Ransomware : Your Worst Information Technology Nightmare
Crypto-Ransomware  Remediation ConsultantsRansomware has become an escalating cyberplague that represents an extinction-level threat for businesses of all sizes poorly prepared for an attack. Multiple generations of ransomware like the CrySIS, CryptoWall, Bad Rabbit, NotPetya and MongoLock cryptoworms have been out in the wild for years and continue to inflict damage. Newer variants of ransomware such as Ryuk, Maze, Sodinokibi, DopplePaymer, Lockbit and Nephilim, plus daily unnamed newcomers, not only do encryption of online critical data but also infiltrate any configured system backups. Information synchronized to the cloud can also be encrypted. In a poorly architected system, this can make automated recovery impossible and effectively sets the entire system back to zero.

Retrieving services and data after a ransomware intrusion becomes a race against time as the targeted business fights to stop lateral movement and clear the virus and to resume mission-critical operations. Because crypto-ransomware takes time to replicate, attacks are often launched during nights and weekends, when penetrations in many cases take longer to uncover. This multiplies the difficulty of promptly assembling and organizing a knowledgeable mitigation team.

Progent has a variety of services for securing Dayton enterprises from ransomware events. Among these are team member education to help recognize and not fall victim to phishing exploits, ProSight Active Security Monitoring (ASM) for remote monitoring and management, in addition to deployment of modern security appliances with AI technology to intelligently detect and extinguish day-zero cyber threats. Progent also offers the assistance of veteran ransomware recovery consultants with the skills and perseverance to restore a compromised network as urgently as possible.

Progent's Ransomware Restoration Help
Subsequent to a ransomware penetration, paying the ransom demands in Bitcoin cryptocurrency does not provide any assurance that cyber hackers will return the needed codes to unencrypt all your information. Kaspersky Labs determined that seventeen percent of ransomware victims never recovered their information even after having sent off the ransom, resulting in additional losses. The risk is also very costly. Ryuk ransoms frequently range from 15-40 BTC ($120,000 and $400,000). This is greatly higher than the typical crypto-ransomware demands, which ZDNET determined to be approximately $13,000 for smaller organizations. The alternative is to setup from scratch the essential components of your Information Technology environment. Without access to complete information backups, this calls for a wide complement of IT skills, top notch project management, and the capability to work continuously until the task is completed.

For twenty years, Progent has made available expert IT services for businesses across the U.S. and has achieved Microsoft's Gold Partnership certification in the Datacenter and Cloud Productivity competencies. Progent's pool of subject matter experts (SMEs) includes engineers who have attained advanced industry certifications in foundation technologies like Microsoft, Cisco, VMware, and popular distributions of Linux. Progent's cyber security consultants have garnered internationally-recognized certifications including CISA, CISSP, ISACA CRISC, and SANS GIAC. (Refer to Progent's certifications). Progent also has expertise with financial management and ERP software solutions. This breadth of expertise affords Progent the ability to efficiently determine necessary systems and organize the surviving components of your computer network environment following a ransomware event and rebuild them into a functioning system.

Progent's recovery team deploys state-of-the-art project management systems to coordinate the complex restoration process. Progent knows the urgency of working quickly and in unison with a customerís management and Information Technology resources to prioritize tasks and to put key services back online as fast as humanly possible.

Client Story: A Successful Ransomware Virus Recovery
A small business escalated to Progent after their company was penetrated by the Ryuk crypto-ransomware. Ryuk is thought to have been launched by North Korean state hackers, suspected of adopting strategies exposed from the United States National Security Agency. Ryuk goes after specific companies with little room for disruption and is among the most profitable versions of crypto-ransomware. Well Known targets include Data Resolution, a California-based data warehousing and cloud computing business, and the Chicago Tribune. Progent's customer is a small manufacturing business headquartered in the Chicago metro area and has about 500 workers. The Ryuk penetration had paralyzed all essential operations and manufacturing capabilities. Most of the client's system backups had been directly accessible at the start of the attack and were eventually encrypted. The client was evaluating paying the ransom demand (more than two hundred thousand dollars) and wishfully thinking for the best, but ultimately brought in Progent.


"I canít tell you enough in regards to the help Progent gave us throughout the most fearful time of (our) companyís survival. We most likely would have paid the cyber criminals if it wasnít for the confidence the Progent experts provided us. The fact that you were able to get our messaging and key servers back in less than one week was something I thought impossible. Every single person I spoke to or messaged at Progent was laser focused on getting us back on-line and was working non-stop to bail us out."

Progent worked hand in hand the client to quickly determine and assign priority to the critical systems that had to be recovered in order to resume departmental functions:

  • Windows Active Directory
  • Microsoft Exchange Server
  • Accounting/MRP
To start, Progent followed Anti-virus incident response best practices by isolating and removing active viruses. Progent then started the process of restoring Active Directory, the core of enterprise environments built upon Microsoft Windows Server technology. Microsoft Exchange email will not work without Active Directory, and the businessesí accounting and MRP applications used Microsoft SQL, which requires Active Directory for access to the database.

In less than 2 days, Progent was able to restore Windows Active Directory to its pre-virus state. Progent then helped perform reinstallations and storage recovery of key servers. All Exchange Server schema and configuration information were intact, which accelerated the restore of Exchange. Progent was also able to collect non-encrypted OST data files (Outlook Offline Data Files) on user PCs in order to recover email data. A recent offline backup of the customerís financials/ERP systems made them able to recover these required services back online. Although a large amount of work was left to recover completely from the Ryuk attack, the most important services were restored rapidly:


"For the most part, the assembly line operation did not miss a beat and we made all customer orders."

Throughout the next month important milestones in the restoration process were completed in close collaboration between Progent team members and the customer:

  • Self-hosted web applications were brought back up with no loss of information.
  • The MailStore Exchange Server exceeding 4 million archived messages was brought online and accessible to users.
  • CRM/Product Ordering/Invoicing/Accounts Payable (AP)/AR/Inventory Control functions were 100% restored.
  • A new Palo Alto 850 firewall was installed and configured.
  • 90% of the user PCs were back into operation.

"So much of what happened during the initial response is nearly entirely a fog for me, but I will not forget the urgency all of the team put in to help get our business back. Iíve been working with Progent for the past ten years, possibly more, and each time Progent has shined and delivered. This time was a Herculean accomplishment."

