ProSight Email Guard Spam and Content Filtering ConsultingProSight Email Guard from Progent uses the services and infrastructure of leading data security companies to provide centralized management and comprehensive protection for all your inbound and outbound email. The hybrid architecture of ProSight Email Guard combines a Cloud Protection Layer with an on-premises security gateway appliance to deliver world-class defense against spam, viruses, spoofing, phishing, spyware, Denial of Service (DoS) attacks, Directory Harvest Attacks (DHAs), and other email-borne threats.

ProSight Email Guard's Cloud Protection Layer acts as a first line of defense and keeps the vast majority of threats from reaching your security perimeter. This reduces your vulnerability to external attacks and conserves system resources. Email Guard's on-premises security gateway provides a deeper layer of inspection for inbound email. For outbound email, the local security gateway offers anti-virus and anti-spam filtering, policy-based Data Loss Prevention (DLP), Data Leakage Protection, Content Filtering and outbound email encryption. The local email security gateway can also manage your Exchange Server deployment to monitor and protect internal email traffic that never reaches your security gateway.

ProSight Email Guard works with any email platform and offers enhanced features for Exchange Server.

The architecture of the ProSight Email Guard solution includes four main components that stand between the Internet and the email server at your data center:

  • Update Center
  • Cloud Protection Layer
  • Email Guard Security Gateway Appliance
  • Message Center
Email Guard's Architecture

ProSight Email Guard's hybrid architecture provides comprehensive protection for inbound and outbound email traffic

Update Center
The Update Center is a technology center staffed 24x7x365 by security experts who gather emails, URLs, binaries and other data collected from thousands of collection points worldwide, aggregate and analyze this information, and develop defenses, rules and signatures to update ProSight Email Guard's defense mechanism in order to provide zero-hour protection against the latest email-borne threats. Advanced filtering techniques and heuristic rules analysis used by the Update Center include reputation analysis, intent analysis, and predictive sender profiling. The result is a spam and virus filtering solution that blocks a very high percentage of threats yet delivers a very low number of false positives.

Cloud Protection Layer
The Cloud Protection Layer, which is kept current by the Update Center, provides spam and virus prefiltering using advanced technologies that include anti-fraud intelligence and blocking polymorphic viruses that can change their signatures to escape detection. Made up of multiple hardened datacenters worldwide, the Cloud Protection Layer has the capacity to handle Denial of Service attacks as well as email surges that occur during specific periods of the day. Because this cloud-based service stands between the Internet and the Email Guard security gateway, the majority of malicious email can be eliminated before it reaches your security perimeter. To help with disaster recovery and email continuity, the Cloud Protection Layer offers spooling. If your on-premises data center is disrupted, the spooling feature can store all inbound email in the cloud for up to 96 hours or direct it to an alternate destination while you repair the problem.

ProSight Email Guard Security Gateway Hardware Appliance
The ProSight Email Guard Security Gateway is a physical rack-mountable appliance that provides comprehensive protection for inbound, outbound and internal email. The gateway is automatically updated in real time by the Update Center without requiring management intervention. One of the gateway's deep inspection features is a multi-pass OCR engine that protects against image spam, where text is embedded within a graphic in order to hide content from spam filters. Another feature for filtering inbound email is link protection, which automatically evaluates and rewrites fraudulent URLs contained in a message. A plug-in agent for Microsoft Exchange Server offers virus protection for internal email traffic that does not access the gateway, for example emails from Outlook Web Access.

The ProSight Email Guard Security Gateway offers Data Loss Prevention (DLP) by allowing administrators to enforce content policies for outbound email in order to keep sensitive corporate information from being inadvertently leaked. The gateway can also be configured to block invalid bounce messages, which are outbound non-delivery reports to forged email addresses. In addition, the gateway offers a variety of encryption features for outbound email and supports inbound and outbound rate control. The Email Guard Security Gateway is available in several models to match your capacity requirements and security needs and can be clustered for higher performance and availability.

Message Center
The Message Center is a cloud-based service for encrypting outbound email. Emails that match policy are sent securely from the Email Guard Security Gateway to the Message Center. At the Message Center, the sender's email is encrypted using Advanced Encryption Service with a 256-bit cipher (AES-256) and stored for retrieval. The Message Centers sends the recipient a notification that includes a link to visit in order to retrieve the message. The link requires a web browser using HTTPS. The recipient selects a password and the Message Center delivers the encrypted message.

Email Guard's Outbound Encryption

The recipient only needs to establish a password for the first encrypted email received from the message center. Any replies are also sent via the Message Center to maintain security. Encryption key management is handled automatically by the Message Center, and the keys used to encrypt the data are stored in separate areas to provide physical security. Email traffic between the Email Guard Security Gateway and the Message Center and between the Message Center and the recipient are encrypted via SMTP over TLS.

In addition to policy-based encryption, Email Guard also provides an add-in for Microsoft Exchange Server that allows users to specify encryption from within Outlook.

