ProSight Email Guard Spam and Content Filtering ConsultingProSight Email Guard from Progent uses the services and infrastructure of leading data security companies to provide centralized management and comprehensive protection for all your inbound and outbound email. The hybrid architecture of ProSight Email Guard combines a Cloud Protection Layer with an on-premises security gateway appliance to deliver world-class defense against spam, viruses, spoofing, phishing, spyware, Denial of Service (DoS) attacks, Directory Harvest Attacks (DHAs), and other email-borne threats.

ProSight Email Guard's Cloud Protection Layer acts as a first line of defense and keeps the vast majority of threats from reaching your security perimeter. This reduces your vulnerability to external attacks and conserves system resources. Email Guard's on-premises security gateway provides a deeper layer of inspection for inbound email. For outbound email, the local security gateway offers anti-virus and anti-spam filtering, policy-based Data Loss Prevention (DLP), Data Leakage Protection, Content Filtering and outbound email encryption. The local email security gateway can also manage your Exchange Server deployment to monitor and protect internal email traffic that never reaches your security gateway.

ProSight Email Guard works with any email platform and offers enhanced features for Exchange Server.

The architecture of the ProSight Email Guard solution includes four main components that stand between the Internet and the email server at your data center:

  • Update Center
  • Cloud Protection Layer
  • Email Guard Security Gateway Appliance
  • Message Center
Email Guard's Architecture

ProSight Email Guard's hybrid architecture provides comprehensive protection for inbound and outbound email traffic

Update Center
The Update Center is a technology center staffed 24x7x365 by security experts who gather emails, URLs, binaries and other data collected from thousands of collection points worldwide, aggregate and analyze this information, and develop defenses, rules and signatures to update ProSight Email Guard's defense mechanism in order to provide zero-hour protection against the latest email-borne threats. Advanced filtering techniques and heuristic rules analysis used by the Update Center include reputation analysis, intent analysis, and predictive sender profiling. The result is a spam and virus filtering solution that blocks a very high percentage of threats yet delivers a very low number of false positives.

Cloud Protection Layer
The Cloud Protection Layer, which is kept current by the Update Center, provides spam and virus prefiltering using advanced technologies that include anti-fraud intelligence and blocking polymorphic viruses that can change their signatures to escape detection. Made up of multiple hardened datacenters worldwide, the Cloud Protection Layer has the capacity to handle Denial of Service attacks as well as email surges that occur during specific periods of the day. Because this cloud-based service stands between the Internet and the Email Guard security gateway, the majority of malicious email can be eliminated before it reaches your security perimeter. To help with disaster recovery and email continuity, the Cloud Protection Layer offers spooling. If your on-premises data center is disrupted, the spooling feature can store all inbound email in the cloud for up to 96 hours or direct it to an alternate destination while you repair the problem.

ProSight Email Guard Security Gateway Hardware Appliance
The ProSight Email Guard Security Gateway is a physical rack-mountable appliance that provides comprehensive protection for inbound, outbound and internal email. The gateway is automatically updated in real time by the Update Center without requiring management intervention. One of the gateway's deep inspection features is a multi-pass OCR engine that protects against image spam, where text is embedded within a graphic in order to hide content from spam filters. Another feature for filtering inbound email is link protection, which automatically evaluates and rewrites fraudulent URLs contained in a message. A plug-in agent for Microsoft Exchange Server offers virus protection for internal email traffic that does not access the gateway, for example emails from Outlook Web Access.

The ProSight Email Guard Security Gateway offers Data Loss Prevention (DLP) by allowing administrators to enforce content policies for outbound email in order to keep sensitive corporate information from being inadvertently leaked. The gateway can also be configured to block invalid bounce messages, which are outbound non-delivery reports to forged email addresses. In addition, the gateway offers a variety of encryption features for outbound email and supports inbound and outbound rate control. The Email Guard Security Gateway is available in several models to match your capacity requirements and security needs and can be clustered for higher performance and availability.

Message Center
The Message Center is a cloud-based service for encrypting outbound email. Emails that match policy are sent securely from the Email Guard Security Gateway to the Message Center. At the Message Center, the sender's email is encrypted using Advanced Encryption Service with a 256-bit cipher (AES-256) and stored for retrieval. The Message Centers sends the recipient a notification that includes a link to visit in order to retrieve the message. The link requires a web browser using HTTPS. The recipient selects a password and the Message Center delivers the encrypted message.

Email Guard's Outbound Encryption

The recipient only needs to establish a password for the first encrypted email received from the message center. Any replies are also sent via the Message Center to maintain security. Encryption key management is handled automatically by the Message Center, and the keys used to encrypt the data are stored in separate areas to provide physical security. Email traffic between the Email Guard Security Gateway and the Message Center and between the Message Center and the recipient are encrypted via SMTP over TLS.

In addition to policy-based encryption, Email Guard also provides an add-in for Microsoft Exchange Server that allows users to specify encryption from within Outlook.

