Additional Topics of Interest

Microsoft Certified ISA 2004 Standard Edition Server Support Outsourcing
ISA 2004 Server Online Help

Progent's Microsoft-certified Internet Security and Acceleration Server consultants have extensive experience developing ISA Server-based security solutions for IT networks with multiple offices, mobile workers, and line-of-business web applications. Progent's Microsoft Firewall experts can assist your company in planning and implementing a configuration of ISA 2000 Server or ISA Server 2004 that supports your network security needs without adversely limiting your network productivity. Progent's consultants can help you upgrade from Microsoft Proxy Server from Microsoft ISA 2000 to ISA 2006 Enterprise Edition Server or Microsoft ISA 2006 Standard Edition Server.

Windows Server 2008 R2 Technical Consultant
Consultants Windows Server 2008 Active Directory

Windows Server 2008 is a major advance in making information networks more protected and available, easier to virtualize and manage, faster, and able to provide an improved platform for web publishing. Progent can help your business get the most from the enhancements incorporated into Microsoft Windows Server 2008 by providing Microsoft-certified consulting, troubleshooting, education, temporary staffing, network monitoring, and security engineering services.

VPN Online Support Services
Cisco VPN Support and Help

Progent's Cisco Security/VPN professionals and CCIE and CCNP certified support staff can help your small or mid-size business integrate and maintain Cisco's security and VPN products such as routers, switches, firewalls, intrusion detection systems and VPN access concentrators. Cisco VPN products include both remote access and site-to-site VPNs with Cisco IOS Software and Advanced Integrated Module hardware encryption cards, and hardware devices, such as a VPN concentrator, router, Cisco PIX Firewall, or task-specific VPN server for dial-up services. Cisco VPN solutions are simple to administer and offer the flexibility to expand with your changing business requirements. Progent's Cisco-Certified network experts are familiar with Cisco's complete line of hardware and software aimed at eliminating information theft, virus and worm assaults, Denial of Service attacks, and other threats to your network. Progent can show you how to deploy Cisco products to get secure access, intrusion protection, and comprehensive Identity services based on Cisco ACS using RADIUS security and TACACS to establish a central client access control framework for user authentication, permissions, and tracking from an easy-to-use Web interface.

Biggest MSP360 Backup On-site Support
MSP360 Desktop Backup Configuration

Progent can assist you to create, deploy and debug a backup plan built around MSP360 software. MSP360 offers file/folder or image-based backup/restore for virtual machines and physical machines, works with all popular public clouds, and permits businesses to build a data protection ecosystem with a low Recovery Time Objective and a granular Recovery Point Objective. With ProSight DPS 360 Backup, Progent can provide comprehensive monitoring and remote management of your backup environment to prevent data loss resulting from user mistakes, system glitches, malicious users, and malware assaults such as ransomware.

Windows 2008 Cluster Server Consulting Services
Windows Server 2008 Failover Clustering IT Services

The clustering technology built into the high-end versions of MS Windows Server 2008 is dramatically re-engineered to streamline the deployment, configuration, and management of server clusters that offer improved levels of system dependability, security, performance, and flexibility. New or enhanced capabilities include automated cluster verification, easier setup and deployment, improved cluster administration, new cluster infrastructure for increased uptime, better protection and quorum structure, minimization of failure points, greater storage and RAM capacity, and improvements for multi-site clusters. Progent's consultants can help your company evaluate the advantages of failover clusters, plan and execute an installation, educate your network support personnel to administer your failover clusters, provide ongoing consulting and support services, and create and test a business continuity procedure.

Small Business Small Business Network Consulting Company
Small Business Specialists

Progent is a pioneer in cost-effectively providing enterprise-class network help to small companies. Progent's achievement in addressing the IT service requirements of the chronically underserviced small business market is the cumulative outcome of key technical and process breakthroughs that have removed much of the traditional costs out of managing IT service, injected unmatched professional expertise into the support mechanism, and significantly accelerated the solution cycle.