Conclusion
A probable company-ending disaster was avoided through the efforts of top-tier experts, a broad array of subject matter expertise, and tight teamwork. Although in post mortem the crypto-ransomware virus attack described here could have been disabled with modern cyber security solutions and NIST Cybersecurity Framework best practices, user education, and properly executed security procedures for data backup and keeping systems up to date with security patches, the reality is that state-sponsored hackers from China, Russia, North Korea and elsewhere are tireless and are not going away. If you do fall victim to a ransomware penetration, feel confident that Progent's team of experts has a proven track record in ransomware virus blocking, cleanup, and file disaster recovery.


"So, to Darrin, Matt, Dan, Claude, Jesse, Arnaud, Allen, Tony and Chris (and any others that were helping), thank you for allowing me to get rested after we made it through the initial fire. Everyone did an fabulous effort, and if anyone is visiting the Chicago area, dinner is the least I can do!"

Download the Ransomware Cleanup Case Study Datasheet
To review or download a PDF version of this ransomware incident report, please click:
Progent's Ransomware Incident Recovery Case Study Datasheet. (PDF - 282 KB)

File body_ransomware_recovery_contact_city.asp does not exist



An index of content::


  • Dayton Netwalker Crypto-Ransomware Cleanup Dayton Huber Heights Kettering
  • 24 Hour Catalyst 802.11ax Access Point Computer Consultants Support and Help Catalyst Wi-Fi Access Point

  • Microsoft Office Consolidate
    IT Manager Microsoft Office System

    Progentís IT outsourcing packages offer budget-friendly network support for small organizations. Whether it includes designing network architecture, setting up an in-house Help Desk or using an outside one, deploying an updated email platform, monitoring your network, or creating an on-line business solution, outsourcing your network technical services can contain costs and minimize uncertainties, permitting network service budgets to increase in a more linear and controlled manner than is feasible by assembling a large, all-purpose in-house IT staff. Progentís Outsourcing White Paper and datasheets show how Progent can help you build a protected and highly available network architecture for your vital business software powered by Windows such as Microsoft Office XP, Microsoft Office 2003, and Microsoft Office 2000.

  • 24 Hour Dayton DopplePaymer Crypto-Ransomware Settlement Help Dayton Ohio 24x7 Dayton Ryuk Ransomware Settlement Negotiation Help
  • 24 Hour SharePoint Server 2007 Technology Consulting Services Dayton, OH, United States Microsoft SharePoint 2010 Support Outsourcing Dayton, OH
  • 24-Hour iPad Professional iCloud Professional
  • 24/7 CentOS Linux Network Engineer Biggest Gentoo Linux Online Consulting
  • 24/7 Cisco Switch Computer Consultant Online Cisco Certified CCIE Network Engineer
  • 24/7 Computer Consultants Catalyst 802.11ax AP Catalyst Wi-Fi 6 AP Configuration Network Consultant
  • 24/7/365 Private Cloud Integration Professional ProSight Private Cloud Services Specialists
  • 24/7/365 Services Citrix StorageLink Site Recovery Citrix for Hyper-V Services
  • 24/7/365 ransomware business recovery Specialists Specialists Egregor ransomware recovery
  • 24 Hour Dayton Snatch Crypto-Ransomware Cleanup Dayton, OH
  • 24x7 Azure and iPhone integration Specialist Microsoft Azure AD configuration Contract Programming Firm
  • 24x7 Microsoft MCA Remote Support Job Opening Australia Top Rated Microsoft Certified Consultant Work From Home Job Australia
  • 24x7 Network Engineer Service Reports Service Reports Configuration

  • ISA 2004 Standard Edition Server Engineer
    ISA 2004 Standard Edition Server Network Consulting

    Progentís Microsoft certified consultants provide small and medium sized companies consulting services for Microsoft Forefront Threat Management Gateway and ISA Servers. Microsoft's Forefront TMG and ISA Servers contain an advanced application-layer aware firewall that can secure your IT system from attack by external and internal threats. Forefront Threat Management Gateway and ISA Server perform deep inspection of Internet protocols such as Hypertext Transfer Protocol, which enables these security platforms to uncover many threats that can get by traditional firewalls. The combined firewall and VPN architecture of Forefront Threat Management Gateway and ISA Server permit stateful filtering and inspection of all VPN streams. ISA Servers are the mainstay of Microsoft's network security strategy, and Progent's Microsoft-certified experts and CISSP, CISA and CISM certified security consultants can help you strengthen your IT protection through expert planning and integration of Forefront Threat Management Gateway and ISA Servers. Progent's Microsoft-certified consultants can assist you to install Microsoft Forefront TMG 2010, manage and troubleshoot all versions of ISA Server, or upgrade from ISA Server environments to Microsoft Forefront Threat Management Gateway.

  • 24x7 Network Integration Comprehensive Event Management Troubleshooting
  • Dayton Hermes Ransomware Removal Dayton Ohio, U.S.A.
  • 64-bit Migration Professionals 64-bit Processing Professionals
  • Active Directory Exchange Online Technical Support Remote Troubleshooting Azure AD
  • After Hours Windows Server 2012 R2 Security Specialists Microsoft Windows Server 2012R2 Computer Consultants
  • Aironet AP Management Setup and Support Aironet 1600 Access Point Technical Consultant
  • Aironet Access Point Security IT Consulting Aironet Ruggedized APs Remote Support Services
  • Amazon MWS integration training Programming Amazon MWS integration training Reports
  • Dayton Egregor Ransomware Restoration Dayton, OH
  • Anti-Virus Support and Setup Antivirus Support and Integration
  • Apple OS X Tiger Specialist Apple OS X Tiger Technical Support
  • Dayton DopplePaymer Crypto-Ransomware Repair Dayton
  • Article IT Co-sourcing IT Outsourcing Model Article
  • At Home Workforce Consulting Services - Dayton - Cloud Integration Technology Expertise Dayton Offsite Workforce Dayton Consulting Experts - Cloud Solutions Assistance
  • At Home Workforce Dayton Assistance - IP Voice Systems Consulting Experts Dayton Dayton Centerville Trotwood Dayton Remote Workforce IP Voice Technology Consultants
  • Avaddon Ransomware Hot Line Dayton Ohio Spora Ransomware Hot Line Dayton
  • Biggest Online Support Services ISA 2004 Firewall Top Ranked Professional ISA Server
  • Business Portal for Dynamics GP Consultant Services Integration Microsoft Dynamics GP
  • CCNP Expert Certified Integration Support ASA 5500-X Firewall with Firepower CCIE Certified Professional Firepower Services
  • CRISC Certified Risk and Information Systems Control Specialists CRISC Security Firms
  • Catalyst 9105i Access Point IT Consultants Catalyst 9120AX Access Point Support and Help

  • SIP PSTN Trunks Onsite Technical Support
    SIP Trunking Computer Consultant

    Progent's Cisco-certified SIP infrastructure experts can help you to design, integrate, maintain, troubleshoot and enhance Cisco's SIP (Session Initiation Protocol) infrastructure technology and Cisco's CUBE (Cisco Unified Border Element)-based IP PSTN trunks and can provide affordable remote or onsite expertise to assist businesses to migrate smoothly to a modern communications network that delivers fast ROI. Progent's certified Microsoft unified communications consultants can assist you to establish interfaces between Cisco's CUBE SBC and Microsoft's rich media applications such as Skype for Business Server or Lync for connectivity to a SIP-based IP PSTN trunk.