Management Features
The ProSight Email Guard security gateway is integrated with a web-based management portal that provides a simple, centralized interface for viewing and managing all devices, services, policies and configurations. The cloud management tool offers global, domain-level, and individual user policy control. User-level policy management includes block lists, allow lists, quarantining, scoring thresholds, tagging and Bayesian analysis. At the domain level, you can manage policy for inbound and outbound quarantines, outbound encryption, plus block and allow lists based on IP address or sender/recipient email address or domain. Other management features include reports, graphs, statistics; recipient validation via LDAP; support for multiple domains; and delegated domain administration and help desk role.

Download the ProSight Email Guard Datasheet
To view the ProSight Email Guard datasheet, click: ProSight Email Guard Cloud-managed Services Datasheet (94 Kb PDF file).

Other Managed Services Available from Progent
In addition to ProSight Email Guard, Progent offers other affordably-priced ProSight managed service packages that address key components of your information system such as security, backup/recovery, virtual server hosting, IT documentation management, and network infrastructure management. By partnering with leading technology innovators, Progent can offer small and mid-size businesses the benefits of the same advanced technology used by global enterprises. Managed services available from Progent include:

  • ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
    ProSight Active Security Monitoring is an endpoint protection (EPP) solution that incorporates next generation behavior-based analysis technology to defend physical and virtual endpoint devices against new malware assaults like ransomware and email phishing, which routinely evade traditional signature-based anti-virus products. ProSight Active Security Monitoring safeguards on-premises and cloud resources and offers a unified platform to automate the complete threat progression including blocking, detection, mitigation, cleanup, and forensics. Key features include single-click rollback with Windows Volume Shadow Copy Service (VSS) and automatic network-wide immunization against newly discovered attacks. Read more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware defense.

  • ProSight Enhanced Security Protection (ESP): Physical and Virtual Endpoint Security and Exchange Email Filtering
    Progent's ProSight Enhanced Security Protection managed services offer economical multi-layer protection for physical and virtual servers, workstations, smartphones, and Exchange email. ProSight ESP uses contextual security and advanced machine learning for round-the-clock monitoring and reacting to security threats from all attack vectors. ProSight ESP delivers two-way firewall protection, intrusion alarms, device management, and web filtering through cutting-edge tools incorporated within one agent accessible from a single console. Progent's security and virtualization consultants can help your business to design and configure a ProSight ESP environment that meets your organization's unique needs and that helps you prove compliance with legal and industry data protection standards. Progent will assist you define and configure security policies that ProSight ESP will manage, and Progent will monitor your network and react to alerts that require immediate action. Progent's consultants can also assist you to set up and test a backup and restore system like ProSight Data Protection Services so you can recover quickly from a destructive security attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint protection and Exchange email filtering.

  • ProSight Data Protection Services: Managed Backup and Recovery
    ProSight Data Protection Services provide small and mid-sized organizations an affordable and fully managed solution for reliable backup/disaster recovery. Available at a low monthly price, ProSight DPS automates and monitors your backup processes and enables fast restoration of critical files, applications and VMs that have become unavailable or corrupted due to component breakdowns, software bugs, natural disasters, human error, or malicious attacks like ransomware. ProSight Data Protection Services can help you protect, retrieve and restore files, folders, apps, system images, as well as Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to an on-promises storage device, or to both. Progent's BDR specialists can deliver world-class support to set up ProSight DPS to to comply with government and industry regulatory requirements like HIPAA, FIRPA, and PCI and, whenever needed, can assist you to recover your critical data. Learn more about ProSight Data Protection Services Managed Backup and Recovery.

  • ProSight WAN Watch: Network Infrastructure Remote Monitoring and Management
    ProSight WAN Watch is an infrastructure monitoring and management service that makes it easy and inexpensive for small and mid-sized organizations to map, monitor, optimize and troubleshoot their connectivity appliances such as routers and switches, firewalls, and load balancers as well as servers, printers, client computers and other networked devices. Using state-of-the-art RMM technology, WAN Watch ensures that infrastructure topology maps are kept current, copies and manages the configuration information of virtually all devices on your network, monitors performance, and generates alerts when issues are detected. By automating tedious network management processes, ProSight WAN Watch can cut hours off ordinary chores such as network mapping, reconfiguring your network, finding devices that require important updates, or resolving performance problems. Learn more about ProSight WAN Watch infrastructure management services.

  • ProSight LAN Watch: Server and Desktop Monitoring
    ProSight LAN Watch is Progentís server and desktop monitoring service that uses advanced remote monitoring and management techniques to keep your network running efficiently by checking the state of critical assets that power your information system. When ProSight LAN Watch detects a problem, an alert is sent automatically to your specified IT management staff and your Progent engineering consultant so that any looming problems can be resolved before they have a chance to disrupt your network. Find out more details about ProSight LAN Watch server and desktop monitoring services.

  • ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
    With Progent's ProSight Virtual Hosting service, a small business can have its critical servers and apps hosted in a protected fault tolerant data center on a fast virtual machine host configured and maintained by Progent's network support professionals. With Progent's ProSight Virtual Hosting service model, the client retains ownership of the data, the OS software, and the applications. Because the system is virtualized, it can be ported easily to a different hardware environment without requiring a lengthy and difficult reinstallation procedure. With ProSight Virtual Hosting, your business is not tied a single hosting provider. Learn more about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Documentation Management
    ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to create, update, retrieve and safeguard data related to your network infrastructure, procedures, applications, and services. You can instantly locate passwords or serial numbers and be warned about impending expirations of SSL certificates ,domains or warranties. By updating and managing your network documentation, you can eliminate up to half of time spent trying to find critical information about your IT network. ProSight IT Asset Management features a centralized repository for storing and collaborating on all documents required for managing your business network such as recommended procedures and How-To's. ProSight IT Asset Management also supports advanced automation for gathering and associating IT information. Whether youíre making improvements, doing maintenance, or reacting to an emergency, ProSight IT Asset Management delivers the information you need as soon as you need it. Learn more about ProSight IT Asset Management service.
Download Progent's 10 Benefits of Managed IT Services White Paper
To download a white paper describing why managed services are rapidly replacing the traditional break/fix model of IT support for small and mid-size businesses, click:
10 Benefits of Managed IT Services. (PDF - 710 KB)

ProSight Network Audits
Progent's ProSight Network Audits are a quick and affordable way for small and mid-size businesses to get an unbiased evaluation of the overall health of their network. Powered by some of the top remote monitoring and management tools in the industry, and overseen by Progent's certified team of information technology professionals, ProSight Network Audits show you how closely the configuration of your core infrastructure assets conform to best practices. The Basic and Advanced options for ProSight Network Audit services are available at a low, one-time cost and provide immediate ROI like a cleaner Active Directory environment. Both also include one year of cutting-edge remote network monitoring and management (RMM). Benefits can include simpler management, improved compliance with data security requirements, higher utilization of IT resources, quicker problem resolution, more dependable backup and recovery, and less downtime. See more information about Progent's ProSight Network Audits IT infrastructure review.

Progent's ProSight Ransomware Preparedness Report Service
The ProSight Ransomware Preparedness Report service is a low-cost service based on a brief discussion with a Progent backup/recovery expert. The fact-finding interview is designed to evaluate your organization's preparedness to counter ransomware or recover quickly following an attack by a ransomware strain such as Ryuk, Maze, Sodinokibi, Netwalker, Phobos, Lockbit or Egregor. Progent will work with you directly to gather information concerning your current security profile and backup system, and Progent will then deliver a custom Basic Security and Best Practices Report detailing how you can follow best practices to create an efficient security and backup/recovery environment that reduces your vulnerability to a ransomware attack and meets your company's requirements. For more information, visit The ProSight Ransomware Preparedness Report.

Contact Progent for More Information about ProSight Email Guard Security Gateway Services
If you are interested in using Progent's ProSight Email Guard security gateway or need help with any aspect of email infrastructure or security, call 800-993-9400 or visit Contact Progent.

Glossary of Terms Related to Spam Filtering Technology

AES-256
The Advanced Encryption Standard (AES) is a cyber security specification adopted by the National Institute of Standards and Technology (NIST). AES-256 offers the highest level of encryption available within the AES family.

Allow List
Also called a whitelist, contains email addresses or domain names that are exempted from being blocked by a spam filter.

Anti-fraud Intelligence
Linguistic analysis to protect against fraudulent emails, which can take the form of spear phishing, spoofing, fee frauds or bogus offers of help.

Bayesian Analysis
A linguistic algorithm that develops profiles of the words and phrases used in legitimate email collected from specific users or organizations and determines whether new email from these sources fit their linguistic profile. Emails that are out of character have a higher likelihood of being spam.

Block List
Also called a blacklist, contains email addresses or domain names that are to be blocked by a spam filter.

Content Filtering
Most commonly refers to the ability to block or whitelist websites based on category, reputation, use of encryption, specified URL or other characteristics. In the context of ProSight Email Guard, content filtering refers to the ability to block, allow or quarantine an email message based on the results of scanning specified components of the message including subject, headers, body, attachments, sender, and recipient. (See Content Policies.)

Content Policies
Content policies allow administrators to define email filtering based on any combination of subject, headers, body, attachments, sender, or recipient. For example, specified keywords, categories or character sets can be automatically detected and blocked. Based on content policy, administrators can configure their email security gateway to block, allow or quarantine inbound or outbound email and to encrypt outbound email. Careful management of content policies can keep an organization from being blacklisted as a source of spam and other malware.

Data Leakage Protection
Often used as an alternative to data loss prevention (DLP), but can imply that compromised data retains its availability to authorized users and keeps its integrity. (See Data Loss Prevention.)

Data Loss Prevention (DLP)
Data loss prevention (DLP) for email entails scanning the content of email messages and attachments and blocking the transmission of sensitive information. DLP allows administrators to establish and enforce policies that block or encrypt outbound email that could carry inappropriate information. DLP features included in ProSight Email Guard can also help organizations avoid reputation loss and stay in compliance with industry security standards and government regulations such as HIPAA and Sarbanes-Oxley.

Delegated Administration
With ProSight Email Guard, control of domain-level settings can be assigned to the Domain Admin role, which has the most permissions, the Helpdesk role, with fewer permissions, or the Governance, Risk Management and Compliance (GRC) Account role, which has a specific role with limited permissions. The User role allows users to view and manage their own account and their quarantine inbox and related settings. Delegation significantly reduces the burden of email administration by safely offloading certain management responsibilities.

