Additional Topics of Interest

Small Business APs Specialist
24-Hour CCIE Expert Certified Small Business WAP500 AP Computer Consultants

Cisco's Small Business series of APs are Linux-based devices intended as entry-level Wi-Fi solutions for light workloads. Progent's Cisco CCIE wireless network consultants offer online or on-premises configuration and debugging support to help you to design, implement, upgrade, tune, administer and troubleshoot Cisco Small Business wireless access point environments of any scale or architecture.

ransomware cleanup and file restore Professionals
24x7x365 NotPetya ransomware recovery Consulting

Progent's ransomware experts can help your business to assess your ransomware vulnerability, remotely monitor and protect your IT environment, help with settlement negotiations with a hacker, and reconstruct a network damaged by a ransomware variant like Ryuk, Maze, Sodinokibi, DopplePaymer, Conti or Egregor.

MySQL application development Specialists
Consultancy MySQL application development

Progent can provide affordable remote access to an Oracle MySQL administrator or software programmer and can assist businesses of all sizes to configure and support MySQL within a robust IT infrastructure that offers high levels of speed, expandability, and security. Progent also has experience assisting companies port applications from Oracle to MySQL.

Consulting SQL 2008 Reporting Services
SQL 2008 Consulting

Progent's Microsoft-Premier SQL engineers offer an array of support services to help small businesses to design, implement, administer, and repair MS SQL 2008 solutions so that they get the maximum strategic benefit from this state-of-the-art database management platform. In addition, Progent offers expertise for network architecture, company-wide protection, and custom software development to increase the business advantage of your SQL Server investment.

Emergency Cisco Specialists Small Office Network
Small Office Network IT Consultants

If you have a company network with 10 to 50 network clients, Progent's computer outsourcing services save your company from over-reliance on an individual freelance consultant while giving you cost-effective and reliable access to enterprise-class network support. By delivering network support help when you require it, offering advanced expertise for critical technologies, offering unique support such as 24x7 server monitoring, and charging only for support you receive, Progent gives you an affordable way for maximizing the productivity and profitability of your small business network. Progent is the intelligent way for small organizations to build and support a robust and safe information network and to benefit from fast access to the skilled consulting ordinarily restricted to businesses who can support a large in-house IT organization.

Cisco and Microsoft Stealth Penetration Testing Forensics Services
Audit Security Penetration Testing

Stealth penetration checking is an important component of any overall IT system security plan. Progent's security professionals can run extensive penetration tests without the knowledge of your company's in-house network support staff. Stealth penetration testing shows whether existing security monitoring tools such as intrusion incident alerts and event log monitoring are correctly configured and actively observed. Progent can implement continuous autonomous PEN testing to map your internal and external attack surface and to detect ways that exploitable vulnerabilities, improper configurations, compromised credentials, missing patches, and ill-advised IT product defaults can be chained together by threat actors into the multi-front attacks common to the latest strains of ransomware.

Microsoft Proxy Server Online Consulting
Support and Setup Microsoft ISA Server

Progent's Microsoft certified consultants provide small and medium sized businesses consulting services for Microsoft Forefront Threat Management Gateway and ISA Servers. Microsoft's Forefront Threat Management Gateway and ISA Servers include a full featured application-layer aware firewall that can protect your IT network from attack by external and inside threats. Forefront Threat Management Gateway and ISA Server perform thorough examination of Internet protocols such as Hypertext Transfer Protocol, which allows these security platforms to uncover many attacks that can get by ordinary firewalls. The combined firewall and VPN architecture of Forefront TMG and ISA Server support stateful filtering and monitoring of all VPN traffic. ISA Servers are the centerpiece of Microsoft's system security initiative, and Progent's Microsoft-certified experts and CISSP, CISA and CISM certified security professionals can help you strengthen your network security through expert planning and integration of Forefront Threat Management Gateway and Microsoft ISA Servers. Progent's Microsoft consultants can help you to deploy Microsoft Forefront Threat Management Gateway 2010, maintain any version of ISA Server, or migrate smoothly from ISA Server environments to Microsoft Forefront Threat Management Gateway.

Upgrade Help Windows Server 2000
Windows 2000 Integration Services

Progent's certified Microsoft Windows 2000 consultants can help you enhance the capability of your current Windows 2K Servers and can streamline network management, offer technical support and repair, and strengthen security. Progent can also show you how to design, rationalize, and execute a plan to upgrade from Microsoft Windows Server 2K to Windows Server 2003. Progent is expert in setting up test installations to reduce the technical risk involved with moving to Windows 2003 Server by uncovering potential hardware and software compatibility problems.

Entourage Training
Microsoft PowerPoint for Mac Learning

Progent can provide one-on-one training customized for individuals who wish to broaden their understanding of the macOS and OS X operating system, Mac computers, or Mac office productivity software including Word, Excel, and Outlook for Mac. Progent also offers customized group or individual webinar training for macOS and Mac OS X application software.

Services Antivirus
Antivirus Support and Setup

Email Guard from Postini provides constantly updated spam and virus blocking, data filtering, and protection from email-based DHA attacks and DSA attacks. Progent is a Postini partner and support specialist. If your company is too small to purchase for a regular Postini license, you can still have the use of Postini's Perimeter Management services through Progent's E-Mail Guard antispam and anti-virus service program. Progent's expert e-mail security professionals can help you create an email security plan that incorporates spam filtering and anti-virus products and policies.

Computer Consultancy Remote Desktop
Remote Desktop Small Business Network Support

Progent's remote connectivity and wireless synchronization specialists can help your business to plan and deploy secure access solutions for remote desktops, laptops, and smartphones so they integrate seamlessly with your information network, allowing your business to optimize the efficiency of your remote workers.

.NET Application Programming Companies
.NET IoT Contract Programming Firm

Progent's software experts have worked for two decades with .NET tools and the Visual Studio development environment and are able to create or update .NET apps rapidly and affordably.

Engineer CRISC Certified Risk and Information Systems Control Analyst
CRISC Network Security Testing

Progent offers the services of a CRISC-certified risk management expert to assist your company to design and deploy an enterprise risk management (ERM) strategy based on leading practices promoted by CRISC and crafted to align with your organization's risk tolerance, business objectives, and IT budget.