Management Features
The ProSight Email Guard security gateway is integrated with a web-based management portal that provides a simple, centralized interface for viewing and managing all devices, services, policies and configurations. The cloud management tool offers global, domain-level, and individual user policy control. User-level policy management includes block lists, allow lists, quarantining, scoring thresholds, tagging and Bayesian analysis. At the domain level, you can manage policy for inbound and outbound quarantines, outbound encryption, plus block and allow lists based on IP address or sender/recipient email address or domain. Other management features include reports, graphs, statistics; recipient validation via LDAP; support for multiple domains; and delegated domain administration and help desk role.

Download the ProSight Email Guard Datasheet
To view the ProSight Email Guard datasheet, click: ProSight Email Guard Cloud-managed Services Datasheet (94 Kb PDF file).

Other Managed Services Available from Progent
In addition to ProSight Email Guard, Progent offers other affordably-priced ProSight managed service packages that address key components of your information system such as security, backup/recovery, virtual server hosting, IT documentation management, and network infrastructure management. By partnering with leading technology innovators, Progent can offer small and mid-size businesses the benefits of the same advanced technology used by global enterprises. Managed services available from Progent include:

  • ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
    Progent's ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) solution that incorporates cutting edge behavior-based analysis technology to defend physical and virtual endpoints against new malware attacks like ransomware and email phishing, which easily escape legacy signature-matching AV tools. ProSight Active Security Monitoring safeguards on-premises and cloud-based resources and provides a unified platform to automate the entire malware attack progression including blocking, identification, mitigation, remediation, and post-attack forensics. Key features include single-click rollback with Windows Volume Shadow Copy Service and automatic network-wide immunization against new attacks. Read more about Progent's ProSight Active Security Monitoring (ASM) next-generation endpoint protection and ransomware recovery.

  • ProSight Enhanced Security Protection: Endpoint Protection and Microsoft Exchange Filtering
    ProSight Enhanced Security Protection (ESP) services deliver ultra-affordable multi-layer security for physical servers and virtual machines, desktops, mobile devices, and Exchange Server. ProSight ESP utilizes contextual security and modern behavior analysis for round-the-clock monitoring and reacting to cyber assaults from all attack vectors. ProSight ESP provides two-way firewall protection, penetration alarms, device management, and web filtering via leading-edge tools incorporated within a single agent accessible from a single console. Progent's data protection and virtualization experts can help your business to design and configure a ProSight ESP deployment that meets your company's unique needs and that allows you prove compliance with legal and industry information protection standards. Progent will assist you define and implement security policies that ProSight ESP will manage, and Progent will monitor your network and react to alerts that call for immediate action. Progent can also assist you to install and test a backup and restore solution such as ProSight Data Protection Services (DPS) so you can recover quickly from a potentially disastrous security attack like ransomware. Find out more about Progent's ProSight Enhanced Security Protection (ESP) unified endpoint security and Exchange email filtering.

  • ProSight Data Protection Services: Managed Backup and Disaster Recovery
    ProSight Data Protection Services offer small and medium-sized businesses a low cost end-to-end service for secure backup/disaster recovery (BDR). For a fixed monthly price, ProSight DPS automates your backup activities and enables fast restoration of critical files, applications and virtual machines that have become unavailable or damaged as a result of hardware failures, software bugs, disasters, human error, or malware attacks such as ransomware. ProSight DPS can help you back up, recover and restore files, folders, apps, system images, as well as Microsoft Hyper-V and VMware virtual machine images. Critical data can be backed up on the cloud, to an on-promises device, or mirrored to both. Progent's backup and recovery consultants can provide world-class expertise to configure ProSight DPS to be compliant with regulatory standards such as HIPAA, FINRA, PCI and Safe Harbor and, when needed, can assist you to recover your business-critical data. Learn more about ProSight DPS Managed Backup.

  • ProSight WAN Watch: Network Infrastructure Remote Monitoring and Management
    ProSight WAN Watch is an infrastructure monitoring and management service that makes it easy and affordable for smaller organizations to diagram, track, optimize and troubleshoot their networking appliances such as routers, firewalls, and load balancers plus servers, printers, client computers and other devices. Using state-of-the-art Remote Monitoring and Management technology, WAN Watch ensures that network diagrams are kept updated, captures and manages the configuration of almost all devices on your network, monitors performance, and generates alerts when issues are detected. By automating tedious management and troubleshooting activities, WAN Watch can knock hours off ordinary chores like network mapping, reconfiguring your network, locating appliances that need critical software patches, or identifying the cause of performance bottlenecks. Learn more details about ProSight WAN Watch network infrastructure monitoring and management consulting.

  • ProSight LAN Watch: Server and Desktop Monitoring and Management
    ProSight LAN Watch is Progentís server and desktop monitoring managed service that uses state-of-the-art remote monitoring and management technology to help keep your IT system operating efficiently by tracking the health of critical assets that drive your information system. When ProSight LAN Watch detects a problem, an alarm is sent immediately to your specified IT personnel and your assigned Progent engineering consultant so that any potential problems can be addressed before they have a chance to disrupt productivity. Learn more about ProSight LAN Watch server and desktop monitoring services.