Denial of Service (DoS) Attack
An attack designed to bring down a network by flooding it with useless traffic. DDOS (Distributed Denial of Service) is an attack by multiple systems, often compromised by a Trojan, on a single system.

Directory Harvest Attack (DHA)
Scripted attempts designed to steal directory information from unprotected email servers. Spammers send messages with a generic address to your SMTP mail server. For example, spammers will try sending 'ed@acme.com,' 'sue@acme.com' or other names until the server recognizes a name and accepts a message. Spammers combine dictionaries of common names and tabulate which addresses work and which do not. The technique can yield an overwhelming number of delivery requests, consuming server processing power. Spammers then sell the compiled list of valid email addresses to other spammers, resulting in spam for new and unused accounts. False Positive
A valid email incorrectly identified as spam. Without any tuning, ProSight Email Guard has a false positive rate of 0.01 percent, one of the lowest in the industry.

Hardened Datacenter
Highly secure, fault-tolerant facilities housing IT equipment connected to telecommunications networks. The facilities accommodate web servers, email servers, switches, routers, mass storage and other critical equipment and feature redundancy, backup power, and physical security. Cloud-based infrastructure can combine multiple hardened datacenters in separate geographic regions for high availability and disaster recovery.

Heuristic Rules Analysis
A branch of artificial intelligence whereby expert systems use programs that are self-learning and improve with experience. With spam filtering, the more messages processed the better the results.

HTTPS
The use of Secure Socket Layer (SSL) or Transport Layer Security (TLS) under standard HTTP layering to provide secure web access through encryption.

Image Spam
Image spam, which at one point represented around one third of all Internet traffic, is a technique that hides text, typically a URL, by embedding it within an image. ProSight Email Guard uses an Optical Character Reader (OCR) engine to detect this threat. The Update Center also maintains Internet traps known as "honeypots" to build blacklists of image spam senders.

Intent Analysis
Multi-level analysis that recursively follows web links, email addresses and phone numbers embedded in email messages to determine whether they are associated with legitimate entities. Intent analysis also analyzes domain attributes to profile email campaigns.

Key Management
Email encryption requires the sender and recipient to exchange their encryption keys before sending or receiving protected emails. Key management is complex and includes the creation, distribution, safe storage, exchange and use of encryption keys. ProSight Email Guard's cloud-based solution for email encryption stores keys centrally and manages them automatically without burdening administrators or users.

LDAP
The Lightweight Directory Access Protocol (LDAP) is an open, industry-standard application protocol for accessing and maintaining distributed directory information services over an IP network. ProSight Email Guard's Exchange Accelerator/LDAP Verification feature uses the LDAP support built into Microsoft Exchange to protect against dictionary attacks, which attempt to break into a system by trying every word in a hacker's "dictionary" of possible passwords.

Link Protection
ProSight Email Guard's Link Protection, when activated, automatically rewrites any URL embedded within an inbound email and directs it to a safe URL before delivering the email. If the recipient clicks on the embedded URL, ProSight Email Guard evaluates the link for validity and reputation. If the domain appears to be valid, the user is directed to that website. If the URL is suspicious, the user is directed to a warning page which shows the actual link and explains why the URL was blocked.

OCR Engine
Embedding text in images is an established technique used by spammers to avoid detection by the text processing mechanisms in anti-spam engines. An optical character recognition (OCR) engine allows a spam filter to analyze the text rendered inside an image. Before submitting images to the OCR engine, ProSight Email Guard uses a variety of image processing technologies to normalize images whose text has been obfuscated with speckling, shading or color manipulation. The Update Center also uses advanced image processing algorithms to create fingerprints that can be used to block messages containing image spam.

Phishing
A scam that usually involves a fraudulent email purporting to come from a legitimate sender such as a bank and that either contains links to a spoofed website or else tries to talk the recipient into disclosing private information such as a password or social security number. ProSight Email Guard detects Phishing scams by using a specialized Bayesian database. Attacks that include information that suggests familiarity or friendship with the recipient are known as Spear Phishing and account for about 91% of email attacks.

Polymorphic Viruses
A virus that self encrypts by changing its signature to avoid detection by simple virus scanners. ProSight Email Guard relies on a supercomputing grid that uses a partial checksum approach to identify the unchanged signature portions of a virus body.

Predictive Sender Profiling
Identifying suspicious behaviors from sources who currently have clean reputations, for example newly infected bots on otherwise legitimate computers.

Quarantining
A quarantined email can be sent to an individual quarantine inbox assigned to the recipient or to a global quarantine mailbox designated by the administrator. Individuals can have quarantine accounts on the ProSight Email Guard security gateway, which takes the load off the email server, or on their regular mailbox. In this case, ProSight Email Guard alters the subject text of quarantined messages to show that the message could be spam.

Rate Control
The ability to pace inbound or outbound email from a single IP address or email address based on pre-configured frequency thresholds. Delivery of messages from sources that exceed the threshold is delayed in order to stabilize system performance.

Reputation Analysis
The use of databases that include the IP of addresses for known spammers, safe email senders, and web addresses known to be associated with spam. Email from IP addresses with poor reputations or whose content includes web addresses with poor reputations can be identified and handled according to spam policies.

