Business IT networks in the state ofAlaskacan have quick and affordable online access to Progent's accredited network security engineers to fix critical security problems. The cost is competitive, charges are by the minute, sign-up is quick, and support is world class. Progent also provides help for long-term engagements that requires the knowledge of senior security consultants with high-level industry credentials.

If yourAlaskanetwork is based away from larger metropolitan neighborhoods such asAnchorage, Juneau, or Fairbanks, access to nearby accredited security engineers is often problematic when you have an emergency. This can result in a drop in income for your business, upset clients, idle employees, and distracted executives. By utilizing Progent's online services, you can get in touch with a Premier security engineer ready to provide assistance when you need it to keep your network on line and recover your information.

Progent can assist you in all your initiatives to protect your network with services that ranges from network security assessments to creating a comprehensive security plan. Progent offers economical support to assist small and midsize companies to design and maintain protected IT environments powered by Windows and Cisco technology and that may include computers based on UNIX, Linux, Sun Solaris, or Mac OS X operating systems as well as BYOD clients with Apple iPhones and iPads or Google Android or Windows Phone handsets.

Progent can also show you how to outsource spam filtering and protection from e-mail-based attacks. Email Guard is Progent's email security platform that incorporates the technology of top data security companies to deliver centralized control and comprehensive security for your inbound and outbound email. The powerful structure of Email Guard managed service integrates cloud-based filtering with a local gateway appliance to offer complete protection against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. ProSight Email Guard's Cloud Protection Layer serves as a first line of defense and keeps the vast majority of unwanted email from making it to your network firewall. This reduces your vulnerability to external attacks and saves network bandwidth and storage. ProSight Email Guard's on-premises security gateway appliance adds a deeper level of inspection for incoming email. For outgoing email, the onsite gateway offers AV and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The on-premises security gateway can also help Exchange Server to monitor and safeguard internal email traffic that stays inside your security perimeter.

Progent's certified professionals are available online or on site to offer a variety of emergency or longer-term IT security services such as:

  • Run thorough network security audits
  • Clean up quickly after virus and worm attacks
  • Configure firewalls from multiple vendors
  • Configure safe methods for offsite and mobile access
  • Install advanced utilities for protection against spam and DHAs
  • Develop a company-wide security strategy with proactive security monitoring
  • Offer comprehensive Help Desk Call Center Services
  • Develop a practical backup and disaster recovery plan built around Microsoft DPM backup capability
If your business has an urgent requirement for computer security support, go to Progent's Urgent Remote Technical Support.

Progent's engineers can deliver world-class services in vital areas of computer security including security assessment, firewalls and VPN, and high-level security planning.

System Audits
Progent's expert security consultants can evaluate the vulnerability of your current network security systems by performing comprehensive remote automated testing via advanced utilities and tested techniques. Progent's experience in administering this service saves your company consulting fees and assures a detailed picture of weaknesses. The knowledge your IT organization gains can form the foundation of a network protection plan that can permit your information system to operate dependably and react rapidly to future risks.

Automated Network Vulnerability Evaluation
Progent offers expertise in the use of security evaluation products such as Microsoft Baseline Security Analyzer and GFI LANguard Network Security Scanner for economically running a set of automatic network auditing scans to uncover potential security vulnerabilities. Progent has broad experience with additional security auditing tools such as NMAP Port Scanner, AMAP application mapper, eEye Vulnerability Scanner, plus utilities such as SolarWinds, Hydra, and Nikto. Progent can help you to make sense of testing reports and respond effectively.

Progent can help you design security into your business operations, configure auditing applications, define and deploy a protected network architecture, and suggest procedures to optimize the security of your network. Progent's security professionals are available to show you how to set up a firewall, implement secure remote connectivity to email and data, and integrate VPN. Learn more on Progent's automated security assessment.

Security Inventory Scanning Bundles for Small Businesses
Progent offers two ultra-affordable security inventory service packages designed to allow small companies to receive an independent security assessment from a certified security expert. With Progent's External Security Inventory Checkup, a security engineer administers a comprehensive examination of your network from beyond your firewalled perimeter to uncover potential risks in the security profile you expose to the public. With Progent's Internal Network Security Inventory Scan, a security expert executes a network scan from an authorized machine inside your firewall to uncover vulnerabilities to inside threats. The two security inventory packages are set up and run from a secured remote location. The project is directed by an engineer who has earned high-level security accreditations and who generates a report that summarizes and analyzes the data captured by the security scan and suggests practical remediation where called for.