  • ProSight Virtual Hosting: Hosted VMs at Progent's World-class Data Center
    With ProSight Virtual Hosting service, a small or mid-size organization can have its critical servers and apps hosted in a secure Tier III data center on a fast virtual machine host configured and managed by Progent's IT support professionals. With the ProSight Virtual Hosting model, the client retains ownership of the data, the operating system platforms, and the apps. Since the system is virtualized, it can be moved immediately to a different hardware solution without a lengthy and difficult configuration process. With ProSight Virtual Hosting, your business is not locked into a single hosting provider. Find out more details about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Documentation Management
    Progent's ProSight IT Asset Management service is a cloud-based IT documentation management service that allows you to capture, update, retrieve and safeguard information about your network infrastructure, procedures, applications, and services. You can quickly find passwords or serial numbers and be alerted automatically about upcoming expirations of SSLs or domains. By cleaning up and organizing your IT documentation, you can eliminate up to half of time wasted looking for vital information about your IT network. ProSight IT Asset Management includes a common location for holding and collaborating on all documents required for managing your business network like standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also offers advanced automation for collecting and associating IT data. Whether youíre planning enhancements, doing maintenance, or responding to an emergency, ProSight IT Asset Management gets you the knowledge you need as soon as you need it. Find out more about ProSight IT Asset Management service.
Download Progent's 10 Benefits of Managed IT Services White Paper
To download a white paper describing why managed services are rapidly replacing the traditional break/fix model of network support for small and mid-size companies, click:
10 Benefits of Managed IT Services. (PDF - 710 KB)

ProSight Network Audits
Progent's ProSight Network Audits are a fast and affordable way for small and mid-size organizations to obtain an objective evaluation of the overall health of their information system. Powered by a selection of the top remote monitoring and management tools available, and overseen by Progent's certified team of information technology professionals, ProSight Network Audits show you how closely the deployment of your essential network devices conform to best practices. Both the Basic and Advanced options for ProSight Network Audit services are offered at a low, one-time cost and deliver instant ROI like a more manageable Active Directory environment. Both also include one year of state-of-the-art remote network monitoring and management. Advantages can include easier management, improved compliance with information security regulations, more efficient utilization of network assets, faster troubleshooting, more dependable backup and restore, and less downtime. Read more about Progent's ProSight Network Audits network infrastructure review.

The ProSight Ransomware Preparedness Report Service
Progent's ProSight Ransomware Preparedness Report service is an affordable service built around a brief discussion with a Progent backup/recovery expert. The fact-finding interview is intended to assess your organization's preparedness to counter ransomware or recover rapidly following an assault by a ransomware variant like Ryuk, Maze, Sodinokibi, Netwalker, Phobos, Snatch or Egregor. Progent will work with you personally to collect information about your existing antivirus tools and backup/recovery system, and Progent will then produce a written Basic Security and Best Practices Report describing how you can apply best practices to deploy an efficient security and backup system that reduces your exposure to ransomware and aligns with your company's requirements. For details, see Progent's ProSight Ransomware Preparedness Report.

Contact Progent for More Information about ProSight Email Guard Security Gateway Services
If you are interested in using Progent's ProSight Email Guard security gateway or need help with any aspect of email infrastructure or security, call 800-993-9400 or visit Contact Progent.

Glossary of Terms Related to Spam Filtering Technology

AES-256
The Advanced Encryption Standard (AES) is a cyber security specification adopted by the National Institute of Standards and Technology (NIST). AES-256 offers the highest level of encryption available within the AES family.

Allow List
Also called a whitelist, contains email addresses or domain names that are exempted from being blocked by a spam filter.

Anti-fraud Intelligence
Linguistic analysis to protect against fraudulent emails, which can take the form of spear phishing, spoofing, fee frauds or bogus offers of help.

Bayesian Analysis
A linguistic algorithm that develops profiles of the words and phrases used in legitimate email collected from specific users or organizations and determines whether new email from these sources fit their linguistic profile. Emails that are out of character have a higher likelihood of being spam.

Block List
Also called a blacklist, contains email addresses or domain names that are to be blocked by a spam filter.

Content Filtering
Most commonly refers to the ability to block or whitelist websites based on category, reputation, use of encryption, specified URL or other characteristics. In the context of ProSight Email Guard, content filtering refers to the ability to block, allow or quarantine an email message based on the results of scanning specified components of the message including subject, headers, body, attachments, sender, and recipient. (See Content Policies.)

Content Policies
Content policies allow administrators to define email filtering based on any combination of subject, headers, body, attachments, sender, or recipient. For example, specified keywords, categories or character sets can be automatically detected and blocked. Based on content policy, administrators can configure their email security gateway to block, allow or quarantine inbound or outbound email and to encrypt outbound email. Careful management of content policies can keep an organization from being blacklisted as a source of spam and other malware.

Data Leakage Protection
Often used as an alternative to data loss prevention (DLP), but can imply that compromised data retains its availability to authorized users and keeps its integrity. (See Data Loss Prevention.)

Data Loss Prevention (DLP)
Data loss prevention (DLP) for email entails scanning the content of email messages and attachments and blocking the transmission of sensitive information. DLP allows administrators to establish and enforce policies that block or encrypt outbound email that could carry inappropriate information. DLP features included in ProSight Email Guard can also help organizations avoid reputation loss and stay in compliance with industry security standards and government regulations such as HIPAA and Sarbanes-Oxley.