Scoring Thresholds
After an email passes through the ProSight Email Guard security gateway it is given a score ranging from 1 to 10 representing the likelihood that the message is spam. The administrator can use scoring thresholds to automate how messages are managed by choosing to allow, tag, quarantine or block emails depending on their score.

Security Perimeter
The outermost edge, such as a firewall or security gateway, over which the enterprise has control over an email message before the message is received from or passed to the Internet.

Signatures
Also called a fingerprint, a series of bytes within a virus that uniquely identifies it and that can be searched for by anti-virus filters.

Spam
Unsolicited and unwanted email usually sent in bulk as part of marketing campaigns but sometimes sent with malicious intent.

Spoofing
A phishing technique whereby an attacker uses an IP address that appears to come from a trusted host. One of the most notorious examples is the exploit from service@aol.com. Spoofing attacks often include links to a fraudulent, or spoofed, web site that impersonates a familiar web site.

Spooling
A disaster recovery feature whereby incoming email is stored temporarily in the cloud or redirected in the event that your on-premises data center is disrupted. ProSight Email Guard's Cloud Protection Layer can store all your inbound email for up to four days or direct it to an alternative destination if your email server becomes unavailable. Meanwhile, Progent can provide expert online or onsite support to bring your local system back into service quickly.

Spyware
Software that collects and possibly shares information about a person without specified consent. Common forms of spyware include cookies, adware and Trojans. The collected information is typically used for marketing, but can also be used more maliciously. Major corporations (e.g., Facebook) use spyware routinely and legally. ProSight Email Guard includes technology that provides real-time protection from malicious spyware attacks.

SMTP
Short for Simple Mail Transfer Protocol, a protocol for sending email messages between servers. SMTP email servers are a common target of Directory Harvest Attacks.

Tagging
A technique for helping users to identify filtered email that meets some criteria for being spam. Tagged emails are delivered with a customized label appended to the subject field, e.g., [BULK]. This allows users to make their own determination about how to deal with them.

TLS
The Transport Layer Security (TLS) encryption protocol allows secure communication over the Internet. The ProSight Email Guard security gateway supports SMTP over TLS to encrypt email traffic between sites over the Internet.

Viruses
Computer code that can replicate itself. Viruses are commonly spread via email and allow an attacker to steal or destroy data or take control of an infected system. Types of viruses include Trojans and worms.

Zero-hour Protection
The ability to develop and distribute defenses against newly discovered spam and viruses within minutes rather than days. The hybrid infrastructure of ProSight Email Guard is designed to provide this capability.

Also See:



An index of content::

  • 24-7 San Leandro Solution Providers San Leandro Small Business Network Consulting Company
  • 24-Hour Technology Providers Microsoft Exchange 2016 Ada County Idaho Microsoft Exchange Migration Companies Boise Eagle, United States
  • ProSight Email Guard Spam Filtering Consultant
  • 24x7x365 Telecommuters San Francisco Assistance - Backup Solutions Assistance SF Bay Area San Francisco Remote Workforce Backup/Restore Technology Expertise Burlingame, CA
  • Appleton, Wisconsin, U.S.A. Tech Outsourcing BlackBerry Exchange BlackBerry Computer Specialists Appleton-Manitowoc, WI
  • At Home Workers Assistance - Reno - IP Voice Systems Guidance Reno Reno Nevada 24x7x365 Work from Home Employees Reno Consulting and Support Services - VoIP Technology Consulting
  • At Home Workers Wilmington Consulting Experts - Collaboration Technology Consulting and Support Services Wilmington, Delaware Wilmington Remote Workforce Collaboration Solutions Consulting Services Wilmington-New Castle, Delaware
  • At Home Workforce Guidance in Long Beach - Collaboration Systems Expertise Long Beach, CA Long Beach At Home Workforce Collaboration Technology Consulting and Support Services Long Beach Southern California, United States
  • At Home Workforce Wichita Consulting Services - Connectivity Solutions Consulting Services Wichita Wichita Kansas Offsite Workforce Wichita Consulting and Support Services - Set up Consultants
  • Baltimore Work at Home Employees VoIP Technology Expertise Baltimore, MD Remote Workers Consulting and Support Services in Baltimore - VoIP Technology Expertise
  • BlackBerry BES Design Consultants Columbus, Franklin County, United States Franklin County Ohio Emergency BlackBerry Wireless Computer Network Companies
  • BlackBerry Synchronization Networking Support Oxford BlackBerry Enterprise Server Migration Firm Oxford
  • ProSight Email Guard Content Filtering Consultant Services
  • CCIE Certified Technical Consultant 8800-EX Wireless IP Phone Emergency Cisco VoIP phones Support
  • Email Intent Analysis Specialist
  • CISSP Certified Security Computer Systems Consulting Allentown Largest Allentown Information Technology Consulting Companies
  • Calgary-Lethbridge Canada Configure Calgary, Alberta Computer Consultation
  • Cisco Consultancies Sandy Springs-Cobb County Top Rated Cisco Network Consultants Sandy Springs
  • Cisco VoIP Phones and Unified Communications Network Consultant Voice Over IP Configuration

  • Juniper Junos Consulting
    Juniper Junos J-Web Security Consultancies

    Progent's Juniper-certified network engineers can help you utilize Junos OS and the Junos platform of network management applications to configure, administer, and monitor Junos-powered devices; migrate to the Junos OS operating system from other Juniper software platforms such as ScreenOS; and upgrade your Juniper routers, switches, and gateways to the latest version of Junos OS.

