GIAC Certification
GIAC Certified Information Assurance ConsultantsInformation Assurance (IA) is defined by the U.S. DoD as "development, operation, management, and enforcement of security capabilities for systems and networks." Global Information Assurance Certification (GIAC) was established in 1999 to test and certify the knowledge and experience of computer security experts in various fields of information assurance. GIAC certifications are recognized globally by industry, military and government institutions including the United States National Security Agency (NSA). GIAC certifications require candidates to complete rigorous testing to demonstrate their depth of skills in specific knowledge areas, not just general computer security knowledge. Areas covered by GIAC certifications include audit, intrusion detection, incident handling, firewalls and perimeter protection, forensics, hacker techniques, Windows and Unix operating system security, plus secure software and application coding

Progent's security consultants have earned GIAC certification in key areas of information assurance. Progent offers online information assurance services from GIAC-certified consultants and can provide onsite IA expertise in major metropolitan areas throughout the U.S. By offering affordable rates and the highest level of expertise, Progent can give small and mid-size businesses the same quality of information assurance once available only to the largest enterprises and institutions.

Areas of proven expertise available from Progent's GIAC-certified security consultants include:

Progent's GIAC-certified information assurance experts can also work with Progent's Cisco-certified CCIE network infrastructure consultants to help organizations design, deploy and operate a comprehensive security information and event management (SIEM) solutions.

Auditing Networks, Perimeters, and Systems
Progent's security consultants who have obtained the GIAC Systems and Network Auditor (GSNA) credential understand the best practices, system analysis, and forensics required to perform thorough network security audits that can uncover a wide range of known threats and vulnerabilities. Progent can also help you build appropriate countermeasures and defenses based on realistic risk assessment in order to provide ongoing protection for your information system. Specific network security auditing services offered by Progent's GIAC-certified information assurance consultants include:

  • Conduct detailed router audits
  • Test the Firewall for OS configuration, firewall configuration, and system administration
  • Test firewall policies for vulnerabilities, packet flow from all networks, and change control
  • Assess third-party software encryption, authentication, virus scanning, and URL redirection
  • Review logs and alerts from the Intrusion Detection System (IDS) and Firewall
  • Deploy router analysis tools such as Router Audit Tool (RAT), scanning tools such as Nmap, packet building tools such as -Hping2 and Nemesis, sniffers such as Wire Shark, and IDS auditing tools such as Fragroute
  • Audit wireless security including 802.11b security issues and LEAP/PEAP authentication using wireless auditing tools such as WSA, Airopeek, and Net Stumbler
  • Map your network from inside and outside your Firewall and auditing perimeter defenses
  • Perform penetration tests
  • Audit configuration of key network services such as DNS and SMTP
  • Check database security for Microsoft SQL, MySQL and Oracle
  • Identify security weaknesses for web-enabled services and applications
  • Evaluate web application architectures and infrastructures
  • Look for web-based phishing, resource exhaustion, buffer overflows, hidden form elements, and unexpected user input
  • Audit web application user sign-on and sign-off process, session tracking, and management
  • Audit Windows-based systems focusing on patch levels, network based services, local services, installed software, security configuration, group policy management, plus log aggregation, management and analysis
  • Perform event reconstruction if necessary
  • Sarbanes-Oxley and Graham-Leach-Bliley compliance
Progent offers a selection of value-priced service packages for assessing the vulnerability of your network to attack. For small organizations, Progent offers two security inventory scanning packages, an External Security Inventory Checkup for evaluating the security profile of your web-facing resources and an Internal Security Inventory Scan to determine the risk from attacks from within your firewall. For larger organizations, Progent offers variety of set-price security evaluation service packages to help verify that security policies and systems meet compliance and regulatory requirements.

Incident Handling and Response
Security professionals who have earned the GIAC Certified Incident Handler (GCIH) credential have demonstrated in-depth knowledge of the current threats to systems and networks, along with effective countermeasures. Progent's GIAC-certified security engineers have the knowledge and experience to manage incidents, understand common attack techniques and tools, defend against and respond to attacks when they occur, and detect security gaps in your environment. Additionally, Progent's GIAC-certified information assurance consultants are sensitive to legal issues associated with responding to computer attacks, including employee monitoring, working with law enforcement, and handling evidence.