Delegated Administration
With ProSight Email Guard, control of domain-level settings can be assigned to the Domain Admin role, which has the most permissions, the Helpdesk role, with fewer permissions, or the Governance, Risk Management and Compliance (GRC) Account role, which has a specific role with limited permissions. The User role allows users to view and manage their own account and their quarantine inbox and related settings. Delegation significantly reduces the burden of email administration by safely offloading certain management responsibilities.

Denial of Service (DoS) Attack
An attack designed to bring down a network by flooding it with useless traffic. DDOS (Distributed Denial of Service) is an attack by multiple systems, often compromised by a Trojan, on a single system.

Directory Harvest Attack (DHA)
Scripted attempts designed to steal directory information from unprotected email servers. Spammers send messages with a generic address to your SMTP mail server. For example, spammers will try sending 'ed@acme.com,' 'sue@acme.com' or other names until the server recognizes a name and accepts a message. Spammers combine dictionaries of common names and tabulate which addresses work and which do not. The technique can yield an overwhelming number of delivery requests, consuming server processing power. Spammers then sell the compiled list of valid email addresses to other spammers, resulting in spam for new and unused accounts. False Positive
A valid email incorrectly identified as spam. Without any tuning, ProSight Email Guard has a false positive rate of 0.01 percent, one of the lowest in the industry.

Hardened Datacenter
Highly secure, fault-tolerant facilities housing IT equipment connected to telecommunications networks. The facilities accommodate web servers, email servers, switches, routers, mass storage and other critical equipment and feature redundancy, backup power, and physical security. Cloud-based infrastructure can combine multiple hardened datacenters in separate geographic regions for high availability and disaster recovery.

Heuristic Rules Analysis
A branch of artificial intelligence whereby expert systems use programs that are self-learning and improve with experience. With spam filtering, the more messages processed the better the results.

HTTPS
The use of Secure Socket Layer (SSL) or Transport Layer Security (TLS) under standard HTTP layering to provide secure web access through encryption.

Image Spam
Image spam, which at one point represented around one third of all Internet traffic, is a technique that hides text, typically a URL, by embedding it within an image. ProSight Email Guard uses an Optical Character Reader (OCR) engine to detect this threat. The Update Center also maintains Internet traps known as "honeypots" to build blacklists of image spam senders.

Intent Analysis
Multi-level analysis that recursively follows web links, email addresses and phone numbers embedded in email messages to determine whether they are associated with legitimate entities. Intent analysis also analyzes domain attributes to profile email campaigns.

Key Management
Email encryption requires the sender and recipient to exchange their encryption keys before sending or receiving protected emails. Key management is complex and includes the creation, distribution, safe storage, exchange and use of encryption keys. ProSight Email Guard's cloud-based solution for email encryption stores keys centrally and manages them automatically without burdening administrators or users.

LDAP
The Lightweight Directory Access Protocol (LDAP) is an open, industry-standard application protocol for accessing and maintaining distributed directory information services over an IP network. ProSight Email Guard's Exchange Accelerator/LDAP Verification feature uses the LDAP support built into Microsoft Exchange to protect against dictionary attacks, which attempt to break into a system by trying every word in a hacker's "dictionary" of possible passwords.

Link Protection
ProSight Email Guard's Link Protection, when activated, automatically rewrites any URL embedded within an inbound email and directs it to a safe URL before delivering the email. If the recipient clicks on the embedded URL, ProSight Email Guard evaluates the link for validity and reputation. If the domain appears to be valid, the user is directed to that website. If the URL is suspicious, the user is directed to a warning page which shows the actual link and explains why the URL was blocked.

OCR Engine
Embedding text in images is an established technique used by spammers to avoid detection by the text processing mechanisms in anti-spam engines. An optical character recognition (OCR) engine allows a spam filter to analyze the text rendered inside an image. Before submitting images to the OCR engine, ProSight Email Guard uses a variety of image processing technologies to normalize images whose text has been obfuscated with speckling, shading or color manipulation. The Update Center also uses advanced image processing algorithms to create fingerprints that can be used to block messages containing image spam.

Phishing
A scam that usually involves a fraudulent email purporting to come from a legitimate sender such as a bank and that either contains links to a spoofed website or else tries to talk the recipient into disclosing private information such as a password or social security number. ProSight Email Guard detects Phishing scams by using a specialized Bayesian database. Attacks that include information that suggests familiarity or friendship with the recipient are known as Spear Phishing and account for about 91% of email attacks.

Polymorphic Viruses
A virus that self encrypts by changing its signature to avoid detection by simple virus scanners. ProSight Email Guard relies on a supercomputing grid that uses a partial checksum approach to identify the unchanged signature portions of a virus body.

Predictive Sender Profiling
Identifying suspicious behaviors from sources who currently have clean reputations, for example newly infected bots on otherwise legitimate computers.

Quarantining
A quarantined email can be sent to an individual quarantine inbox assigned to the recipient or to a global quarantine mailbox designated by the administrator. Individuals can have quarantine accounts on the ProSight Email Guard security gateway, which takes the load off the email server, or on their regular mailbox. In this case, ProSight Email Guard alters the subject text of quarantined messages to show that the message could be spam.