  • Clearwater St Petersburg Outsourcing Services Microsoft Windows Computer Network Support Remote Help Desk Clearwater, FL, USA
  • Dynamics GP-Software Solution Provider near me in Huntington Beach - Reporting Consultant Huntington Beach California Huntington Beach Dynamics GP (Great Plains) Customization Expert
  • Emergency Cisco Consultancy Services Group Raleigh Raleigh, NC Network Companies

  • SCCM and SQL Server Consulting
    SCCM Mobile Application Management Online Troubleshooting

    Configuration Manager automates application and device deployment across multiple sites, simplifies compliance settings management, keeps track of network resources, protects against corporate data leakage, performs network health monitoring, allows safe end-user self service, and offers a single control mechanism for managing multi-OS ecosystems based on on-premises, cloud-centric, or hybrid deployment architectures. Progent's Microsoft-certified Configuration Manager consultants and Microsoft Azure cloud integration experts can assist you with any facet of designing, installing, using and troubleshooting a SCCM solution for local, cloud, or hybrid environments.

  • Emergency Dayton Crypto-Ransomware Removal Dayton Centerville Trotwood, United States Immediate Dayton Dharma Crypto-Ransomware Identification and Recovery Dayton
  • Engineer Lync Server 2013 video conferencing Lync Server 2013 and Active Directory Technology Professional
  • Exchange Server 2003 Upgrade Online Support Services Microsoft Exchange Integration
  • Exchange Server 2013 Expert Saddle Brook-Paterson, New Jersey, United States Microsoft Exchange 2010 Tech Consultants
  • Fort Lauderdale Computer Networking 24-7 IT Consulting Firms Fort Lauderdale, FL
  • Fort Wayne Consulting Expertise for Network Service Organizations Fort Wayne International Airport FWA Consulting Experts for Fort Wayne IT Service Providers Fort Wayne International Airport FWA
  • Fort Wayne International Airport FWA Remote Workers Consulting Experts - Fort Wayne - IP Voice Technology Guidance Fort Wayne Work from Home Employees IP Voice Systems Assistance Fort Wayne Indiana
  • ISR Router Integration Support CCIE Certified 3800 Router Remote Troubleshooting
  • Information Technology Consulting Firm Solano County Solano County Computer Consultancy Company
  • 24 Hour Email Quarantine Consultants
  • Information Technology Outsourcing Group Exchange 2003 Server Shreveport, LA Exchange Small Office IT Consultants Shreveport Bossier City
  • Irvine, CA Network Consultant SharePoint 2010 SharePoint 2010 Professionals
  • Largest Denver Telecommuters Cloud Integration Technology Assistance Denver, CO, U.S.A. Work at Home Employees Assistance nearby Denver - Cloud Integration Solutions Consulting Services Denver
  • Lexington PC Consulting Network Security Consultant Lexington
  • Long Beach Offsite Workforce Infrastructure Consultants Long Beach, CA Long Beach California Long Beach Teleworkers Infrastructure Consulting and Support Services
  • Email Anti-fraud Intelligence Consult
  • Long Beach, California Onsite Support Information Technology Consulting Firm Long Beach
  • Email Encryption Key Management Technology Professional
  • Long Beach-Seal Beach Network Support Service Network Help Long Beach, CA
  • Melbourne, VIC Tech Expert Melbourne, Australia Small Business Computer Consulting Firm
  • Microsoft MCP Consulting Part Time Job California Central Valley Computer Engineer Open Positions
  • Microsoft SharePoint Server 2010 IT Consulting Denver Golden Triangle Computer Engineer Microsoft SharePoint Server 2010 Denver International Airport
  • Email Guard DLP Specialist
  • Microsoft Windows 7 Evaluation Remote Consulting Windows 7 On-site Support
  • Migration Consultant SQL Server Guadalajara Guadalajara Computer Consulting Firms Microsoft SQL 2008
  • ProSight Email Guard Spam and Virus Filtering Service Engineer
  • Mission Viejo Consultants for Mission Viejo Computer Support Organizations Mission Viejo Consulting for Network Support Companies Mission Viejo-San Clemente, CA

  • Specialists ProSight certificate expiration management
    IT documentation management Specialists

    ProSight IT Asset Management is a cloud-based IT documentation management service that allows you to create, update, retrieve and safeguard data related to your network infrastructure, processes, business apps, and services. You can instantly locate passwords or serial numbers and be alerted automatically about upcoming expirations of SSLs or domains. By cleaning up and managing your IT infrastructure documentation, you can eliminate as much as half of the time wasted trying to find vital information about your IT network. ProSight IT Asset Management features a centralized location for storing and collaborating on all documents required for managing your network infrastructure such as standard operating procedures and self-service instructions. ProSight IT Asset Management also supports advanced automation for collecting and relating IT data. Whether youíre planning enhancements, performing regular maintenance, or reacting to a crisis, ProSight IT Asset Management delivers the knowledge you require as soon as you need it.