  • Catalyst Switch VSS Professional Catalyst 3850 Switch IT Consultants
  • Dayton NotPetya Crypto-Ransomware Operational-Recovery Dayton, OH
  • Cisco Aironet Support and Help Wireless LAN Integration

  • Radvision Video Conferencing Professionals
    24x7x365 Videoconferencing Online Support

    Progent offers access to a veteran specialist with years of hands-on experience installing, managing, and upgrading immersive telepresence platforms from leading vendors such as Cisco/TANDBERG, Polycom, LifeSize, and Radvision. Progent's consultants can coordinate with your internal IT management group, your ISP, and your telepresence platform vendor to help your organization maximize the business value of your telepresence solution.

  • Cisco Expert wireless IP phones and CUCM Specialist 24 Hour wireless VoIP phone integration Onsite Technical Support
  • Immediate Dayton Hermes Crypto-Ransomware Data-Recovery Dayton Huber Heights Kettering, USA
  • Cisco Technical Consultants Dayton Ohio Immediate IT Outsourcing Group Cisco Dayton Centerville Trotwood, United States
  • Cisco VoIP Consulting Consulting Cisco Voice over IP
  • Dayton Dharma Ransomware Operational-Recovery Dayton, OH
  • Citrix HDX Professionals Citrix desktop virtualization Consultant Services
  • Coding IIS Top Quality Accounting System Contract Programmer

  • Microsoft ISA 2004 Server Consultant Services
    ISA 2004 Enterprise Edition Server Integration Services

    Progent's Microsoft-certified Internet Security and Acceleration Server consulting experts have extensive backgrounds developing Microsoft-based security solutions for information systems with multiple locations, mobile users, and line-of-business eCommerce applications. A Progent ISA 2004 Firewall consultant can help your small or mid-size company plan and deploy a configuration of Microsoft ISA Server 2004 that supports your information security needs without limiting your network.

  • Computer Consultants Catalyst Switch EVN Urgent Catalyst 6800 Switch Information Technology Consulting
  • Computer Consultants SQL Server 2014 Monitoring SQL Server 2014 AlwaysOn Consultants
  • Computer Services Microsoft SQL 2008 Dayton Centerville Trotwood Small Business Network Consulting Company SQL Server 2019 Dayton
  • Computer Support Telecommuter Job SF San Francisco Bay Area Microsoft MCP Engineer Full-Time Jobs
  • Configuration iPad and Airport Mac Infrastructure Professional
  • Consult Dynamics GP BizTalk Adapter Dynamics GP Web Services Services
  • Consultant Google Cloud Docker Google GCP Cloud hybrid cloud solutions Consult
  • Consultants System Center 2016 Migration Urgent SCCMM 2016 Consulting Services
  • Consulting Services Microsoft Voice over IP Voice over IP Technology Professional
  • Contact Progent Progent Contact
  • Cybersecurity Firms Symantec Firewall Symantec Raptor Security Contractors
  • Dayton, OH Dayton WannaCry Crypto-Ransomware Recovery
  • Cybersecurity Organizations WatchGuard XTM Firewall 24 Hour WatchGuard Firebox M270 Firewall Network Security Testing

  • Tandberg T3 Telepresence Specialists
    Mirial Engineer

    Progent can provide the expertise of a senior consultant with years of experience installing, maintaining, and upgrading immersive telepresence platforms from top-tier vendors including Cisco, TANDBERG, Polycom, and LifeSize. Progent can coordinate with your internal network management team, your ISP, and your telepresence platform supplier to assist your organization increase the business value of your video conferencing ecosystem.

  • Data Center Services Cisco Certified Expert Fault Tolerant Collocation Consult
  • Dayton Centerville Trotwood Teleworkers Consulting near me in Dayton - Management Solutions Expertise Dayton Remote Workforce Endpoint Management Systems Guidance

  • Top Microsoft Certified Specialists Office Word training
    Office 365 Word Consulting

    Progent's Office Word and Office 365 Word experts can provide a wide selection of economical online support services to help you to manage your legacy Microsoft Office Word environment or assist you to upgrade to a newer release of Office Word. Services available from Progent's Word experts include VBA software development, isolating and resolving compatibility problems between different releases of Office Word, integrating Word with other Office applications such as Excel and Microsoft Outlook or with third-party platforms and add-ons,network enhancements for dependable. reliable cloud connectivity, security support, smart phone and tablet synchronization, and remote training classes tailored for individuals or groups.

  • Dayton Consulting Services for IT Support Companies Dayton Centerville Trotwood Consulting Support for Dayton Computer Support Providers Dayton, OH, United States
  • Dayton Dharma Ransomware Forensics Analysis Dayton Ohio Dayton Dharma Ransomware Forensics Analysis Dayton Centerville Trotwood
  • Dayton Huber Heights Kettering BlackBerry Email Assessment BlackBerry Software Repairing Dayton Ohio
  • Dayton IT Staffing Temps Support Services Dayton Centerville Trotwood, US Dayton, OH IT Staffing for Computer Support Groups
  • Dayton Egregor Crypto-Ransomware Data-Recovery Dayton Ohio
  • Dayton Offsite Workforce Collaboration Technology Consulting Services Dayton Dayton Telecommuters Collaboration Solutions Consulting Woodland County Ohio, United States

  • Solaris Information Technology Consulting
    Solaris Online Support

    If your office network combines Sun Solaris platforms with MS Windows, Progent can assist you to integrate your computers into a unified environment that allows all your OS platforms to run side by side for simple administration, transparent dataflow, high availability, enhanced throughput, and strong protection. Progent's Solaris and Microsoft Windows integration assistance services include network architecture configuration and service, support for Microsoft Windows services for UNIX (SFU), online network monitoring and administration, online technical support and troubleshooting, on-site technical support, and Helpdesk services.