Stealth Security Penetration Analysis Support Services
Stealth intrusion checking is an important component of any comprehensive network security strategy. Progentís security experts can perform thorough intrusion checks without the knowledge of your organization's internal IT staff. Stealth penetration testing uncovers whether existing security defense tools such as intrusion incident warnings and event history monitoring are correctly set up and actively monitored. Learn more about Progent's network penetration testing support services.

Firewall and Virtual Private Network Expertise
Progent's background in security technology includes extensive familiarity with major firewalls and VPN products from multiple vendors such as Cisco, Microsoft, and Symantec. Progent can provide the support of consultants who have earned important industry accreditations including CCIE and Microsoft MCSE.

Cisco ASA 5500-X Firewalls with Firepower, ASA 5500 Firewalls, and PIX 500 Security Appliances Integration and Debugging
The current Cisco ASA 5500-X Series of firewalls with Firepower Services offer significantly more performance than Cisco's earlier PIX and ASA 5500 firewalls and have superseded the ASA 5500 and PIX 500 security appliances for all new deployments. Since Cisco's purchase of Sourcefire, the whole line of Cisco ASA 5500-X devices can be configured to support Firepower Services, based on Sourcefire's Snort product, which is the world's most deployed network intrusion protection system. Firepower services provide enhanced features such as advanced malware protection (AMP), URL filtering, real-time threat analytics, and automation. Progent's Cisco-premier CCIE network consultants can assist your company to maintain your current PIX or Cisco ASA 5500 security appliances and upgrade to ASA 5500-X firewalls with Firepower Services. Progent's consultants offer remote and onsite help with ASA 5500-X firewalls with Firepower Services and can help your company to design, integrate, tune, administer and debug firewall solutions built on Cisco ASA 5500-X firewalls with Firepower Services. Read additional details about ASA Firewalls with Firepower configuration and troubleshooting support.

Cisco Security and VPN Consulting Services
Cisco's network security and offsite connection products provide a comprehensive range of easy-to-administer security solutions to help safeguard your local and remote information system. Cisco's Virtual Private Network product family features switches, firewalls, intrusion detection devices and VPN concentrators. Progent's professional consulting staff includes field-proven engineers with Cisco Certified Internetwork Expert and CCNP certifications who can help your organization to evaluate Cisco VPN, Cisco RADIUS Security, and additional Cisco security technologies that align most closely with your business goals. Learn more details concerning Progent's Engineering Expertise for Cisco Security Solutions and Virtual Private Network Appliances.

Support Services for Other Firewall and Virtual Private Network Solutions
Progent provides small and medium size businesses expert support for Intrusion Protection Systems and IPsec VPN solutions from major firewall and VPN security companies including WatchGuard, Juniper Networks, and Symantec. Progent can show you how to design a comprehensive security plan and choose the right products from a variety of suppliers to achieve your security goals while staying within your budget restraints.

Progent's Low-Cost Managed Services for Information Security
Progent's affordable ProSight family of network monitoring and management services is intended to provide small and mid-size organizations with enterprise-class support and state-of-the-art technology for all aspects of information assurance. Managed services available from Progent include:

ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
ProSight Active Security Monitoring is an endpoint protection (EPP) solution that incorporates next generation behavior machine learning tools to defend endpoints as well as servers and VMs against modern malware assaults such as ransomware and email phishing, which routinely evade legacy signature-matching anti-virus tools. ProSight ASM protects local and cloud-based resources and offers a unified platform to automate the entire threat progression including filtering, identification, mitigation, remediation, and forensics. Top features include one-click rollback with Windows Volume Shadow Copy Service and real-time system-wide immunization against new threats. Read more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense.

ProSight Enhanced Security Protection: Unified Physical and Virtual Endpoint Protection
Progent's ProSight Enhanced Security Protection managed services offer ultra-affordable in-depth security for physical servers and VMs, workstations, smartphones, and Exchange email. ProSight ESP uses contextual security and modern behavior analysis for round-the-clock monitoring and reacting to cyber threats from all attack vectors. ProSight ESP delivers two-way firewall protection, intrusion alarms, device control, and web filtering via cutting-edge tools incorporated within a single agent accessible from a unified control. Progent's data protection and virtualization experts can help your business to design and implement a ProSight ESP deployment that meets your organization's unique needs and that allows you achieve and demonstrate compliance with legal and industry data protection regulations. Progent will assist you define and implement security policies that ProSight ESP will manage, and Progent will monitor your network and respond to alerts that require urgent action. Progent can also help you to install and test a backup and restore solution such as ProSight Data Protection Services so you can recover quickly from a potentially disastrous security attack like ransomware. Read more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Microsoft Exchange email filtering.