  • Consultants Email Bayesian Analysis
  • Montgomery Remote Workforce Voice/Video Conferencing Systems Consulting Services Montgomery Montgomery, AL Remote Workforce Assistance near me in Montgomery - Conferencing Technology Consulting and Support Services
  • Network Engineers Exchange Exchange Server 2010 Server Support
  • Networking Help Cisco Migration Companies Cisco Shreveport, United States

  • Catalyst 802.11ax Access Point Specialists
    CCNP Expert Certified Catalyst 9105i Access Point Integration

    Progent's Cisco-certified Catalyst 9100 Series 802.11ax Wi-Fi 6 WAP experts offer affordable remote and on-premises support for Catalyst Wi-Fi 6 wireless access points.

  • Offsite Workforce Assistance near Calgary - Call Desk Outsourcing Consulting Calgary Offsite Workforce Calgary Assistance - Call Desk Solutions Consulting Calgary
  • On-Call Services Windows Wisconsin - Milwaukee, WI, Madison, WI, Green Bay, WI, Kenosha, WI Windows Computer System Consultant Wisconsin
  • Remote Workforce Assistance near Albany - Setup Consulting and Support Services Albany, NY Albany-Troy, New York At Home Workers Guidance - Albany - Setup Assistance

  • Aten IP9001 Services
    Remote Server Management Cards Consultancy

    Remote management cards offer network managers complete control over a server without the requirement for a personal visit. Using these server management cards, all console screen data plus keyboard and mouse functionality are exported to an off-site session to an IT expert who can be located anywhere with Internet access. Progent's Microsoft and Cisco authorized engineers can assist you to design, implement, and support a high-availability business network that incorporates remote management cards and Progent can use these remote server management cards to deliver efficient remote technical help. Progent is familiar with a number of remote server management cards including Aten IP9001 remote management cards, American Megatrends MegaRAC remote management cards, Dell remote server management cards, HP Lights-Out 100c remote server management cards, and Peppercon eRIC remote management cards.

  • Remote Workforce Consulting nearby Cleveland - Backup/Restore Technology Consulting Services Cleveland Cleveland, Cuyahoga County Remote Workforce Cleveland Consulting Services - Data Protection Systems Consulting

  • Microsoft Word for Mac Online Support Services
    Word for Mac Computer Consulting

    Microsoft Office for Mac allows Mac users to receive the benefits of the world's most familiar office productivity applications. Progent's Apple-certified Macintosh experts can show you how to configure Microsoft Office for Macintosh on a multi-vendor network that incorporates Apple OS X and Windows-powered platforms so that Macintosh users can take advantage of the latest features in Microsoft Word, Excel, PowerPoint and Entourage for Mac in order to share data and network resources with co-workers who use Microsoft Windows. Progent's consultants have experience with both Mac and Windows technology and can provide service for networks that combine Apple Macintosh with Windows computers with complete resource sharing, or networks which intentionally restrict collaboration between Mac and Windows users.

  • Remote Workforce Winston-Salem Expertise - Endpoint Security Systems Consultants Winston-Salem Piedmont Triad Teleworkers Winston-Salem Consulting Services - Endpoint Security Solutions Assistance Forsyth County North Carolina
  • SQL Network Design SQL Consultancy Firm Milwaukee, WI, Madison, WI, Green Bay, WI, Kenosha, WI

  • VMware vRealize Automation vRA Services
    VMware NSX Architecture Engineer

    VMware's NSX network virtualization technology enables you to create complete logical networks in software. NSX allows virtual networks to be deployed instantly and managed with a high degree of automation independent of the hardware used by the basic IP network. VMware Site Recovery Manager (SRM) supports automated recovery, application mobility, and non-intrusive site relocation, failback and re-protect. Site Recovery Manager also permits transparent testing for disaster recovery, updates and patches and can generate reports to confirm complete service restoration, validate SLAs and prove DR compliance. When used with VMware's NSX network virtualization technology, VMware Site Recovery Manager can quickly restore the entire logical network topology at the secondary datacenter. Progent offers the skills of a VCDX certified VMware NSX consulting expert and VMware SRM system architect to help your organization to design, deploy, test and manage a DR system powered by VMware Site Recovery Manager and VMware NSX.

  • SQL Server 2012 Technical Support Organization Irvine Placentia Microsoft SQL Server 2016 Server Administration Irvine Newport Beach California

  • System Center 2016 Security Support and Help
    Microsoft Experts Integration System Center 2016 and Windows 10 Integration

    Small to middle size businesses can now enjoy all the advantages of Operations Manager 2007 and also have quick access to Progentís Microsoft Certified IT consulting professionals. With Progent's affordably priced IT support programs, small and midsize organizations can choose a simple System Center Operations Manager-based co-sourcing package with server monitoring, reporting, Help Desk and online service or a complete round-the-clock outsourcing solution. Progent offers expertise in Microsoft System Center Operations Manager to provide small business information systems world-class availability, protection, and productivity.