  • Dayton Ransomware Assault Data-Recovery Dayton, OH, US Dayton Egregor Ransomware System-Rebuild Woodland County Ohio
  • Dayton Ransomware System-Rebuild Dayton Huber Heights Kettering, U.S.A. Dayton Ryuk Crypto-Ransomware Virus Data-Recovery Example Dayton Ohio
  • Dayton Remote Workers Help Desk Call Center Outsourcing Assistance Woodland County Ohio Dayton At Home Workforce Help Desk Call Center Solutions Assistance

  • Microsoft Dynamics Business Central Support and Setup
    Microsoft Dynamics Business Central Consulting

    Progent offers online and onsite configuration, upgrade, application development, reporting for Microsoft Dynamics 365 Business Central (formerly Dynamivs NAV).

  • Dayton Ryuk Ransomware Assessment and Repair Dayton Huber Heights Kettering Dayton, OH Ransomware Cleanup Services
  • Dayton Systems Engineer Remote Network Installation Dayton-Montgomery
  • Dayton WannaCry Ransomware Remediation Dayton Centerville Trotwood Woodland County Ohio Dayton Locky Ransomware Remediation
  • Dayton Ryuk Ransomware Virus Repair Dayton Ohio
  • Dayton Work at Home Employees Backup/Restore Solutions Consulting and Support Services Dayton Ohio Work at Home Employees Consultants near Dayton - Data Protection Technology Consulting and Support Services
  • Dayton, Ohio Systems Consultant Dayton-Montgomery Software Security Consultant
  • Dayton, U.S.A. Dayton Crypto-Ransomware WannaCry Preparedness Testing Dayton Crypto-Ransomware Maze Preparedness Testing Dayton Centerville Trotwood, United States
  • Development Firms Amazon MWS programming Amazon MWS Programming Firms
  • Email Reputation Analysis Engineers Consultancy ProSight Email Guard Spam Filtering
  • Emergency Dynamics GP/Great Plains Features Computer Consulting Troubleshooting Dynamics GP Software

  • Work from Home Endpoint Management Online Support Services
    At Home Employees Endpoint Management Troubleshooting

    Progent can help small and mid-size organizations to deploy unified endpoint management platforms for maintaining devices operated by teleworkers.

  • Engineer Fully Redundant Network Fault-tolerant Interoffice Connections Online Support
  • Engineer ProSight Email Content Filtering Service Specialists Email Anti-fraud Intelligence

  • Microsoft Office Technical Support Firms
    Engineers Microsoft Windows

    Progentís IT outsourcing packages provide budget-friendly network support for small businesses. Whether it includes designing system architecture, setting up an internal Help Desk or using an outside one, deploying a new e-mail platform, monitoring your network, or creating a web-based business solution, outsourcing your network technical services can contain costs and eliminate risks, allowing IT support budgets to grow in a more moderate and manageable fashion than is feasible by assembling a large, knowledgeable in-house IT staff. Progentís Outsourcing White Paper and flyers show how Progent can enable you to build a secure and highly available network architecture for your critical applications powered by Microsoft Windows including Microsoft Office XP, Office 2003, and Microsoft Office 2000.

  • Enterprise hybrid cloud integration Technology Professional Microsoft Azure hybrid cloud integration Professional
  • Envisioning Phase: Requirements Definition Computer Consultancy Services Planning Phase: Design and Architecture Proposals Small Business Network Consulting
  • Exchange 2000 Server Upgrade Technical Support Exchange 2000 Server Support and Setup

  • Small Office Computer Network Support
    Microsoft Expert Small Office Support Team

    Progent's Microsoft and Cisco certified computer engineers offer advanced support for a broad array of technologies and can provide that expertise remotely anywhere in the U.S. or onsite in major cities across the United States and anywhere in California. Progent provides remote support for information systems based on Windows, UNIX, Linux, Solaris, or Apple macOS and OS X, or for systems that include a combination of Microsoft Windows and UNIX/Linux technology. Progent also offers the help of Cisco CCIE network engineers for the toughest connectivity problems, plus the support of CISA and CISM-accredited security engineers to assist with high-level security planning and problem solving. Progent has delivered remote network support to businesses in all 50 states in the U.S.

  • Exchange 2010 Planning Support Services Biggest Support and Setup Exchange 2010 Migration
  • Exchange Online Archiving Consulting Services Hybrid Office 365 Exchange integration Engineer

  • Urgent Help and Support Windows Applications on Apple Mac
    24x7 Windows Emulation for macOS IT Services

    For companies that have a combination of Mac and Microsoft Windows desktops, there are two basic solutions for using Microsoft Windows-dependent applications on an Apple Mac: an external connection to an actual Windows PC or local emulation of a Microsoft Windows environment on a macOS or Mac OS X desktop. Microsoft's Remote Desktop Connection Client for Mac enables you to attach an Apple Mac to a remote Windows-powered PC to use Windows software and share network resources. Virtual PC for Mac emulates Windows on a Mac computer so you are able to run Windows software directly. Progent's Mac technology consultants can help your business to maintain these solutions for using Microsoft Windows applications on your Apple Macs and can also assist your organization to evaluate and configure third-party products for Microsoft Windows PC simulation.

  • Exchange Server 2007 Support and Setup On-site Technical Support Exchange 2007

  • Email Predictive Sender Profiling Consultant
    Top ProSight Email Guard Outbound Email Encryption Services

    Progent's ProSight Email Guard solution uses the services and infrastructure of leading data security vendors to provide web-based control and world-class security for all your email traffic. The hybrid architecture of Progent's Email Guard combines a Cloud Protection Layer with a local security gateway appliance to offer complete defense against spam, viruses, Denial of Service Attacks, Directory Harvest Attacks (DHAs), and other email-based malware. The cloud filter acts as a first line of defense and keeps the vast majority of threats from reaching your security perimeter. This decreases your exposure to inbound threats and saves system bandwidth and storage space. ProSight Email Guard's onsite security gateway device adds a further layer of inspection for incoming email. For outbound email, the local gateway provides anti-virus and anti-spam filtering, protection against data leaks, and encryption. The on-premises security gateway can also help Microsoft Exchange Server to monitor and safeguard internal email traffic that stays within your security perimeter.