Progent's incident handling experts can offer consulting assistance both on how to respond to a security incident and how to understand and foil the techniques used by hackers to penetrate your network.

Responding to a Security Incident
Progent's information assurance consultants can help you plan and implement a precise step-by-step procedure for responding to successful network attacks or to physical incidents such as fires, floods and crime. By putting in place a proven and well-defined methodology for incident handling, your company will be able to get systems and services back online as quickly and securely as possible. The step-by-step incident response model recommended and supported by Progent covers these phases:

  • In the Preparation Phase, you create a set of tools to use as an incident response Jump Kit, identify the core team of responders, and deploy appropriate instrumentation for your site and system
  • In the Identification Phase you report signs of an incident, take the first steps to control it, and establish a chain of custody so that no relevant information or evidence is lost or unreported
  • In the Containment Phase you implement predetermined video and audio documentation strategies, execute containment and quarantine procedures, pull the network cable and switch if required, and identify and isolate the Trust Model
  • In the Eradication Phase you evaluate whether a backup is compromised, totally rebuild the Operating System if required, and if necessary move to a new architecture
  • In the Recovery Phase you determination who makes the decision to return to production, monitor the system, and prepare for increase in attacks
  • For Special Incidents such as espionage, inappropriate use, or sexual harassment, take appropriate actions determined by the type of incident
  • In the Incident Record Keeping Phase you complete legally acceptable pre-built forms to document and report the incident
  • In the Incident Follow-Up Phase you conduct a lessons-learned meeting and define appropriate changes in process for the future
Understanding and Defeating Hacker Techniques
Networks invariably expose substantial amounts of information that can assist potential attackers. In addition to looking for information leakage, attackers also run scans of systems to find security gaps such as weak DMZ systems and firewalls or unsecured wireless LANs. Popular hacking techniques include inverse scanning, blind scans, and bounce scans that obscure their source. Attackers also try to understand and manipulate firewall rule sets and evade Intrusion Detection Systems. Progent's information assurance consultants who hold the GIAC Certified Incident Handler credential can help you understand contemporary hacking techniques in detail so you can take appropriate countermeasures to protect your network. Some of the hacking techniques that Progent can help you understand and defend against include:
  • Network-level Attacks such as session hijacking (from Telnet to SSL and SSH), person-in-the-middle attacks, and passive sniffing
  • Gathering and Parsing Packets via active sniffing through ARP cache poisoning and DNS injection, DNS cache poisoning to redirect traffic on the Internet, using Netcat for backdoors and Nasty Relays, and IP Address spoofing
  • Operating System and Application-Level Attacks utilizing buffer overflows, the MetaSploit Exploitation Framework, the Perl Exploit Library, and format string attacks to exploit vulnerabilities in Windows
  • Netcat-based Attacks for transferring files, creating backdoors, shell shoveling, setting up relays to obscure the source of an attack, and launching replay attacks
  • Password Cracking with L0phtCrack and John the Ripper
  • Web Application Attacks for account harvesting, SQL Injection to manipulate back-end databases, session cloning to grab other Users' web sessions, and cross-site scripting
  • Denial of Service Attacks involving distributed Denial of Service, pulsing zombies and reflected attacks, Local Denial of Service, SYN floods and smurf attacks using spoofed broadcast ping messages
  • Maintaining Unauthorized Access by creating backdoors using QAZ and Tini, using application-level Trojan Horse Backdoor suites such as VNC and SubSeven, using rootkits to substitute binary executables with malware, and using kernel-level rootkits such as Adore and KIS to compromise the operating system
  • Covering the Attacker's Tracks via file and directory camouflage and hiding, log file editing, accounting entry editing of UTMP, WTMP, and Shell Histories, establishing covert channels over HTTP, ICMP, TCP and other protocols, and hiding data in images, music, binaries, or other file types
Intrusion Detection and Traffic Analysis