ProSight DPS: Managed Backup
ProSight Data Protection Services offer small and mid-sized businesses a low cost end-to-end solution for secure backup/disaster recovery (BDR). For a fixed monthly rate, ProSight DPS automates and monitors your backup processes and allows fast restoration of vital files, apps and virtual machines that have become unavailable or damaged as a result of component breakdowns, software glitches, disasters, human mistakes, or malware attacks such as ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, applications, system images, as well as Hyper-V and VMware virtual machine images. Important data can be backed up on the cloud, to an on-promises device, or to both. Progent's cloud backup specialists can provide world-class support to configure ProSight Data Protection Services to to comply with regulatory standards such as HIPPA, FIRPA, and PCI and, when necessary, can assist you to recover your critical information. Find out more about ProSight Data Protection Services Managed Cloud Backup.

ProSight Email Guard: Inbound and Outbound Spam Filtering, Data Leakage Protection and Email Encryption
ProSight Email Guard is Progent's spam and virus filtering service that incorporates the infrastructure of top data security vendors to provide web-based management and world-class protection for your inbound and outbound email. The powerful architecture of Email Guard managed service combines cloud-based filtering with a local security gateway appliance to offer advanced defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. Email Guard's Cloud Protection Layer acts as a preliminary barricade and keeps most unwanted email from reaching your security perimeter. This decreases your vulnerability to inbound threats and saves system bandwidth and storage space. Email Guard's on-premises security gateway appliance provides a further layer of inspection for inbound email. For outgoing email, the on-premises security gateway provides anti-virus and anti-spam filtering, policy-based Data Loss Prevention, and email encryption. The on-premises security gateway can also help Exchange Server to monitor and safeguard internal email that originates and ends within your security perimeter. For more details, see ProSight Email Guard spam filtering and data leakage protection.

ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
With Progent's ProSight Virtual Hosting service, a small or mid-size business can have its critical servers and apps hosted in a secure Tier III data center on a high-performance virtual machine host set up and managed by Progent's IT support experts. With Progent's ProSight Virtual Hosting model, the customer retains ownership of the data, the OS software, and the apps. Since the system is virtualized, it can be moved immediately to an alternate hosting solution without a lengthy and difficult reinstallation procedure. With ProSight Virtual Hosting, your business is not locked into a single hosting service. Learn more about ProSight Virtual Hosting services.

ProSight IT Asset Management: Infrastructure Documentation and Password Management
ProSight IT Asset Management service is an IT infrastructure documentation management service that makes it easy to capture, maintain, find and protect data about your IT infrastructure, procedures, applications, and services. You can instantly locate passwords or serial numbers and be warned automatically about impending expirations of SSLs or domains. By updating and organizing your IT documentation, you can eliminate as much as half of time spent searching for critical information about your IT network. ProSight IT Asset Management includes a common repository for storing and collaborating on all documents related to managing your network infrastructure such as recommended procedures and How-To's. ProSight IT Asset Management also offers a high level of automation for gathering and relating IT data. Whether youíre making improvements, performing maintenance, or reacting to a crisis, ProSight IT Asset Management gets you the information you require as soon as you need it. Find out more details about Progent's ProSight IT Asset Management service.

Certified Security Consulting
Any company should have a carefully considered security strategy that includes both preventive procedures and reaction planning. The proactive strategy is a collection of mechanisms designed to reduce security weaknesses. The post-attack strategy assists your company's network security personnel to evaluate the damage resulting from an attack, fix the system, document the event, and get business functions restored as quickly as possible.

Progent's certified IS security engineers can to assist your company to perform a complete vulnerability assessment and define a computer security strategy to establish security policies and mechanisms to mitigate ongoing assaults and dangers.

CISM Certified Security Support Services
The Certified Information Security Manager (CISM) organization defines the core competencies and global standards of skill that IT security professionals are required to master. It provides business management the confidence that consultants who have earned their CISM certification possess the experience and capability to provide effective security administration and consulting consulting. Progent offers the expertise of CISM Premier security professionals to help businesses with:

  • Network Security Strategies
  • Vulnerability Analysis
  • Network Security Program Management
  • Information Security Administration
  • Recovery Management
Find out more details concerning Progent's CISM Qualified Security Engineering Professionals.