  • Exchange Server 2013 Information Technology Outsourcing Firms Dayton Ohio Microsoft Exchange 2010 Service Providers Woodland County Ohio
  • FAQ about Recruit Network Consultant Full-Time Jobs Telecommuting Jobs FAQ about Network Consultant
  • Dayton Huber Heights Kettering Dayton Ryuk Ransomware File-Recovery
  • Fault Tolerant Load Balancing Integration Support Microsoft Windows Server 2003 Network Load Balancing Manager Remote Consulting
  • Firewall and VPN Cybersecurity Companies Forensics Services Firewall and VPN
  • Hyper-V 3.0 Virtual Server Consulting Virtual Server Administration Website Network Consultant
  • IT Outsourcing Best Practices Whitepapers Whitepapers IT Outsourcing Best Practices
  • Immediate Microsoft Certified Consultant Contract Newcastle Remote Microsoft MCITP Consultant Home Based Virtual Office Australia
  • Information Technology Consultant Enterprise Top Ranked Multi-site IT Manager
  • Internet Security and Acceleration Server 2006 Online Help ISA Server 2006 Engineer
  • Juniper SA4500 SSL VPN Cybersecurity Organization Top Ranked Evaluation Juniper SA6500 SSL VPN
  • Juniper SRX100 Router Cybersecurity Organization Juniper SRX220 Router Security Consulting
  • Juniper SRX220 Router Firewall Configuration Juniper SRX100 Router Security Certification
  • Largest Gentoo Linux, Sun Solaris, UNIX Support Woodland County Ohio Dayton, OH Online Help CentOS Linux, Solaris, UNIX
  • Largest Microsoft Certified Expert Online Technical Support SCCM 2016 Planning SCCM 2016 and Windows Server 2016 On-site Technical Support
  • Linux Network Monitoring, Nagios and MRTG Technology Professional Linux Network Monitoring, Nagios and MRTG Professionals
  • Live Online Office Publisher Learning 24-7 Live Online Office Word Classes
  • Lockbit ransomware forensics Professionals Professional DopplePaymer ransomware forensics
  • MCSE Expert Certified Microsoft Access Coding Top Ranked Professional Microsoft Access RDP
  • MOM 2005 Case Studies MOM 2005 Case Studies

  • Urgent Ubiquiti UniFi Controller Consult
    Ubiquiti UniFi WiFi Consult

    Progent offers quick access to the expertise of seasoned Wi-Fi specialists who can help organizations to assess the advantages of Ubiquiti UniFi Wi-Fi APs for your business and help you to design, deploy, manage, and troubleshoot your UniFi network. Progent can also carry out a wireless site survey to help you to select, provision, and position Ubiquiti UniFi Wi-Fi APs for your required signal coverage and performance.

  • MS SQL 2008 On-site Technical Support Consultant Services SQL 2008 Analysis Services
  • Mac Network Security Services Apple Mac Directory Harvest Attack Defense Network Security Evaluation
  • Mac and Windows Online Technical Support Apple macOS and Windows Remote Support Services
  • Microsoft Azure hybrid cloud integration Consultant Technology Professional Hybrid cloud integration
  • Dayton MongoLock Crypto-Ransomware Business-Recovery Dayton, OH
  • Microsoft Certified Expert Small Medium Business Network Design and Configuration 24-Hour Microsoft Certified Partner Providers Midsized Office

  • Email Virus Signature Consultancy
    ProSight Email Security Gateway Technology Professional

    Progent's ProSight Email Guard uses the services and infrastructure of leading data security vendors to provide web-based control and world-class protection for all your email traffic. The hybrid architecture of Email Guard combines cloud-based filtering with a local security gateway appliance to provide complete protection against spam, viruses, Dos Attacks, Directory Harvest Attacks (DHAs), and other email-based threats. The cloud filter acts as a preliminary barricade and keeps the vast majority of unwanted email from reaching your network firewall. This reduces your exposure to inbound attacks and conserves network bandwidth and storage. ProSight Email Guard's onsite gateway device provides a deeper level of analysis for inbound email. For outbound email, the local security gateway offers anti-virus and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The onsite security gateway can also help Microsoft Exchange Server to track and safeguard internal email that stays inside your corporate firewall.

  • Microsoft Certified Partner Desktop Small Office Network Consultants Microsoft Desktop Small Business Computer Consulting Services
  • Microsoft DPM Offsite Data Backup Service Consultants 24-Hour Remote Data Backup and Restore Service Consulting

  • Signature-based Virus Protection Consulting Services
    Modern Network Security IT Consulting

    ProSight Active Security Monitoring is an endpoint protection solution that incorporates next generation behavior machine learning tools to guard endpoint devices and physical and virtual servers against modern malware assaults like ransomware and file-less exploits, which easily escape legacy signature-based AV tools. ProSight ASM safeguards on-premises and cloud resources and provides a unified platform to manage the entire malware attack progression including protection, identification, mitigation, remediation, and post-attack forensics. Top capabilities include single-click rollback using Windows VSS and automatic network-wide immunization against new threats.

  • Microsoft Excel Training Office Excel 2007 Consultancy
  • Microsoft Exchange 2000 Upgrade Consultant Exchange 2000 Server Engineer
  • Microsoft Exchange 2000 Upgrade Network Consultant Microsoft Exchange 2000 On-site Technical Support
  • Microsoft Exchange 2010 Migration Technology Professional Microsoft Exchange Server 2010 Upgrade Consultant
  • Microsoft Exchange Server 2010 Upgrade Professional Microsoft Exchange Server Upgrade Technology Professional

  • Double Take Replication Manager Remote Support
    Double-Take Software On-site Technical Support

    DoubleTake/Carbonite Software offers a selection of products designed to deliver small businesses a variety of cost-effective solutions for backing up and recovering vital applications such as Exchange Server, SQL, RIM Blackberry, and SharePoint. Progentís business continuity planning experts have extensive experience integrating DoubleTake/Carbonite products into small business information networks to create an advanced state of availability and business continuity readiness at a budget-friendly cost.

  • Microsoft Expert Exchange Server 2010 Upgrade Technical Consultant Exchange Server 2010 Upgrade IT Consultants

  • macOS Architecture Integration
    Specialists Mac Infrastructure

    Progent's Apple Mac networking engineers can help you with a wide array of network foundation areas including network architecture, off-site and mobile access, internetwork compatibility, security, and new technologies including VoIP and fast wireless networking. For business networks built solely on Mac OS X or for environments incorporating a combination of Mac, Linux/UNIX and Windows powered servers and workstations, Progent has the experience and size to handle the challenge of designing, integrating, and supporting a network infrastructure that is robust, safe, efficient and aligned with your business objectives. Progent can help you configure Appleís Xserve enterprise servers, Xserve RAID zero-downtime storage products, and Xsan SAN systems. Progent can also provide certified experts to help you with Cisco routers and switches.