Progent's information assurance consultants who have been awarded the GIAC Certified Intrusion Analyst (GCIA) credential are familiar with the arsenal of scans, reconnaissance techniques, and network exploits used by the attack community and can help your company with comprehensive intrusion detection and traffic analysis to make sure your network information remains protected. Progent's security professionals have an expert understanding of the workings of TCP/IP, methods of network traffic analysis, and troubleshooting all types of networking complaints from routing problems to firewall and critical server issues. Intrusion detection and traffic analysis techniques and issues familiar to Progent's GIAC-certified security consultants include:
  • In-depth understanding of the TCP/IP Communication Model
  • Fragmentation
  • Core Internet protocols such as Internet Control Message Protocol (ICMP)
  • Stimulus and Response
  • Microsoft Networking and Security
  • Domain Name System (DNS)
  • Routing
  • The IPsec (Internet Protocol Security) suite of Internet security protocols
  • Use of the TCPdump tool to examine Datagram Fields
  • Analysis of TCPdump Output
  • Using the Snort network intrusion detection system
  • Traffic patterns and analysis
  • Interoperability and standards in intrusion detection
  • Passive analysis techniques
  • Identifying crafted packets
  • In-depth protocols analysis
  • Advanced Analysis Profiling Techniques
  • Reducing false-positives
  • Identifying Denial-of-Service activity
  • IDS/IPS architecture and implementation techniques
  • Event correlation and common attack techniques
Web Application Security
The GIAC Web Application Security (GWAS) credential focuses on the latest tools and techniques used in designing and testing web applications that deliver data reliably to authorized users while protecting your information from unauthorized ones. Progent's GWAS-certified consultants have hands-on experience using current tools to detect and prevent cross-site scripting (XSS), and SQL Injection as well as an in-depth understanding of authentication and session management systems and their weaknesses and how they are best defended. Progent can help you ensure that your web applications are securely designed and thoroughly tested before they are released to your production environment or used by your clients. Technical areas where Progent's information assurance consultants can provide expertise for web application development and testing include:
  • Securing web application architectures and infrastructures
  • Cryptography
  • Authentication
  • Access control
  • Session mechanism
  • Web application logging
  • Input issues and validation
  • SQL injection due to incorrect escape character filtering, type handling, etc.
  • Cross-Site Scripting
  • Phishing attacks for unauthorized information gathering such as name and password harvesting
  • HTTP Response Splitting
  • Cross-Site Request Forgery
  • Resource exhaustion
  • Buffer overflows
  • Hidden form elements
  • Unexpected user input
  • User sign-on and sign-off process
  • Session tracking and management
  • GET vs. POST
  • Improper Server Logic
  • Web Browser Security
  • Server-side Techniques for Protecting Sensitive Data
Reverse Engineering Malware
Progent's information assurance consultants who have earned the GIAC Reverse Engineering Malware (GREM) credential have the skill to guard organizations against malicious software by reverse engineering malware code that attacks widely deployed platforms such as Microsoft operating systems and browsers. By performing in-depth analysis of the mechanisms used by malicious code to carry out attacks, GREM-certified consultants can help organizations to defend against future threats. Services available from Progent's GREM-certified information assurance experts include:
  • Analyze malicious document files
  • Analyze the techniques used by malware attacks to prevent malicious software from being scrutinized
  • Analyze web-based malware
  • Examine static Windows malware code in x86 assembly language
  • Analyze complex malicious scripts in web browsers
  • In-depth analysis malware executables
  • Utilize memory forensics techniques to analyze threats
  • Deploy debuggers, disassemblers, sniffers, and other tools to analyze malware behavior
  • Reverse engineer Windows malware code at the x86 assembly level
Security Information and Event Management (SIEM) Solutions
Security information and event management (SIEM) solutions combine SIM (Security Information Management) and SEM (Security Event Management) functions to enable comprehensive analysis of security alerts generated by network appliances and applications. Appliances can include firewalls, routers, intrusion detection systems (IDS), intrusion prevention systems (IPS) and other security hardware. The massive amounts of information created by these devices can be managed by SIEM software products, available from vendors like SolarWinds, ManageEngine, and many others. SIEM software collects logs from multiple devices, normalizes the log messages into a common data format, correlates logs and events from various systems and applications, aggregates the data to remove duplicate event records, and produces reports that allow organizations to comply with regulatory requirements for monitoring and reporting security incidents.

