's risk appetite, business objectives, and budgetary guidelines. Progent's CRISC-certified IT risk mitigation consultants offer a range of risk evaluation services including:
Read additional information about Progent's CRISC Risk Management Experts.
- Collect data and review documentation to identify significant vulnerabilities
- Inventory statutory, industry, and business mandates and company policies related to your network to assess their possible influence on your strategic goals
- Identify possible vulnerabilities for your operational workflows to help in analyzing your enterprise risk
- Create a risk awareness initiative and provide training to make sure your organization understand IS risk so they can contribute to your risk control process
- Match identified risk scenarios to your associated operational processes to help determine risk responsibility
- Validate risk tolerance with your senior management and major stakeholders to ensure they align
GIAC Certified Information System Security Consulting Support
Learn more details about Progent's GIAC Information Assurance Expertise.
Global Information Assurance Certification was founded in 1999 to certify the knowledge of computer security experts. GIAC's mission is to assure that a certified professional has the skills appropriate to deliver support in key categories of network, data, and software security. GIAC certifications are recognized by businesses and institutions around the world including and the U.S. National Security Agency. Progent's GIAC-qualified network security audit experts can assist your business with:
Talk to a Certified Progent Security Engineer
To learn how to contact a certified security engineer for online or on-premises help in Michigan, phone 1-800-993-9400 or visit Remote Computer Support.