Top Ranked DoubleTake Carbonite Backup Consultant
Computer Consulting Double-Take Replication

DoubleTake/Carbonite Software offers a selection of products designed to deliver small companies a range of affordable alternatives for backing up and restoring business-critical workloads including Microsoft Exchange, SQL, Blackberry, and Microsoft Office SharePoint. Progent's business continuity planning experts have in-depth backgrounds integrating DoubleTake/Carbonite technology into small business information networks to achieve an advanced level of availability and business continuity capability at a budget-friendly cost.

Security Penetration Testing Testing
After Hours Microsoft Certified Penetration Testing Network Consultants

Stealth intrusion testing is a key component of any overall network security strategy. Progent's security experts can perform thorough intrusion checks without the knowledge of your organization's internal IT staff. Stealth penetration checking uncovers whether current security defense tools such as intrusion incident alerts and event history analysis are correctly configured and consistently observed. Progent can provide ongoing autonomous PEN testing to map your internal and external attack surface and to identify ways that exploitable vulnerabilities, improper configurations, stolen credentials, uninstalled patches, and ill-advised product defaults can be chained together by threat actors into the multi-vector attacks common to modern versions of ransomware.

Top CUCM and SIP Network Engineer
SIP Migration Online Troubleshooting

Progent's Cisco CCIE-certified SIP integration consultants can assist you to plan, deploy, maintain, debug and enhance Cisco's SIP (Session Initiation Protocol) infrastructure solutions and Cisco's CUBE-based SIP trunks and offer cost-effective online or on-premises expertise to assist you to migrate smoothly to an advanced communications network that delivers accelerated return on investment. Progent's certified Microsoft unified communications experts can help you to establish interfaces between Cisco's CUBE SBC and Microsoft's VoIP and IP video platforms like Skype for Business Server or Lync for access to a SIP-based IP PSTN trunk.

Consulting ProSight Phishing Protection
Virus Recovery Computer Consultant

Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection solution that incorporates cutting edge behavior-based machine learning technology from SentinelOne to defend endpoints as well as servers and VMs against modern malware assaults such as ransomware and email phishing, which easily evade traditional signature-matching anti-virus products. ProSight Active Security Monitoring safeguards local and cloud-based resources and offers a unified platform to address the entire threat progression including filtering, infiltration detection, mitigation, remediation, and forensics. Key capabilities include single-click rollback using Windows Volume Shadow Copy Service and real-time system-wide immunization against new attacks.

Microsoft Exchange Server 2016 Upgrade Support
Microsoft Exchange 2016 Migration Planning Configuration

Progent can assist you in all facets of your migration to Exchange 2016 including planning high availability (HA) system topology for a local, cloud-based or hybrid deployment; CAL licensing requirements for Exchange 2016 and Windows Server 2012 R2+; migrating mailboxes; Hyper-V strategy; determining storage capacity required for your virtual machines, mailbox databases and logs; setting up hardware load balancing for high-availability client access services; designing, setting up and testing Exchange Servers and Windows Servers and Database Availability Groups (DAGs); setting up collaboration with SharePoint Server or SharePoint Online; preparing your firewall; creating SSL certs; providing client remediation with Office 2010 or greater or Microsoft 365; and configuring Outlook on the web (formerly Outlook Web App).

24 Hour Microsoft 365 Access Development Setup and Support
Microsoft 365 Excel Integration On-site Support

Progent can assist your business to evaluate the many subscription options available with Microsoft 365, previously branded Office 365, and integrate your network with Microsoft 365 so you derive maximum business value. Progent supports multi-platform networks that include Windows, macOS, and Linux technology. Progent can also assist your business to build and maintain hybrid networks that seamlessly integrate on-premises and cloud products and services.

Immediate Best Practices Network Specialists
Tech Outsourcing Best Practices

Progent's staff of Microsoft and Cisco Premier Certified consultants average longer than a decade of real-world industry background, at the front lines of network support, executing a wide variety of IT tasks for a large mix of businesses. Each Progent consultant shares a proven collection of personal best practices which are combined into shared leading practices training that Progent teaches its consulting staff. This ensures that you get not just expert technical skills, but also a consultant with proven approaches for using technical knowledge to repair actual IT problems quickly.