Progent's certified security experts and Cisco CCIE network infrastructure consultants can help you plan, deploy, tune, manage and troubleshoot your SIEM ecosystem so you can meet the security and compliance standards that apply to your business or institution.

Additional Industry Certifications Earned by Progent's Security Engineers
In addition to providing the assistance of security experts with GIAC Global Information Assurance Certification credentials, Progent also offers the expertise of CISM-certified security management consultants, CISSP-certified cybersecurity experts, CISSP-ISSAP-certified security architecture professionals, CISA-certified information system security auditing specialists, and CRISC-certified risk management consultants.

To learn more about Progent's network security consulting, telephone Progent at 800-993-9400 or go to Contact Progent.

An index of content::

  • 24 Hour At Home Workers Consulting Experts near Richmond - Data Protection Technology Guidance Richmond California At Home Workforce Richmond Consulting Services - Data Protection Technology Expertise Richmond California
  • 24/7 Small Business Network Maintenance Lowell, MA IT Outsourcing Computer Network Providers Lowell Framingham Newton Somerville
  • 24/7/365 Consulting Services Company Milpitas Milpitas Network Recovery
  • 24x7 Lync Server 2013 Front End Server Consultant Services Consultancy Lync Server 2013 and Cisco UC
  • 64-bit Server Help and Support 64-bit Processing Professional

  • On-site Technical Support Microsoft Firewall
    Microsoft ISA 2004 Server Remote Troubleshooting

    Progent's certified Internet Security and Acceleration Server consulting experts have extensive backgrounds developing ISA Server-based security installations for IT networks with multiple sites, remote users, and mission-critical web applications. Progent's Microsoft Firewall experts are available to assist your company in planning and deploying an installation of ISA 2000 Server or ISA 2004 Server that meets your information protection needs without adversely restricting your IT system accessibility. Progent's consulting professionals can help you upgrade from Microsoft Proxy Server from ISA 2000 Server to Microsoft ISA 2006 Enterprise Edition Server or Microsoft ISA 2006 Standard Edition Server.

  • Akron, Ohio Server Integrators Akron Outsourcing Company
  • At Home Workforce San Francisco Consultants - Integration Consulting Experts San Francisco Remote Remote Workforce San Francisco Guidance - Integration Consultants San Francisco
  • Atlanta Hartsfield-Jackson Airport ATL Teleworkers Consulting Experts in Atlanta - VoIP Systems Consultants Atlanta At Home Workforce IP Voice Solutions Expertise ATL
  • Atlanta Remote Workforce Integration Solutions Consulting Experts Georgia Atlanta Telecommuters Integration Solutions Expertise Atlanta Hartsfield-Jackson Airport ATL
  • Best Online Technical Support Operations Manager Remote Online Technical Support Microsoft System Center Operations Manager

  • System Center 2016 Azure Integration Setup and Support
    Microsoft Certified Partner Remote Support System Center 2016 Migration

    Progent has more than a decade of experience integrating, maintaining and troubleshooting the key components included with Microsoft System Center and can help you to design, install, manage, and fix your System Center solution to optimize the uptime and performance of your critical IT resources across multiple Windows and Linux/Unix operating systems and local and Cloud-based fabric. Progent can assist your organization to migrate to the current version of System Center from an older release or from a third-party datacenter management solution to provide the advantages of best-in-class deployment, automation, security and compliance, plus datacenter and application performance monitoring.