CISSP Certified Security Engineering Assistance
CISSP certification denotes mastery of a worldwide standard for information security. ANSI (American National Standards Institute) has granted certification recognition in the area of data protection stipulated by ISO 17024. Progent can provide the services of security consultants who have qualified for CISSP accreditation. Progent can provide a CISSP-certified professional to help your enterprise in a variety security fields including:

  • Security Administration Procedures
  • Security Infrastructure and Paradigms
  • Access Management Systems and Processes
  • Software Development Security
  • Secure Operations
  • Site Security
  • Encryption/Decryption Technology
  • Telecom, LAN and WAN Security
  • Business Continuity Preparedness
Learn additional information about Progent's CISSP-certified Information Security Consulting Expertise.

CISSP-ISSAP Accredited Secure Network Architecture Consulting Support
Progent's CISSP-ISSAP Certified information system architecture engineers are consultants who have earned ISSAP status through thorough testing and extensive work with information security design. The ISSAP certification represents proven mastery in the more complex requirements of information security architecture bounded by the broader scope of information system security expertise needed for CISSP accreditation. Progent's ISSAP-certified security specialists can help your business with all phases of architecture security including.

  • Access Management Systems and Techniques
  • Telecommunications and Network Infrastructure Security
  • Data Encryption Options
  • Requirements Evaluation and Security Standards
  • BCP and DRP
  • Physical Security
Read more information concerning Progent's ISSAP Certified Secure Network Architecture Consulting Expertise.

CISA Certified IS Security Auditing Consulting Expertise
The Certified Information Systems Auditor credential is a globally recognized qualification that indicates mastery in network security auditing. Certified by the American National Standards Institute (ANSI), the CISA accreditation requires that consultants undergo an extensive test administered by the ISACA professional group. Progent's CISA-qualified network security audit specialists are available to assist your business with:

  • IS Audit Process
  • IT Governance
  • Network Assets and Infrastructure Planned Useful Life
  • IT Service Delivery
  • Protecting Information Resources
  • Business Continuity Planning
Get additional details about Progent's CISA Qualified Security Auditing Engineering Services.

Certified in Risk and Information Systems Control (CRISC) Experts
The Certified in Risk and Information Systems Control (CRISC) certification program was initiated by ISACA in 2010 to validate a consultant's ability to plan, deploy, and support information system control mechanisms to mitigate network risk. Progent offers the expertise of a CRISC-certified engineer to help you to develop and carry out a business continuity or disaster recovery plan that follows industry best practices promoted by CRISC and crafted to match your company's risk tolerance, business goals, and IT budget. Progent's CRISC-certified IT risk management engineers offer a variety of risk assessment services such as:

  • Collect data and review documentation to evaluate significant risk scenarios
  • Identify legal, regulatory, and contractual requirements and organizational policies related to your information system to assess their possible influence on your strategic goals
  • Point out possible vulnerabilities for your operational workflows to help in evaluating your enterprise risk
  • Create a risk awareness program and provide seminars to ensure your stakeholders understand IT risk so they can assist with your risk management process
  • Match key risk scenarios to your associated operational processes to help assign risk ownership
  • Validate risk appetite with executive management and major stakeholders to make sure they match
Get the details about Progent's Certified in Risk and Information Systems Control (CRISC) Experts.

GIAC Accredited IS Security Consulting Expertise
Global Information Assurance Certification was founded in 1999 to validate the knowledge of information technology security professionals. GIAC's mission is to assure that an accredited professional has the skills needed to provide services in key areas of system, information, and application software security. GIAC certifications are recognized by businesses and government organizations around the world including and the United States National Security Agency (NSA). Progent's GIAC-qualified IS security audit engineers are available to assist your IT organization with:

Learn additional information about Progent's GIAC Information Assurance Support.

Talk to a Security Specialist
To learn how you can access a certified Progent security engineer for online or on-premises support in Alaska, call 1-800-993-9400 or go to Online Network Help.