  • Microsoft Experts Forefront TMG Technical Support Services Forefront Network Inspection System Configuration
  • Microsoft Experts ISA 2000 Server Remote Troubleshooting Microsoft Firewall Support and Integration
  • Microsoft Experts SQL Server 2019 and Excel Support and Setup SQL Server 2019 and Amazon Marketplace Web Service Support and Integration
  • Microsoft Forefront TMG 2010 Technical Support Services Forefront TMG 2010 Computer Consultants
  • Microsoft ISA Server 2006 Outsourcing Best ISA Server 2006 Remote Technical Support
  • Microsoft IT Consulting Company Microsoft Office XP Manager
  • Microsoft LCS Server 2007 Online Technical Support Engineer Microsoft LCS Server 2007
  • Microsoft Office 2003 Outsourcing Firm Microsoft Office System Information Technology Outsourcing Group
  • Dayton Dharma Crypto-Ransomware Removal Dayton, OH
  • Microsoft SCOM 2012 R2 Online Consulting SCOM Management Packs Consultant Services
  • Microsoft SQL Professional Microsoft SQL Server IT Support
  • Microsoft Teams and iPhone Consultants Emergency Microsoft Teams Admin Center Technology Professional
  • Microsoft Teams hybrid Consultant Services Microsoft Teams management Engineers
  • Dayton Ryuk Ransomware Malware Repair Woodland County Ohio
  • Microsoft Windows 7 Upgrade Consultant Services Consultant Services Windows 7
  • Microsoft Windows Essential Business Server Support and Integration Windows SBS Information Technology Consulting
  • Microsoft Windows Server 2019 Deduplication Support Services Windows 2019 Hyper-V Consultant

  • Fault Tolerant Server Clustering Technology Consulting
    On-site Support Fault-tolerant Clustered Servers

    Progent offers Windows 2003 Cluster Server support to help your business utilize zero-downtime clustered servers designed to deliver 24x7 uptime. Clustered Windows servers for high-availability systems include Microsoft Windows 2003 Cluster Server, Microsoft SQL Cluster Server, and Exchange Cluster. By assisting you t design fault-tolerant clustered server solutions around Windows Server Cluster 2003, Progentís Premier Windows consultants make sure that your high availability server clusters are configured to maximize the competitive advantage of your information network.

  • Microsoft and Apple Mac Desktop IT Consulting Largest Desktop Computer Service Providers
  • Midsized Office Information Technology Outsourcing Computer Support Companies Mid-size Office

  • Setup and Support Windows and Solaris
    24x7x365 Setup and Support Windows and Solaris

    Progent's UNIX family consulting services offer small businesses and developers assistance with administering and maintaining UNIX, Linux or Solaris environments that operate with Microsoft-powered networks. Progent can give your organization contact with UNIX experts, consulting professionals premier by Microsoft and Cisco, and security specialists with CISA and CISSP certification. This broad array of expertise offers you a convenient single source to help you build and manage a secure and robust mixed-platform network and communications infrastructure that allows UNIX and Microsoft coexistence by combining Windows with popular variants of UNIX such as Mac OS X, Sun Solaris, AIX UNIX from IBM, Hewlett Packard HP-UX, BSD, SCO UNIX, and Silicon Graphics IRIX or leading Linux variations such as RedHat, SUSE, CentOS Linux, Ubuntu Linux, PCLOS, fedora Linux, Gentoo Linux, Mandrake/Mandriva, Debian GNU/Linux, and Slackware Linux.

  • Monitoring and Reporting Configuration Remote Operations Manager Network Consultant
  • NetApp MetroCluster Switchover Consultant Services NetApp MetroCluster Design Technology Professional
  • NetBSD Administration Solaris Specialists
  • Network Security Scan Consulting Information Risk Assessment Technology Professional
  • Networking Firms Progent's Management Team Progent's Management Support Company

  • Remote Support Services wireless LAN controller
    CCDP Expert Certified Specialist Wave 2 Wi-Fi controller

    Cisco's {Catalyst wireless controllers streamline the administration of wireless networks by unifying the provisioning and control of wireless access points, optimizing wireless throughput by reducing the effect of RF congestion, enhancing Wi-Fi availability with fast auto-failover, and hardening security by identifying cyber threats and filtering network traffic according to user class and location. Progent can help your business to configure Cisco Wi-Fi controllers to manage wireless networks of any size. Progent can help you to administer and troubleshoot your existing Cisco Wi-Fi environment or carry out a smooth transition to Cisco's modern wireless controller solutions.

  • Networking Small Office IT Consulting Services Windows Security Network Solutions Dayton Centerville Trotwood
  • Newcastle Microsoft MCA Consulting Freelancing Job Network Consultant Part-Time Jobs Sydney, Melbourne, Brisbane, Perth, Adelaide
  • Office 365 and iPhones On-site Technical Support Microsoft Certified Expert Office 365 PST migration Technology Consulting
  • Offsite Data Backup Service Online Technical Support Data Protection Manager Backup Service Engineer
  • Offsite Managed Backup and Recovery Services Professional 24x7 ProSight Data Protection Services Services
  • Offsite Workforce Consulting Services - Dayton - Integration Solutions Assistance Dayton Huber Heights Kettering Dayton Offsite Workforce Connectivity Solutions Consulting Experts Dayton Huber Heights Kettering
  • On-site Support Windows Server 2008 R2 Windows Server 2008 Security Network Engineer
  • Dayton Dayton Lockbit Ransomware Remediation
  • Open Now Integration Windows Server 2019 integration 24 Hour Windows Server 2019 Cybersecurity Outsourcing
  • Dayton Avaddon Ransomware Business-Recovery
  • Power BI Report Server Contract Development Microsoft Experts Power BI Gateway Outsourced Programming
  • PowerPoint 2016 Design Company Office 365 Outlook Small Business Computer Consulting Company
  • ProSight Email Security Gateway Services Email Virus Fingerprint Services

  • After Hours Engineers Security Assessment
    Consultant Web Application Security Assessment

    Progent offers several network security packages designed to deliver larger corporations an independent and thorough network security evaluation from a team of certified security consultants. All Progent's network security evaluation packages feature a suite of procedures like network scans from inside and from outside your network security perimeter, expert analysis of scan results by accredited security engineers, creation of a report explaining the findings, plus an interactive concise executive outbrief and a detailed interactive outbrief for in-house network administrators.