  • BlackBerry BES Server Small Business Outsourcing IT Salem, Marion County BlackBerry Email Onsite Computer Services Salem Keizer Woodburn
  • BlackBerry Wireless Computer Help Puerto Rico San Juan, Puerto Rico After Hours BlackBerry Wireless Network Design Consultant
  • Broomfield-Thornton, Colorado At Home Workforce Broomfield Consulting and Support Services - Endpoint Security Solutions Guidance Broomfield-Thornton, Colorado Offsite Workforce Consulting in Broomfield - Security Solutions Consulting and Support Services
  • Web Application Security Technology Consulting
  • CISSP Certified Security Auditor Consultant CISSP Certified Information Security Officer Consultant Services
  • Catalyst 3560 Switch Computer Consultant Catalyst 2940 Switch Network Engineer

  • Microsoft Exchange Cluster Support and Integration
    Microsoft Windows Server 2003 Cluster Professional

    Progent provides Windows Cluster Server expertise to help your company deploy zero-downtime clustered servers that can deliver 24x7 operation. Windows cluster servers for high-availability systems include Microsoft Windows Cluster Server, Microsoft SQL Server Cluster, and Exchange Cluster. By assisting you t design fault-tolerant server clustering environments based on Microsoft Windows Server 2003 Cluster, Progentís Certified Windows experts ensure that your fault-tolerant server clusters are configured to maximize the strategic advantage of your computer network.

  • Cisco CCVP Engineer Openings California Central Valley CISA Consultant Telecommuter Jobs California Central Valley
  • Cisco Firepower Configuration Technical Support Services 24 Hour Cisco ASA Firepower Network Consulting
  • Cisco IT Consulting Addison Cisco Computer Tech Addison-Richardson, TX
  • Cybersecurity Organizations CISSP Broomfield, Colorado Largest CISSP Cybersecurity Company
  • Eugene Teleworkers Voice/Video Conferencing Systems Guidance Eugene Oregon Eugene Oregon Eugene Offsite Workforce Voice/Video Conferencing Technology Guidance
  • Fedora Linux, Solaris, UNIX Help and Support Carlsbad-Vista, California Ubuntu Linux, Solaris, UNIX Professional Carlsbad-Temecula, CA
  • Fort Wayne Work at Home Employees Cloud Systems Consultants Fort Wayne Fort Wayne Remote Workforce Cloud Technology Consulting

  • Computer Consulting Microsoft SharePoint Server 2010
    SharePoint Server 2010 Online Support Services

    Progent's Microsoft-certified engineers offer affordable online technical support and development services to help your business to plan, implement, manage, and troubleshoot SharePoint 2010 installations that can feature web sites able to function as portals, extranets, document and media management tools, wikis, data marts, business analytics, enterprise search, workflows, and other tools to promote and improve information sharing. Progent can help you integrate SharePoint 2010 with MS SQL Server and with other data sources and with Microsoft's familiar office productivity applications including Office Excel, Word, PowerPoint, and Project. Progent can assist you to upgrade from previous versions of SharePoint or move a mix of web applications into a consolidated and easily managed SharePoint 2010 environment.

  • IT Services Shared Service Desk Virtual Help Desk Technology Consulting Services

  • Support Outsourcing Windows Server 2008 Hyper-VI
    Windows Server 2008 DirectAccess IT Consultants

    Progent's Microsoft-certified professionals can help you to calculate the advantages of Windows Server 2008 for your business, create pilot programs and rollout plans, install Windows Server 2008 with your network environment and workload, educate your IT personnel how to use new management tools, and deliver continuing consulting and tech support via low-cost options including Help Desk Call Center service and online technical assistance.

  • Immediate At Home Workforce Eugene Consulting Services - Connectivity Solutions Consulting and Support Services Eugene, Lane County Eugene Work from Home Employees Integration Solutions Assistance Eugene Oregon
  • Memphis At Home Workforce Management Solutions Consulting Memphis At Home Workforce Memphis Guidance - Management Systems Consulting Services Memphis Tennessee
  • Microsoft Consulting Company Microsoft Office 2000 Consulting Companies
  • Microsoft Exchange Server 2010 Outsourcing Exchange Server 2010 Migration Online Help
  • Microsoft and Cisco Network Design Johnson County Kansas Microsoft Windows Small Office IT Support Overland Park Leawood Prairie Village
  • Monterey County Integration Consulting Monterey County IT Consulting

  • 24x7 Anti-Spam Support Services
    Anti-Spam Consultants

    E-Mail Guard represents a complete service for blocking spam and viruses. E-Mail Guard handles the protection and administration of company email by offering constantly updated spam and virus blocking, policy management, content testing, and protection against email-based DHA and Distributed Denial of Service attacks. E-Mail Guard also features tracking, management and analysis tools plus outbound email filtering to let you fix your e-mail system and define and regulate company security policy.