  • Cloud Protection for Email Specialist
  • Salt Lake City-Sandy Small Business IT Outsourcing Firm 24-Hour Migration Support Salt Lake City, Utah
  • San Juan, Puerto Rico Windows Server 2019 Technology Consulting Windows 2008 Server Small Business IT Consultant San Juan

  • Cisco CCIE Online Small Business IT Consulting Firm
    Award Winning Online Cisco Certified CCIE Consultant Services

    Progent's Cisco CCIE network infrastructure consultants can assist you to configure, manage, update and debug Cisco network products. Progent offers Cisco, Meraki and Nexus switch consulting, ASA firewall expertise, Meraki and Aironet Wi-Fi access point support, Cisco VoIP phone consulting, and CUCM/CallManager software consulting.

  • Shreveport Networking Consultancy IT Management Shreveport, Louisiana

  • Fault Tolerant OSPF Configuration Professionals
    Redundant Connectivity Network Engineer

    Progentís high availability interoffice connectivity and 24x7 network connection consultants can help small organizations achieve zero-downtime Interoffice connectivity through fully redundant networks featuring automatic failover. Progentís CCIE engineers can design and implement ultra-reliable Inter-office connections supported by non-stop EIGRP routers or non-stop OSPF deployment of Cisco routers. Progent can demonstrate how redundant connections and automatic fail-over can provide economical non-stop interoffice connectivity.

  • Email Image Spam Protection Consultants
  • Sioux Falls, SD Sioux Falls At Home Workforce VoIP Solutions Consulting Services Immediate Remote Workforce Consulting in Sioux Falls - VoIP Solutions Consulting Experts Sioux Falls Brandon, United States
  • Small Medium Business IT Support Microsoft and Cisco Mid-size Company Networking Companies
  • Southern California San Diego, United States SharePoint Server 2013 Setup and Support Microsoft SharePoint 2010 Technical Support Services San Diego - La Mesa, United States
  • Specialist Red Hat Linux, Sun Solaris, UNIX The Woodlands, TX Integration Suse Linux, Sun Solaris, UNIX The Woodlands
  • Suse Linux, Solaris, UNIX Technical Support S„o Paulo S„o Paulo Urgent Suse Linux, Solaris, UNIX Technical Support Services
  • Telecommuters Expertise near Indianapolis - Video Conferencing Solutions Assistance Indianapolis Indiana Offsite Workforce Indianapolis Consulting Services - Video Conferencing Solutions Expertise Marion County Indiana

  • Windows Server 2016 Health Service Computer Consulting
    Windows Server 2016 Business Continuity Consultant Services

    Progent's Microsoft-certified information technology experts can provide Windows Server 2016 migration consulting to help organizations of all sizes to plan and implement an efficient upgrade to Windows Server 2016 and Windows Hyper-V 2016 based on a local, cloud-centric, or hybrid architecture. Progent can assist you to evaluate the business value of Windows Server 2016 for your environment and can help you with any facet of planning, deploying, managing or troubleshooting your Windows Server 2016 and Windows Hyper-V 2016 ecosystem. Progent can assist your organization to take advantage of the many new high-availability and information assurance capabilities of Windows Server 2016 and Hyper-V 2016 such as Windows Containers for isolating applications, Shielded Virtual Machines to protect against compromised administrators, Credential Guard and Remote Credential Guard, Just In Time Privileged Access Management, Virtual Machine software load, Storage Replica, plus multi-domain failover clusters.

  • Temporary IT Support Staffing Help Consulting Specialist Jacksonville, FL IT Staffing Temps for Computer Support Organizations Jacksonville
  • Toledo Network Documentation Toledo-Lucas County Networking Services
  • Top Cisco Expert West Palm Beach, FL Small Business Computer Consulting Company West Palm Beach Network Installation
  • Webster Work at Home Employees Endpoint Management Solutions Guidance Harris County Webster Remote Workforce Management Tools Assistance Webster, Texas
  • Windows 2008 Server Security Consulting Naperville, Illinois Windows Server 2012 R2 Network Engineer Chicagoland

  • Part-Time Job Remote Support Network Engineering
    VoIP PBX Consulting Telecommuter Job

    Progent's work environment will make you a more capable consultant by enhancing your information technology knowledge and boosting the satisfaction of your clients. Progent delivers this promise by recruiting the top professional talent for you to work with, providing a state-of-the-art system architecture, running proprietary application tools to enable the highest level of support, and by streamlining proven business structures for finding and retaining customers.

  • Windows 7 Security Technical Support Services Windows 7 Consultants
  • Windows Server 2003 Consultant Windows 2003 Specialist
  • Email Encryption Key Management Services
  • Wireless EMail Consultants Wireless Computer Consultant
  • Work at Home Employees Consultants - Tulsa - Call Desk Solutions Expertise Tulsa Tulsa At Home Workers Help Desk Outsourcing Consulting Tulsa County Oklahoma, U.S.A.
  • Work from Home Employees Consulting Experts near Chandler - Voice/Video Conferencing Technology Consulting Services Chandler Arizona At Home Workers Chandler Consulting Experts - Video Conferencing Technology Expertise Maricopa County Arizona
  • Work from Home Employees Guidance near Lower Manhattan - Setup Consultants NYC-East Village, New York, USA Offsite Workforce Consulting and Support Services in Lower Manhattan - Setup Consultants Manhattan, United States
  • 24x7 Email Predictive Sender Profiling Engineers

  • © 2002-2021 Progent Corporation. All rights reserved.