  • ProSight Ransomware Defense Specialists Top Rated Malware Forensics Network Consulting
  • Dayton Sodinokibi Ransomware Rollback Dayton, OH
  • ProSight Ransomware Protection Specialists ProSight Behavior-based Virus Detection Engineer
  • Dayton Crypto-Ransomware Repair Dayton, OH, America
  • ProSight Server and Endpoint Management Online Technical Support Top Ranked Technical Support ProSight Server and Desktop Management

  • Outsourcing Network Help Consultant Services
    IT Outsourcing Engineers

    Progent is structured to provide comprehensive online consulting for all major technical areas associated with small company information systems and allows you to outsource an array of vital, on-demand services including a temporary Chief Information Officer to offer senior-level IT design and budgeting capability, a Technical Response Center for help desk support, proactive remote monitoring, spam and email-borne virus filtering as a managed service, best-practices project management help for major initiatives like office relocations oroperating system migrations, Cisco-certified experts for designing high-performance and robust infrastructure, certified security engineers to verify information safety and compliance, disaster recovery specialists to create business continuity strategies, and software programmers to create, enhance, or repair mission-critical applications.

  • Professionals ProSight Virtual Machine Hosting ProSight Small Business Private Clouds Consultancy
  • Professionals Windows 2003 Technology Professional Windows Server 2003
  • Progent Managed IT Services for Small Businesses Consult 24x7x365 Ransomware Protection Technology Professional
  • Progent Management Team Security Consulting Progent's Management Server Setup
  • Progent Offices Progent Locations
  • Progent Small Company Information Technology Outsourcing Company Progent Start-Up Business Consulting Company
  • Q and A about Recruiter Cisco Consultant Jobs Available Q and A about Cisco CCDA Subcontractor Jobs

  • Biggest Aironet Access Point Management Professionals
    Aironet Wave 2 AP Computer Consultant

    Progent's Cisco certified Wi-Fi experts can provide affordable online and onsite support for both legacy and modern 802.11ac Aironet Wi-Fi access points and Progent can help your business to plan and manage wireless solutions that include indoor and outside/industrial Aironet APs.

  • Remote Consulting System Center 2016 and Exchange Online Integration Professionals System Center 2016 Security and Compliance
  • Remote Microsoft LCS Server Consult Live Communications Server On-site Support
  • Remote Network Monitoring Consultant Network Health Check Consultants
  • Remote Server Management Technical Consultant Automated Server Inventory Consulting
  • Dayton Conti Crypto-Ransomware File-Recovery Dayton
  • Remote Support IT Services Remote Computer Support Consultant
  • Remote Workers Dayton Consulting Experts - Voice/Video Conferencing Technology Consulting Services Woodland County Ohio Remote Workers Consulting Experts near Dayton - Video Conferencing Technology Consulting Services Dayton Ohio
  • Risk Response Remote Troubleshooting Remote Consulting CRISC Risk Evaluation
  • SCCM 2007 Hardware Inventory Setup and Support System Center 2007 Configuration Manager Technology Consulting Services
  • SCCM Endpoint Protection Remote Troubleshooting Largest SCCM Asset Inventory Outsourcing
  • SCVMM 2012 Security and Compliance On-site Technical Support VMM and SQL Server Support Services
  • SMS 2003 Upgrade Information Technology Consulting Network Consultants SMS Server Migration
  • SQL Server 2016 Query Store Network Engineer SQL Server 2016 Development Online Support

  • Cisco Access Point Network Consulting Company
    Cisco CCIE Online Consultancy Services

    Progent's CCIE-certified network infrastructure experts have extensive experience helping ISPs to architect, implement, administer, tune, and troubleshoot fault-tolerant, extensible connectivity solutions suitable for shared public networks.

  • SQL Server 2017 Development Outsourcing SQL Server 2017 Automatic Database Tuning Support and Setup

  • Juniper Junos Configuration Auditing
    Juniper Junos Network and Security Manager Consultants

    Progent's Juniper-certified network consultants can assist your company to design and deploy Juniper Firewall/VPN technology, optimize and support your infrastructure, and upgrade smoothly from outdated devices to the latest versions. Progent's Junos OS consultants can also provide support for Juniper's premier network operating system to help your business to streamline the administration and strengthen the protection of your Juniper VPN appliances and routers. Progent also has broad background supporting Juniper's NetScreen OS and ScreenOS software productss and can help organizations maintain networks that include a mix of Juniper's software platforms.

  • SQL Server Capacity Planning Development Coding SQL Server Capacity Planning
  • Security Penetration Testing Network Consultants Stealth Penetration Testing Technical Support
  • Security Planning Security Firms McAfee information Systems Audit
  • Security Security Organization Dayton Dayton Huber Heights Kettering Security Security Audits
  • SharePoint Portal Server Integration Services SharePoint 2003 Specialist

  • Wi-Fi Site Survey Computer Consulting
    Remote Wireless Site Survey Online Consulting

    Progent's wireless site survey services assist you to design, implement and troubleshoot a Wi-Fi network optimized for your environment, providing you a wireless solution that has the coverage, performance, density, Quality of Service, data protection, and roaming ability your business needs. Wi-Fi site survey services from Progent include online predictive analysis for designing a wireless network and on-premises survey services for validating, optimizing, and debugging an operational Wi-Fi network.

  • SharePoint Portal Server Remote Technical Support 24-7 SharePoint Integration Support
  • Dayton Egregor Ransomware Restoration Dayton Centerville Trotwood
  • Small Business IT Consultant Small Business Troubleshoot
  • Small Business IT Outsourcing White Papers White Paper IT Outsourcing and Co-sourcing
  • Small Business Managed IT services Consultant Services ProSight Managed Services Professional
  • Small Business Online Technical Support Small Office Network Technology Consulting
  • Small Office Outsourced IT Services Small Office Computer Service Providers
  • Snatch ransomware recovery Consultancy 24x7 Consultant ransomware removal and recovery
  • Dayton WannaCry Ransomware System-Rebuild Dayton, OH
  • Software Consulting Vermont Emergency South Carolina Design Company
  • Solaris Remote Troubleshooting Solaris Services
  • Dayton Avaddon Ransomware Data-Recovery Dayton, OH
  • Specialists Cloud-managed Email Security ProSight Email Zero Hour Protection Consulting Services
  • Specialists Small Business Cisco Small Office Data Recovery
  • Sun Solaris Online Support Solaris Integration Support
  • Suse Linux Technical Support Top Red Hat Linux Professionals
  • Symantec VelociRaptor Cybersecurity Organization Emergency Symantec Firewall Consulting

  • IT Consultant Double-Take Replication
    Urgent Double-Take Backup Technology Consulting

    DoubleTake/Carbonite Software publishes a selection of products designed to deliver small and midsize companies a variety of cost-effective solutions for replicating and recovering vital applications including Exchange Server, Microsoft SQL Server, RIM Blackberry, and Microsoft Office SharePoint. Progentís business continuity planning consultants have in-depth backgrounds incorporating DoubleTake/Carbonite products into small business IT networks to create an advanced state of availability and disaster recovery readiness at an affordable price.