Rate Control
The ability to pace inbound or outbound email from a single IP address or email address based on pre-configured frequency thresholds. Delivery of messages from sources that exceed the threshold is delayed in order to stabilize system performance.

Reputation Analysis
The use of databases that include the IP of addresses for known spammers, safe email senders, and web addresses known to be associated with spam. Email from IP addresses with poor reputations or whose content includes web addresses with poor reputations can be identified and handled according to spam policies.

Scoring Thresholds
After an email passes through the ProSight Email Guard security gateway it is given a score ranging from 1 to 10 representing the likelihood that the message is spam. The administrator can use scoring thresholds to automate how messages are managed by choosing to allow, tag, quarantine or block emails depending on their score.

Security Perimeter
The outermost edge, such as a firewall or security gateway, over which the enterprise has control over an email message before the message is received from or passed to the Internet.

Signatures
Also called a fingerprint, a series of bytes within a virus that uniquely identifies it and that can be searched for by anti-virus filters.

Spam
Unsolicited and unwanted email usually sent in bulk as part of marketing campaigns but sometimes sent with malicious intent.

Spoofing
A phishing technique whereby an attacker uses an IP address that appears to come from a trusted host. One of the most notorious examples is the exploit from service@aol.com. Spoofing attacks often include links to a fraudulent, or spoofed, web site that impersonates a familiar web site.

Spooling
A disaster recovery feature whereby incoming email is stored temporarily in the cloud or redirected in the event that your on-premises data center is disrupted. ProSight Email Guard's Cloud Protection Layer can store all your inbound email for up to four days or direct it to an alternative destination if your email server becomes unavailable. Meanwhile, Progent can provide expert online or onsite support to bring your local system back into service quickly.

Spyware
Software that collects and possibly shares information about a person without specified consent. Common forms of spyware include cookies, adware and Trojans. The collected information is typically used for marketing, but can also be used more maliciously. Major corporations (e.g., Facebook) use spyware routinely and legally. ProSight Email Guard includes technology that provides real-time protection from malicious spyware attacks.

SMTP
Short for Simple Mail Transfer Protocol, a protocol for sending email messages between servers. SMTP email servers are a common target of Directory Harvest Attacks.

Tagging
A technique for helping users to identify filtered email that meets some criteria for being spam. Tagged emails are delivered with a customized label appended to the subject field, e.g., [BULK]. This allows users to make their own determination about how to deal with them.

TLS
The Transport Layer Security (TLS) encryption protocol allows secure communication over the Internet. The ProSight Email Guard security gateway supports SMTP over TLS to encrypt email traffic between sites over the Internet.

Viruses
Computer code that can replicate itself. Viruses are commonly spread via email and allow an attacker to steal or destroy data or take control of an infected system. Types of viruses include Trojans and worms.

Zero-hour Protection
The ability to develop and distribute defenses against newly discovered spam and viruses within minutes rather than days. The hybrid infrastructure of ProSight Email Guard is designed to provide this capability.

Also See:



An index of content::

  • 24-Hour NYC Outsourcing Services New York, NY Server Recovery
  • 24/7 Dynamics GP (Great Plains) St. Louis Vendor - Database Programming and Support Lambert International Airport STL Remote St. Louis Dynamics GP-Great Plains Upgrades Experts St Louis St Charles Jefferson Franklin
  • 24/7 Juniper J2320 Router Computer Security Specialist Juniper J2350 Router Security Consultants
  • 24/7 SharePoint Consolidation Houston Texas SharePoint Support Outsourcing Houston, Texas, America
  • 24/7 Wilmington Work from Home Employees Video Conferencing Solutions Consulting Experts Wilmington DE 24-Hour Work at Home Employees Consultants near me in Wilmington - Conferencing Systems Consulting Wilmington, DE, United States
  • 24x7 Firewall Security Firms Grand Rapids Cybersecurity Consultancies Security Grand Rapids Muskegon Holland
  • 24x7 Microsoft Dynamics GP San Rafael Premier Partner - Customization Programming and Support Mill Valley, Corte Madera CA, United States Dynamics GP San Rafael Dealer - Recovery Consulting Marin County
  • After Hours Skype for Business and SQL Server Consultant Services Skype for Business and iPhone Consulting Services
  • Albany-Schenectady, NY Albany At Home Workers VoIP Solutions Assistance Work from Home Employees Guidance near me in Albany - VoIP Solutions Consulting Albany NY
  • Alpharetta At Home Workforce Support Assistance Alpharetta Georgia Alpharetta-Cumming, Georgia Teleworkers Alpharetta Consulting Experts - Support Assistance
  • Appleton-Fond du Lac, WI CISSP Security Companies Technical Support Services Security Appleton-Fond du Lac, WI

  • Phone Support Cisco Certified Network Associate (CCNA)
    Microsoft Certified Desktop Support Technician (MCDST) Small Business IT Support

    Progent offers clients the services of consultants who have earned some of the IT industry's most prestigious credentials. Progent believes that clients have the right to be sure that their IT support providers have accredited testing as well as extensive practical backgrounds so that Progent's clients can engage Progent's support with confidence. Often, vendor credentials like the Cisco Certified Internetwork Experts (CCIE) brings privileges for significantly superior vendor assistance than is offered to non-certified consultants, enabling Progent to deliver customers a higher class of IT support. In other cases, recognized credentials such as CISA or ISSAP for network security can help corporate clients to show compliance with regulatory demands by using the assistance of accredited industry experts.