An index of content::

  • 24 Hour Microsoft Expert Helpdesk Outsourcing Services Consultants 24x7 Desktop Help Desk Outsourcing Services Information Technology Consulting
  • 24 Hour SCDPM 2012 Security and Compliance Online Troubleshooting SCDPM 2012 Technical Support
  • 24-7 IT Consulting Dynamics GP/Great Plains Microsoft GP/Great Plains Professional
  • 24-Hour Microsoft Exchange 2007 Services Exchange 2007 Edge Server Online Help
  • Alaska 24/7/365 Security Network Intrusion Penetration Testing
  • 24-Hour Microsoft Exchange Server 2016 Migration Planning Support and Help Exchange 2016 Upgrade IT Consultant
  • 24/7/365 Information Technology Support Microsoft SQL Server Anchorage Alaska Network Recovery SQL 2014 Anchorage Dimond Center
  • 24x7x365 Remote Data Backup and Restore Service Specialists Remote Data Backup and Restore Service Professional
  • Anchorage Dimond Center Network Consultant Security Security Forensics Services Anchorage Alaska
  • Anchorage Small Business IT Support Firm Computer Support Companies Anchorage

  • At Home Employees Network Infrastructure Consultant
    At Home Workforce Network Infrastructure Online Support

    Progent can help small and mid-size businesses to design, set up and debug the network infrastructure to support at-home workers.

  • Anchorage Windows Server 2012 R2 IT Consulting Ted Stevens Airport Anchorage ANC Windows Server 2012 R2 Technology Support
  • Anchorage, AK Gentoo Linux, Solaris, UNIX Professionals CentOS Linux, Sun Solaris, UNIX Consultants Anchorage
  • Apple Airport Help and Support Mac Network Technology Professional
  • Biggest Computer Outsourcing Consultants BlackBerry BES Anchorage, AK BlackBerry Exchange Support Outsourcing
  • BlackBerry Smartphone Technical Consultant Network Consultants BlackBerry Enterprise Server
  • CRISC Risk Evaluation Technical Consultant Computer Consulting CRISC Certified Cybersecurity
  • Security Audits Security Alaska - Anchorage, AK, Juneau, AK, Fairbanks, AK, Ketchikan, AK
  • Cisco CCIE Voice Consultant Telecommuting Jobs Anchorage Muldoon Mall Part-Time Jobs CISSP Consultant Ted Stevens Airport Anchorage ANC

  • Dynamics GP Report Writer Consultant Services
    Dynamics GP Enterprise Reporting Consultant Services

    Dynamics GP accounting includes analytics and reporting features that allow you to monitor all operations, sales and spending, and sales trends with built-in drill-down, query, and reporting capabilities. Progent's Microsoft Dynamics GP reporting consulting services can enable you to create reports that allow you to understand your business more thoroughly, turning raw data into useful business information. Progent can enhance your reporting and analytics by providing Crystal Reports expertise, FRx help, and Microsoft Excel programming. In addition to delivering reporting help, Progent can supply Microsoft .NET support, Microsoft SQL Server help, and programming design with VBasic, XML and other tools in order to deliver custom line-of-business software development and eCommerce solutions that integrate transparently with Dynamics GP/Great Plains.

  • Security Evaluation Security
  • Cisco Small Business Computer Consulting Firm Anchorage, AK Cisco Configure Anchorage Muldoon Mall
  • Cisco Systems Engineer Anchorage Alaska Alaska - Anchorage, AK, Juneau, AK, Fairbanks, AK, Ketchikan, AK Top Quality Cisco Server Installation
  • Computer Consultancy Group SQL Alaska SQL Networking Consultant Anchorage, AK, Juneau, AK, Fairbanks, AK, Ketchikan, AK
  • Consultant Services VMware Site Recovery Manager and NSX Consultants VMware SRM and NSX Disaster Recovery
  • Consulting Services ProSight IT asset documentation management ProSight infrastructure documentation management Professionals
  • Contract Jobs Microsoft MCP Consulting Work From Home Job MCSE Support Danville, CA
  • Emergency Windows SharePoint Services Information Technology Consulting Configuration Office SharePoint Server 2007
  • Engineer Lync Server 2013 security Lync Server 2013 Persistent Chat Services
  • Exchange Integration Firm Exchange Network Solutions Anchorage, Juneau, Fairbanks, AK

  • Professional QTS Data Center
    QTS Sacramento Internet Data Center Consultancy

    The QTS (formerly Herakles) Data Center facility is situated in the seismically-stable Natomas neighborhood of Sacramento, CA. If your business is currently using the QTS Sacramento data center as a colocation site or if you are planning on migrating your primary or disaster recovery system to Herakles/QTS, Progent offers a variety of cost-effective consulting services such as colocation migration, equipment installation and updates, network optimization, comprehensive project management, virtual server expertise, offsite monitoring, streamlined network administration, application development, business continuity solutions, data security evaluation, and the support of Progent's Test Lab.