  • Networking Technical Support Firms Grand Prairie, Ellis County Networking Computer Consultancy Companies Grand Prairie Cedar Hill Mansfield

  • 24 Hour Technology Professional Google Cloud App Migration
    Google Cloud Windows Consultant Services

    Progent offers affordable remote and onsite support to assist businesses of any size to migrate all or part of their core network infrastructure to Google Cloud Platform (GCP). This can save management hassle and hardware expense and enable the use of Google's cutting edge machine learning technology. Progent can help you with every aspect of Google Cloud Platform migration and troubleshooting including needs analysis, preparedness evaluation, system design, pilot testing, deployment, centralized administration, performance tuning, software license management, disaster recovery solutions, and security strategies.

  • Offsite Data Backup Service Support and Help Integration Services Offsite Data Backup Service
  • On-site Technical Support Windows Indiana Indiana Windows Migration Support
  • Online Help Microsoft SharePoint Server 2013 Polk County Iowa Support Outsourcing SharePoint Server 2007 Des Moines International Airport DSM

  • Specialists QTS Sacramento Colocation Center
    Specialist QTS Sacramento Data Center

    The QTS (formerly Herakles) Internet Data Center facility is located in the earthquake-neutral Natomas neighborhood of Sacramento, CA. If your company is currently using the QTS data center as a colocation site or if your company is planning on moving your main or disaster recovery equipment to Herakles/QTS, Progent can provide a range of budget-friendly consulting services including data center relocation, system deployment and upgrades, infrastructure improvements, project management services, virtualization expertise, remote monitoring, streamlined system management, software development, disaster recovery/business continuity planning, data security assessment, and the support of Progent's Test Lab.

  • Onsite Technical Support IT Services for Network Service Providers IT Services for Network Service Firms Professionals
  • Outsourcing IT Support BlackBerry BPS Jacksonville Florida BlackBerry Desktop Manager IT Outsourcing Group Jacksonville Florida
  • Part Time Job Microsoft Engineer Santa Rosa, CA Positions Computer Consulting Healdsburg CA
  • Philadelphia Crypto-Ransomware Remediation Philadelphia Harrisburg Philadelphia Crypto Repair Experts Philadelphia, PA
  • RIM BlackBerry Small Business IT Outsourcing Services Hartford Connecticut Hartford Connecticut BlackBerry BPS Technical Consultant
  • Remote CISSP Certified Security Milwaukee, Madison, Green Bay, WI Consulting Service Firm Microsoft, Cisco and Security Certified Experts Wisconsin Network Installation

  • Collocation Technology Consulting
    Data Center Onsite Technical Support

    Progentís data center IT services are designed for businesses with equipment located at IDCs or data center colo hosting facilities and requiring timely in-person assistance at the colo facility as well as remote support from Microsoft and Cisco Certified professionals. Progent offers a full array of Internet Data Centers and data center and co-location consulting services such as network architecture evaluation, Windows and Linux server integration and support, troubleshooting for server and telecommunications networking, design and deployment of zero-downtime systems, defining and deploying layered security structures, firewall integration and support, configuring load balancing solutions, and creating fault tolerant server and storage cluster systems.

  • Remote Workers Corpus Christi Expertise - Solutions Consultants Corpus Christi Kingsville Emergency At Home Workforce Corpus Christi Consulting Services - Integration Solutions Consulting and Support Services
  • Remote Workforce Pasadena Consultants - Collaboration Technology Consulting Services Pasadena, TX Pasadena Remote Workforce Collaboration Solutions Expertise Pasadena Baytown Missouri City

  • Top wireless VoIP phone integration Support and Help
    wireless IP phone integration Consultants

    Progent's Cisco Wi-Fi VoIP phone configuration and troubleshooting experts can provide online and on-premises assistance to help you build and maintain a Cisco wireless IP phone solution by delivering integration services that range from debugging the set up of a wireless VoIP phone or AP to offering comprehensive project management outsourcing or co-sourcing for updating the Wi-Fi architecture of a campus.