  • 24-Hour Consult ProSight Email Security Gateway
  • At Home Workers Mesa Assistance - Set up Consultants Mesa Phoenix 24 Hour Telecommuters Consulting Services near me in Mesa - Connectivity Consultants Mesa, AZ
  • Award Winning Appleton-Winnebago County System Consulting Services Appleton-Outagamie County Small Business IT Consulting Firm
  • BlackBerry BES Server Small Business Specialist Norfolk Virginia Beach Top Rated Computer Consultancy Firms BlackBerry Desktop Manager Norfolk Virginia

  • Network Security Audit Cybersecurity Pen Testing
    Cybersecurity Penetration Testing Security Firms

    Stealth intrusion checking is an important part of any comprehensive IT system security strategy. Progentís security professionals can run thorough penetration checks without the knowledge of your organization's in-house network support staff. Unannounced penetration checking shows whether current security defense tools such as intrusion incident alerts and event history analysis are correctly set up and actively observed.

  • Calgary, AB Remote Workers Calgary Consulting and Support Services - Cloud Integration Technology Consulting Services Calgary Telecommuters Cloud Technology Consulting and Support Services
  • Cisco Information Technology Outsourcing Group Network Management Services Cisco
  • Cisco Small Business IT Consultants Quebec Montreal Cisco Certified CCIE Information Technology Consulting Company
  • Columbus, Franklin County Software Consultant Microsoft SQL 2008 Columbus Ohio SQL 2012 Repair Installation
  • Consultants for Toronto Network Service Organizations Consulting Support for Toronto IT Service Providers Mississauga
  • Consulting Company Cisco Fremont Alameda County Top Ranked Cisco System Consulting Newark, CA
  • Consulting Expertise for IT Service Organizations in San Diego UCSD - Transparent Short-Term Staff Augmentation Consulting Experts for IT Service Companies near San Diego UCSD - Transparent Temporary Support Staff Expansion San Diego-La Jolla
  • El Paso Work at Home Employees Solutions Assistance El Paso Texas El Paso Work at Home Employees Support Guidance El Paso Greater Ciudad Juarez
  • Email Virus Fingerprint Specialist
  • Emergency Linux Support Outsourcing Oregon Sun Solaris Setup and Support Oregon - Portland, OR, Salem, OR, Eugene, OR, Gresham, OR

  • Consulting Services ISA 2006 Firewall
    ISA 2006 Consultant Services

    ISA 2006 is a comprehensive gateway that offers a fully integrated application layer firewall, VPN, proxy, and Web caching solution for securing the Internet-facing applications of any sized business against a broad range of attacks. Progent's Microsoft-certified Internet Security and Acceleration Server 2006 consultants can show you how to plan, cost-justify, pilot, implement, customize and manage the any edition of ISA Server on your information system.

  • FRx Report Integration Companies Programmer Web
  • Fort Lauderdale IT Staffing Support Fort Lauderdale Weston Margate IT Staffing for IT Support Organizations
  • Fort Myers-Cape Coral Windows Server 2016 Management Windows Migration Consulting Fort Myers-Lehigh Acres, Florida

  • Consulting Services Exchange Server 2003 Upgrade
    Exchange 2003 Upgrade Computer Consultants

    Progent's certified engineers offer computer help and IT consulting services for Exchange 2003 Server, Windows Server 2003, and for the entire line of Microsoft Servers. Progent's upgrade, configuration, management, and support services for Exchange Server include planning, installation, project management, onsite and off-site technical support, Help Desk outsourcing, certified security consulting, and full-service IT outsourcing.

  • Livermore Migration Company 24-7 San Ramon Tech Outsourcing
  • Louisville At Home Workforce Collaboration Solutions Assistance Louisville International Airport SDF Work at Home Employees Consultants near Louisville - Collaboration Technology Consultants Louisville Kentucky
  • Microsoft Dynamics NAV ERP Integration Microsoft Dynamics NAV Computer Engineer

  • Immediate Windows Server 2008 Active Directory Specialists
    Windows Server 2008 Active Directory Troubleshooting

    Progent's Microsoft-certified professionals can assist you you to evaluate the benefits of Windows Server 2008 for your company, create test programs and rollout strategies, integrate Windows Server 2008 with your network infrastructure and applications, educate your support personnel how to run enhanced administration tools, and provide continuing consulting and support via low-cost options such as Helpdesk support and remote technical support.