  • Fault Tolerant Inter-Office Connection Engineer Clustered Server Computer Consulting
  • Forefront TMG 2010 Technical Support 24 Hour Forefront Network Inspection System Support and Integration
  • Fortinet 300 Series Firewalls Technology Consulting Services Consultant Fortinet Firewall IPS
  • IT Outsourcing and Co-sourcing Whitepaper Small Business IT Outsourcing Article
  • IT Services Windows Server 2008 Hyper-VI Microsoft Windows 2008 R2 Computer Engineer
  • Jabber Screen Sharing Information Technology Consulting Integration Jabber and Webex

  • Onsite Technical Support SQL Server Analysis Services
    Microsoft SQL Server 2012 AlwaysOn Availability Groups Computer Consulting

    Progent can provide the support of certified engineers and experienced software programmers, database administrators, project management experts, Cisco-certified network engineers, business continuity planning specialists, and certified security consultants to help you to evaluate the potential advantages of SQL Server 2012 for your organization, set up test environments at your site or at Progent's lab, design and carry out a smooth transition to SQL Server 2012 from previous versions of SQL Server or from other RDBMS solutions, and define a cost-effective and secure IT infrastructure that helps you maximize the strategic benefit of SQL Server 2012.

  • Juniper Junos Network and Security Manager Cybersecurity Organization 24 Hour Compliance Audit Juniper Junos Management
  • Largest Microsoft GP/Great Plains Setup and Support Dynamics GP Great Plains Software Professionals
  • Louisiana Computer Consulting Company Computer Support Ohio
  • Lync Server 2013 Support and Integration Technology Professional Lync Server 2013 and Android
  • Meraki MS 400 Series Switch Support Outsourcing Engineer Meraki Switch Redundancy
  • Microsoft Exchange 2003 Upgrade Computer Engineer Top Migration Consultants Exchange 2003 Server
  • Microsoft Exchange 2010 Network Services Ted Stevens Airport Anchorage ANC Best Microsoft Exchange 2016 Computer Support Firms Anchorage Muldoon Mall
  • Microsoft Exchange 2010 Upgrade Network Engineer Exchange 2010 Online Consulting

  • CRISC Certified Cybersecurity Technology Consulting Services
    Best Risk Assessment Technical Consultant

    Progent's disaster recovery support and business continuity consultants can show you how to design a disaster recovery strategy to prepare for an IT system disaster. Progent can show you how to create a complete disaster recovery strategy that incorporates scheduled disaster recovery evaluations and drills. Progent's Microsoft and Cisco-certified consultants can also show you how to create an affordable, non-stop system architecture that takes into account availability issues covering a wide range of network technologies and procedures.

  • Microsoft MCA Consultant Part-Time Job Adelaide MCSE MCSA MCDBA MCIPT MCA Consulting Job Opportunity Newcastle, Australia
  • Microsoft Operations Manager Case Study MOM 2005 Case Study
  • Microsoft SCOM 2012 Migration Online Troubleshooting Microsoft System Center OpsMgr 2012 R2 Integration Support
  • Microsoft System Center Operations Manager Onsite Technical Support Open Now Troubleshooting System Center Operations Manager
  • Microsoft Windows 7 Upgrade Remote Support Services Top Windows 7 Upgrade Engineer
  • Microsoft and Apple Mac Desktop Software Recovery Microsoft Desktop Design Company

  • Microsoft Office System Computer Network Specialist
    Microsoft Office System Computer Service Companies

    To deliver economical network support for small companies, Progent offers full-service computer outsourcing plans that give small businesses quick access to technical help without requiring you to hire, educate, and manage an expensive in-house IT team. Progentís IT outsourcing packages offer you an affordable alternative for creating a secure and reliable environment for your favorite Microsoft Windows office productivity applications including Office XP and Microsoft Office 2003.

  • Network Device Configuration Management Specialists IP Address Management Integration Services
  • Office 365 Exchange Online and on-premises Exchange IT Consultants Office 365 integration with on-premises environments Configuration
  • Online Troubleshooting Mac Office Microsoft Outlook for Mac Specialist
  • Open Now Technical Support Services Windows Server 2012 R2 Multitenancy 24-7 Windows Server 2012R2 Data Deduplication Technical Support
  • Position Microsoft MCA Support San Jose Microsoft Consultant Contract Job Mountain View, CA

  • Windows 8 Consultancy
    Microsoft Windows Professionals

    Progent's engineers can deliver a range of IT outsourcing and co-sourcing services to help organizations of any size to install, manage, and support IT systems that incorporate workstations, notebooks, tablets, or Windows phones based on Windows 8.1. For enterprises, Progent's senior project managers can help set up testing environments to assess Microsoft Windows 8.1 and develop and implement Windows 8.1 migration plans following leading practices.