  • San Bernardino 24x7x365 Offsite Workforce Consulting Experts near San Bernardino - Video Conferencing Systems Expertise At Home Workforce San Bernardino Expertise - Conferencing Solutions Guidance San Bernardino County
  • Santa Rosa Teleworkers Help Desk Solutions Expertise Santa Rosa Sonoma County Remote Workforce Santa Rosa Consulting - Help Desk Call Center Outsourcing Expertise
  • Security Incident Response Consulting
  • Security Cybersecurity Group Buffalo New York CISSP Protect Buffalo Great Lakes
  • SharePoint Server 2007 Professionals Support Outsourcing Microsoft SharePoint 2010

  • Operating System Training
    Router Knowledge Transfer

    Progent is committed to knowledge transfer from Progent's consultants to customers. By educating customers to deal with problems that are within their scope, Progent can concentrate on offering high-value skills where Progent has little competition. Medium-size businesses who utilize trusted freelance consultants or who employ in-house IT staffs benefit when Progent passes on information about critical technology and proven methodologies to make their IT environments more robust, secure, and efficient.

  • Small Office Computer Consultant Morgan Hill Gilroy On-site Technical Support
  • Support Firms Exchange Server 2013 Thousand Oaks California Exchange Security Consulting Services Thousand Oaks California
  • Telecommuters Riverside Consulting Services - Collaboration Systems Consulting and Support Services Riverside - Ontario Teleworkers Consulting Services near me in Riverside - Collaboration Technology Consulting Services Riverside - Fontana
  • Teleworkers Consulting Experts nearby Valencia - Integration Solutions Assistance Valencia-Santa Clarita At Home Workers Consultants nearby Valencia - Integration Solutions Consulting Experts Valencia-Sylmar

  • IT Consulting Risk Response
    Cisco and Microsoft Certified Expert CRISC Certified Outsourcing

    Progent's disaster recovery support and business continuity consultants can show you how to create a disaster recovery strategy to prepare for an IT network disaster. Progent can help you create a comprehensive disaster recovery strategy that incorporates scheduled disaster recovery assessments and drills. Progent's Microsoft and Cisco-certified professionals can also help you create an affordable, zero-downtime system solution that addresses reliability issues involving a wide array of infrastructure technologies and procedures.

  • Teleworkers Waltham Consulting Services - Security Solutions Consulting Experts Waltham-Brightone Waltham Work at Home Employees Endpoint Security Solutions Expertise Waltham, Massachusetts
  • Teleworkers Winston-Salem Assistance - Video Conferencing Systems Consultants Forsyth County North Carolina Winston-Salem Work at Home Employees Conferencing Technology Guidance
  • Tucson Phone Support Tucson Network Security Consultant
  • Tulare County California Small Office Network Consultant Microsoft and Apple Visalia, San Joaquin Valley Integration Consulting Emergency Phone Support
  • Vacaville California 24x7 Job Opportunities Computer Support Vacaville, CA 24/7/365 Microsoft MCP Consultant Contractor
  • Windows Server 2019 Computer Network Consulting company Hartford County Connecticut 24-7 Windows Server 2012 R2 Information Technology Manager Hartford Enfield Bristol Farmington
  • Work from Home Employees Assistance in Southfield - Endpoint Security Systems Guidance Southfield, MI 24/7 Southfield Offsite Workforce Endpoint Security Systems Guidance

  • Apple Macintosh Network Security Consultants
    Mac Spam Filtering Services

    Progent's CISM-certified security staff can help you secure your Mac environment through professional services including performing security audits, clean up after virus and denial of service attacks, setting up firewalls, integrating safe remote and mobile access, deploying monitoring software for protection against viruses, spam, and directory harvest attacks, and creating a company-wide security plan appropriate for the specific objectives of your business information system.

    © 2002-2020 Progent Corporation. All rights reserved.