  • Microsoft SharePoint Server Computer Consulting Ipanema, Botafogo Microsoft SharePoint Server 2010 Consultant Services Rio de Janeiro
  • NYC Offsite Workforce Consulting Services nearby Midtown Manhattan - Management Tools Expertise Work at Home Employees Midtown Manhattan Guidance - Endpoint Management Systems Guidance Manhattan-Upper East Side, NY
  • Network Engineer Redhat Linux, Solaris, UNIX Austin-Bergstrom Airport AUS Largest Gentoo Linux, Solaris, UNIX Remote Support Services Austin, Travis County
  • Offsite Workforce Guidance - Santa Monica - Help Desk Solutions Assistance Santa Monica-Brentwood, CA Santa Monica-Pacific Palisades, United States Work at Home Employees Santa Monica Consultants - Help Desk Call Center Solutions Consulting and Support Services

  • Exchange 2013 In-Place Hold Integration
    Top Engineer Exchange 2013 Upgrade

    Microsoft Exchange Server 2013 includes significant improvements to the functionality of Exchange 2010 and delivers powerful innovations as well as a redesigned architecture. These improvements favorably impact vital facets of IT like manageability, availability, security, cost of ownership, collaboration, expandability, performance, cross-version interoperability, and the user experience. Progent's Microsoft-certified Exchange 2013 consultants can assist your organization to evaluate the potential advantages of upgrading to Microsoft Exchange 2013, create an efficient test and rollout plan, and train your IT staff to maintain your Exchange 2013 environment. Progent also offers affordable online support and management services for Microsoft Exchange Server 2013.

  • Remote Workers Consulting Services - Ottawa - Call Desk Augmentation Consulting Experts Gatineau, QC Work at Home Employees Ottawa Guidance - Help Desk Augmentation Consulting Services Gatineau, Quebec

  • ASA Firewall with Firepower Specialists
    Emergency Cisco PIX to ASA upgrade On-site Support

    Progentís Cisco-Certified network consultants offer professional PIX Firewall consulting services encompassing design, implementation and maintenance of Cisco firewall and Cisco security technology. The Cisco PIX 500 Security Appliance Series of Cisco firewalls delivers strong user and software policy enforcement, mutlivector threat protection, and safe connectivity services. Ranging from small, easy-to-install desktop appliances for small offices and home offices to scalable gigabit appliances, Cisco PIX firewalls provide a healthy level of protection, speed and availability for information environments of all sizes. PIX firewalls are based on a hardened, specially designed operating system, PIX OS, minimizing possible OS-specific security holes. The Cisco PIX Firewall has received ICSA Firewall and IPsec certification plus Common Criteria EAL4 evaluation status. PIX firewalls deliver multiple integrated protection and connectivity services, including powerful application-aware firewall services, Voice over IP and multimedia security, multi-site and remote-access IPsec VPN networking, intelligent access services, and flexible management tools. Progentís Cisco consultants can help you choose and deploy any Cisco PIX 500 Series firewalls such as the Cisco PIX 501 Firewall, the Cisco PIX 506 Firewall, the Cisco PIX 506E, PIX 515 Firewalls, the PIX 515E Firewall, the Cisco PIX 520 Firewall, Cisco PIX 525 Firewalls and the Cisco PIX 535.

  • Remote Workforce Petaluma Consulting Experts - Set up Consulting Experts Sonoma CA 24-Hour At Home Workforce Petaluma Consulting - Connectivity Solutions Assistance Petaluma Sonoma County
  • Roseville, California Network Repair Service Roseville Consulting Service

  • Systems Management Server On-site Support
    Microsoft Certified Partner SMS Server 2003 Migration Online Technical Support

    Systems Management Server provides extra functionality for change and configuration management of Windows-powered systems via SMS Feature Packs. Feature Packs reduce the net operational costs of managing and configuring software products by making it simpler to copy system images, manage mobile devices, and run management utilities. In addition to alerting you about techniques to cut management expenses by installing Microsoft SMS 2003 Feature Packs, Progent's consulting experts can help you prepare and implement IT tasks that cover processes that Feature Packs are designed to make more efficient. Progent's migration and update services can lower cost and eliminate business disruption as you transition to new operating systems and applications. Progent's wireless engineers can help you develop sensible processes and standards to manage handheld computers and intelligent mobile communication devices so your field force stays productive and secure. Progent's CISSP-certified consultants and CISM-certified security experts can help you develop a security plan that incorporates standards, procedures and technologies to keep your IT network protected.

  • SQL 2012 Consultancy Firms Bellevue, King County SQL Server 2019 Assessment Bellevue, WA
  • SQL 2012 Small Business IT Outsourcing Companies Kirtland Air Force Base Best Small Business Computer Consulting Firm SQL Server 2012 Albuquerque New Mexico

  • Consult Exchange Server Upgrade
    Professionals Microsoft Exchange Server 2010 Migration

    Progent can provide comprehensive support for each phase of your Exchange Server 2010 migration including outsourced or co-sourced project management, site prep, project design and documentation, cost estimates of new software and hardware required, suggested sourcing, pilot verification at client site or at Progent's test lab, setting up transitional coexistence between Microsoft Exchange Server 2010 and Exchange 2003 or 2007, deployment of the production system, deactivating the old servers, and webinar training for client's support staff and end users.

  • SQL Server Network Architect Madison Madison, United States Microsoft SQL 2014 Computer Setup

  • System Center 2016 Cloud Integration Professional
    Top System Center 2016 Business Continuity Consultants

    Microsoft System Center 2016 provides major enhancements in the management of hybrid cloud networks through comprehensive integration with Windows Server 2016, Windows 10; seamless integration of heterogeneous networks that include Linux, Hyper-V and VMware; and expanded cloud support including tighter integration with Intune for Apple iPhone and Google Android smartphone administration plus built-in integration with Microsoft Operations Management Suite for cloud-based analytics and reporting. Progent's Microsoft-certified consulting staff offers world-class online and onsite support for all elements of System Center 2016 including Operations Manager, Configuration Manager (SCCM), Virtual Machine Manager (SCVMM), Data Protection Manager, Orchestrator, and Service Manager. Progent can assist organizations of any size to design and configure a new deployment of System Center 2016, extend or tune your current one, upgrade smoothly from an earlier version of System Center, or troubleshoot your System Center environment.