  • ProSight DPS Hybrid Cloud Backup/Recovery Services Offsite BDR Services Support and Integration
  • Alaska Auditor Firewall
  • ProSight Remote Network Infrastructure Troubleshooting Computer Consultant Automatic Network Infrastructure Diagrams Troubleshooting
  • ProSight Virtual Hosting Consult Private Cloud Virtual Datacenter Hosting Consult
  • Professional ProSight VM Hosting Top Quality ProSight Small Business Private Clouds Services
  • Proxim Remote Support Services Proxim Technical Support
  • RIM Blackberry Network Consultant After Hours RIM BlackBerry Exchange Computer Engineer

  • Ubiquiti XG Security Gateway Technology Professional
    Engineers Ubiquiti UniFi WiFi AP

    Ubiquiti's UniFi line of Wi-Fi infrastructure devices includes a wide selection of Wave 2 Wi-Fi access points (APs), security gateways, and managed switches. UniFi appliances running across multiple venues with thousands of access points can be remotely configured and managed with free UniFi Controller software, which centralizes and simplifies setup, discovery, management, tuning, troubleshooting, monitoring, and reporting. Progent can provide the expertise of veteran wireless consultants who can help you to assess the benefits of Ubiquitiís UniFi products for your business and assist you to design, install, manage, and troubleshoot your UniFi ecosystem.

  • Remote Anchorage Information Technology Consulting Firms Microsoft Certified Expert Anchorage IT Outsourcing Companies

  • At Home Employees Endpoint Management Consultant
    24-Hour At Home Workforce Endpoint Management Support and Help

    Progent can help small and medium-size businesses to configure unified remote endpoint management and monitoring tools for administering endpoint devices used by teleworkers.

  • Remote Troubleshooting SCVMM 2016 Hyper-V Clusters Integration Support SCVMM 2016 Storage Replica
  • Remote Troubleshooting wireless IP phones and Cisco Unified Communications Manager wireless VoIP phone integration Professional
  • SMS Upgrade Support and Integration Onsite Technical Support SMS 2003 Upgrade
  • SQL Server 2016 Security Information Technology Consulting Remote Configuration SQL Server 2016 Data Warehousing

  • Services Documentation Integration Services
    Service Database Configuration

    Progent uses an enterprise-class service reporting system that stores and organizes detailed documentation for all billed services. Unlike many freelance consultants or local support organizations who offer minimal documentation or specifics of tasks done, every service delivered by Progent is accompanied by full documentation. Each Progent staff member has access to the support reports transmitted by each staff member to each customer. The practice of detailing and archiving support records results in more efficient service and eliminates a slew of typical misfortunes such as when a service customer is effectively held hostage to a consultant who wonít release the keys to the kingdom.

  • Firewall Forensics Services Anchorage, AK, Juneau, AK, Fairbanks, AK, Ketchikan, AK
  • Security Security Auditing Alaska - Anchorage, AK, Juneau, AK, Fairbanks, AK, Ketchikan, AK Security Security Organizations Alaska
  • Setup and Support Exchange 2019 Hybrid Integation Exchange 2019 and Skype for Business Professionals
  • CISSP Technical Support Services Alaska
  • Small Business Consulting Service Small Office Computer Services
  • Small Business Online Support Services Support Services Small Office
  • Solaris Remote Professional After Hours Linux Remote Consultants

  • Microsoft ISA 2004 Server Support and Setup
    Online Troubleshooting ISA 2004 Server

    Progentís Microsoft certified consultants provide small and medium sized businesses consulting services for Microsoft Forefront Threat Management Gateway and ISA Servers. Microsoft's Forefront TMG and Internet Security and Acceleration Servers include a full featured application-layer aware firewall that can protect your IT network from attack by external and inside threats. Forefront TMG and ISA Server provide thorough examination of Internet protocols such as HTTP, which enables these security platforms to uncover many attacks that can get by traditional firewalls. The integrated firewall and VPN architecture of Forefront TMG and ISA Server support stateful filtering and inspection of all VPN traffic. ISA Servers are the centerpiece of Microsoft's system security strategy, and Progent's Microsoft-certified experts and CISSP, CISA and CISM certified security consultants can help you strengthen your IT protection through expert design and integration of Forefront Threat Management Gateway and ISA Servers. Progent's Microsoft-certified engineers can help you to configure Microsoft Forefront Threat Management Gateway 2010, maintain all versions of ISA Server, or upgrade smoothly from ISA Server to Microsoft Forefront TMG.