  • System Center 2012 Virtual Machine Manager Computer Consulting SCVMM 2012 Security and Compliance Information Technology Consulting
  • Technical Support Services Meraki Wave 2 AP Meraki Wave 2 AP Support and Integration
  • Telecommute Jobs FAQ about Cisco CCNA Q&A about Network Engineer Positions
  • Teleworkers Dayton Expertise - Infrastructure Guidance Dayton Huber Heights Kettering 24x7 Telecommuters Dayton Consulting Experts - Setup Consulting Dayton, OH
  • Top CISA Cybersecurity Audit Consultant CISA Certified Security Audit Professional

  • 3504 wireless controller Professionals
    5520 wireless controller Technology Consulting Services

    Cisco's Catalyst family of Wi-Fi controllers simplify the administration of wireless LANs by unifying the provisioning and control of Wi-Fi access points, tuning wireless throughput by limiting the effect of radio frequency congestion, enhancing wireless uptime with fast auto-failover, and hardening data security by detecting threats and analyzing traffic content according to user class and location. Progent can help you to deploy Cisco Wi-Fi controller appliances to manage and monitor wireless LANs of any size. Progent can assist you to maintain and troubleshoot your current Cisco Wi-Fi solution or carry out a smooth migration to Cisco's latest wireless controller solutions.

  • Top Quality Database Programming IT Consultant Database Development Consultants

  • Microsoft Certified SQL Server 2008 Upgrade Consultants
    Integration MS SQL Server

    SQL Server 2005 offers powerful, standardized tools to computer professionals and network users, reducing the difficulty of designing, deploying, managing, and accessing company data and database applications on platforms ranging from handheld devices to corporate information systems. The sophistication and integration demands of Microsoft SQL Server 2005 call for an IT consulting firm with real-world expertise and wide knowledge in planning and building data-driven, end-to-end business IT applications. The knowledge and experience of Progent's Microsoft-certified technical team, with an average of over 10 years of professional work involving Microsoft technology, assures you success in designing, configuring and supporting Microsoft SQL Server 2005 solutions that are seamlessly integrated with the Microsoft .NET platform.

  • Top Quality Microsoft Exchange 2010 Upgrade Services Exchange Server 2010 Upgrade Services
  • Top Ranked Hybrid Office 365 and Exchange Outsourcing Office 365 integration with on-premises environments Specialists
  • Top Ranked ISA 2006 Firewall Consulting Services Integration ISA 2006
  • Top Ranked IT Services SQL Server 2016 Migration SQL Server 2016 Data Warehousing Specialist
  • Top Rated Microsoft Consultant Work From Home Job Walnut Creek Microsoft MCDBA Engineer Full-Time Job Walnut Creek

  • Microsoft Exchange Outsourcing
    Exchange 2000 Server IT Services

    Progent is among the most expert network consulting companies for creating e-mail systems based on Microsoft Exchange 2000. Progent specializes in helping small businesses get all the advantages of Microsoft Exchange 2000 under common scenarios including updating from Microsoft Exchange 5.5, moving from an ISP-managed or POP3 e-mail system, and using managed services for your Exchange 2000 administration.

  • Troubleshooting Exchange 2016 Migration Exchange Server 2016 Upgrade Planning Network Engineer
  • Ubiquiti UAP-AC WiFi access point Specialist Engineers Ubiquiti UniFi AP
  • Upgrading Solaris-Windows Sun Solaris Migration Consultants
  • Urgent Dayton Microsoft Dynamics GP Upgrades Expert Dayton Centerville Trotwood Dayton Ohio Dynamics GP (Great Plains) Premier Partner nearby Dayton - SQL Server Help
  • VPN Online Help Top Rated Integration VPN
  • Vermont IT Outsourcing Group Small Office Computer Consulting Washington
  • Dayton Crypto-Ransomware System-Rebuild Dayton Ohio
  • Virtual Call Desk Network Consultant Shared Help Desk Integration Services
  • Virtual Help Desk Technical Consultant Extended Support Desk Support Services
  • Wi-Fi Network Technical Consultant Top Quality Wireless Network Consultant
  • Wi-Fi RF Coverage Maps Remote Consulting Award Winning Wireless Site Survey Remote Troubleshooting
  • Dayton, OH Dayton Hermes Ransomware Data-Recovery
  • Windows 2008 R2 Outsourcing Microsoft Certified Partner Windows Server 2008 R2 Remote Consulting
  • Windows Server 2012 Failover Cluster Support and Help Support Windows 2012 Cluster Server
  • Windows Server 2012 R2 upgrade Consultant Windows 2012 R2 Setup and Support
  • Woodland County Ohio Remote Workforce Dayton Expertise - Endpoint Security Systems Consultants Dayton At Home Workers Endpoint Security Systems Assistance Dayton
  • Work from Home Helpdesk Services Online Consulting Remote Employees Helpdesk Onsite Technical Support
  • iPhone and Power BI integration Technology Consulting Services iPhone and Outlook integration Integration Services
  • ransomware cleanup and recovery Specialist Lockbit ransomware hot line Consulting
  • ransomware cleanup and restore Specialist Hermes ransomware recovery Consultancy
  • recovery from ransomware Consult ransomware defense checkup Consulting
  • scom 2016 Nano Server integration Help and Support scom 2016 data warehouse Online Technical Support
  • scom 2016 SharePoint integration Support and Setup scom 2016 VMware integration Online Help
  • wireless IP phones and Meraki APs Technical Support Services wireless IP phones and Meraki APs Information Technology Consulting

  • © 2002-2021 Progent Corporation. All rights reserved.