  • San Jose At Home Workers Data Protection Systems Consultants San Jose CA San Jose Work from Home Employees Backup Solutions Assistance Silicon Valley, California
  • Security Protecting Security Cybersecurity Company Madison Wisconsin
  • SharePoint Server 2013 Integration Services Chicago Illinois Computer Engineer Microsoft SharePoint Server 2007 Berwyn, IL, United States
  • Small Business Network Consultant Windows Alabama - Birmingham, AL, Montgomery, AL, Mobile, AL, Huntsville, AL Server Consulting Windows

  • Email Outbound Content Filtering Specialists
    ProSight Email Guard Content Filtering Service Engineer

    Progent's ProSight Email Guard solution uses the services and infrastructure of leading data security vendors to deliver web-based management and comprehensive protection for all your email traffic. The powerful architecture of ProSight Email Guard combines cloud-based filtering with an on-premises security gateway appliance to provide complete protection against spam, viruses, Denial of Service (DoS) Attacks, DHAs, and other email-borne threats. Email Guard's cloud filter serves as a first line of defense and keeps the vast majority of unwanted email from making it to your security perimeter. This decreases your exposure to external attacks and saves network bandwidth and storage. Email Guard's onsite security gateway appliance adds a further level of analysis for incoming email. For outbound email, the on-premises security gateway provides AV and anti-spam protection, policy-based Data Loss Prevention, and email encryption. The local security gateway can also assist Microsoft Exchange Server to track and protect internal email that originates and ends within your security perimeter.

  • St. Paul Offsite Workforce Connectivity Assistance Saint Paul-Mendota Heights Work from Home Employees Guidance in St. Paul - Set up Consulting Services St Paul-Bloomington, U.S.A.

  • Microsoft and Cisco Certified Expert Part-Time CIO Computer Consulting
    CIO IT Consultant

    Progent can provide the temporary services of a seasoned Chief Information Officer to offer strategic direction to help your company select and support IT solutions to match your current situation and that can serve as a solid basis for your growth. Progent's temporary CIO consulting services offer economic leverage to organizations trying to optimize the benefits from their network investment but who are unable or hesitant to take on another executive-level manager to their full-time staff. Because Progent is vendor-neutral, with a large staff of consultants certified to maintain all major operating systems and connectivity technologies plus a wide range and business applications, Progent is in an ideal situation to offer unbiased advice along with advanced technical support for building and maintaining information solutions that fit the particular requirements of your organization.

  • Stamford IT Staff Temps Services Stamford Connecticut Supplemental Network Support Staffing Support Services Consulting Experts Stamford Connecticut
  • Stockton Telecommuters Collaboration Technology Consultants Lodi, Escalon CA, United States Teleworkers Stockton Expertise - Collaboration Technology Consulting Tracy CA, America
  • Telecommuters Fort Collins Consultants - Cloud Technology Expertise Fort Collins, CO Fort Collins Offsite Workforce Cloud Integration Solutions Consulting Fort Collins Colorado, US
  • Tennessee Business Computer Server Companies Integration Firm Tennessee
  • Top Quality Work from Home Employees Miami Expertise - Cloud Integration Solutions Assistance South Florida Work at Home Employees Miami Assistance - Cloud Technology Consulting Experts
  • Top Ranked Microsoft SharePoint 2013 IT Consulting Lincoln Online Consulting Microsoft SharePoint Lincoln Nebraska
  • Toronto Computer Consultants Emergency Toronto, ON Technical Support Firms
  • Troubleshoot BlackBerry Redirector Spokane Washington BlackBerry Desktop Manager Software Consulting Firm Spokane County Washington, USA
  • Windows 2008 Server Software Consulting Mission Viejo-Laguna Niguel Mission Viejo CA Top Ranked Windows Server 2016 Specialist
  • Windows Server 2019 Professionals Edison-Somerset, New Jersey Edison NJ Information Technology Consulting Firm Windows 2008 Server
  • Work at Home Employees Consultants - Dayton - IP Voice Systems Expertise Dayton Woodland County Ohio Remote Workforce Dayton Consulting and Support Services - IP Voice Solutions Consulting and Support Services
  • Work at Home Employees Vancouver Assistance - Cloud Systems Consulting Experts Vancouver , BC Vancouver Teleworkers Cloud Systems Expertise
  • Work from Home Employees Walnut Creek Consultants - Help Desk Call Center Solutions Assistance Walnut Creek, CA Teleworkers Walnut Creek Expertise - Help Desk Outsourcing Consulting and Support Services Orinda CA
  • Work from Microsoft Consulting Virtual Office Job Remote Support Job Work from Microsoft Consultants

  • © 2002-2020 Progent Corporation. All rights reserved.