  • Solaris System Repair OpenBSD Server Troubleshoot Expert
  • Support Services Exchange Server Specialists Microsoft Exchange
  • Support and Help SCCM 2016 Mobile Device Management Outsourcing SCCM 2016 Azure Integration

  • Microsoft Project Server Workflow Training Professional
    Project Server Time Reporting Applications Support

    Progent's Microsoft-certified engineers offer in-depth support in implementing, using and troubleshooting all versions of Project Server and can provide a wide range of cost-effective remote consulting services following industry best practices to help businesses of all sizes to get all the advantages of this leading project management solution. Consulting support offered by Progent include system planning, installation and migration, setting up safe file and status sharing among local and offsite users, network infrastructure optimization, and customized online training classes.

  • Support and Setup Microsoft Operations Manager Support and Integration System Center Operations Manager
  • Support and Setup SharePoint Server 2007 Anchorage Alaska Best Support Outsourcing SharePoint Server 2010 Anchorage Muldoon Mall
  • Support and Setup UNIX Anchorage, Juneau, Fairbanks, AK 24x7 Redhat Support Outsourcing Anchorage, Alaska
  • Symantec Security Firewall Network Install Symantec Raptor Secure
  • Top Computer Engineer Wi-Fi RF Coverage Maps WLAN Site Survey Remote Support Services
  • Top Quality Remote Workers VoIP Consultants Teleworker VoIP IT Consulting
  • Urgent Remote Support Services Microsoft Exchange 2010 Upgrade 24/7/365 Microsoft Exchange Server 2010 Migration Technology Consulting
  • Security Information systems Security Outsourcing Alaska
  • Urgent SharePoint Computer Support Consultant Anchorage, Alaska After Hours Network Design Consultant SharePoint Anchorage Alaska
  • Urgent Small Office Tech Consultants Small Business Professional
  • WLAN Site Survey Online Support Services Wi-Fi RF Coverage Maps Setup and Support
  • Alaska Security Security Group
  • Windows 8 Engineers Microsoft Windows 8.1 Upgrade Outsource IT

  • 24x7x365 Microsoft Exchange 2003 Upgrade Computer Consultants
    Exchange 2003 Network Engineer

    Progent's Microsoft certified support team can help you design and implement an efficient in-place Microsoft Exchange 2003 upgrade strategy that avoids productivity downtime, simplifies ongoing support requirements, and makes your Microsoft Exchange 2003 Server easy to administer. For complex multi-server or multi-location upgrades, Progent offers the knowledge and experience to complete your project rapidly and economically. Progent's Microsoft Exchange 2003 help, troubleshooting, and consulting offerings include expertise with the configuration of third-party add-ons to Exchange Server 2003 that are best aligned to your business goals.

  • Windows Server 2008 DirectAccess Computer Consulting Microsoft Certified Partner Information Technology Consulting Windows Server 2008 Security
  • Windows Server 2012R2 Private Cloud Setup and Support Windows Server 2012R2 Hyper-V Virtual Switch Integration Support
  • Windows Server 2016 Hybrid Solutions Support and Integration Remote Support Windows Server 2016 VM Load Balancing
  • Windows Technology Consultants Alaska Windows Integration Consultants Alaska

  • Contract Job Freelance Cisco Consulting
    Computer Consulting Telecommuting Job

    If you are a network engineer with system support experience, joining Progent and working for Progent's customers will expand your skills through interaction with Progent's team of motivated, world-class consulting experts. Progent's commitment to offering network consulting and technical support to small and midsize businesses will give you the opportunity to work in depth with decision makers and contribute tangibly to the success of exciting companies. Also, Our virtual office environment provides state-of-the-art technology for remote service and wireless access to help you to come up with fast solutions when you take on business-critical issues.

  • Work from Home Video Conferencing Computer Consultant Immediate Work at Home Video Conferencing Remote Technical Support
  • Zero Downtime Network Technical Support Services Mission Critical Environment Help and Support

  • © 2002-2020 Progent Corporation. All rights reserved.