Additional Topics of Interest

Palo Alto Networks App-ID Information systems Security Outsourcing
Protect Palo Alto Networks User-ID

Progent's Palo Alto Networks firewall experts can show you how to choose, deploy, and manage Palo Alto Networks firewalls to create a modern cybersecurity solution that extends across your on-premises and cloud assets and guards all users anywhere with any endpoint device.

IT Services for Network Service Providers Online Troubleshooting
Support for IT Service Providers Integration

Progent's Support Program for IT Service Organizations lets you take advantage of Progent's information technology experts under your own service brand as a seamless arm of your network services staff.

SQL Server 2022 and Amazon Marketplace Web Service Support and Help
SQL Server 2022 R Services Online Support Services

Progent's Microsoft-certified SQL Server 2022 experts can assist you to evaluate the advantages for upgrading to SQL Server 2022 and can provide rapid remote or on-premises access to consulting experts in system planning and deployment, software development, SQL Server management, and network security.

Outsourcing Call Desk for Telecommuters
Helpdesk for at Home Workforce IT Consulting

Progent has 20 years of experience helping small and mid-size businesses to design, deploy, tune, manage, and troubleshoot computer networks that support at-home workers.

MFA and Single Sign-on Integration Support
Duo Identity Authentication IT Consultant

Progent's Duo service plans utilize Cisco's Duo technology to protect against compromised passwords by using two-factor authentication (2FA). Duo enables one-tap identity confirmation with Apple iOS, Android, and other personal devices.

ransomware removal and restore Consulting
Dharma ransomware recovery Consult

Progent's ransomware consultants can help your business to evaluate your ransomware defenses, monitor and guard your IT environment, help with negotiating a settlement with a threat actor, and reconstruct a network victimized by a ransomware variant like Ryuk, Maze, Sodinokibi, Netwalker, Snatch or Egregor.

SCCM 2016 Intune Integration Support
SCCM 2016 Planning Consultant Services

System Center Configuration Manager 2016 automates software deployment across multiple sites, simplifies security and compliance settings management, inventories network assets, guards against corporate data leakage, provides health monitoring, allows safe end-user self service, and delivers a common control mechanism for administering multi-OS ecosystems running on-premises, cloud-centric, or hybrid deployment architectures. Progent's Microsoft-certified SCCM 2016 consultants and Azure cloud integration experts can assist you with any facet of designing, installing, operating and repairing a System Center 2016 Configuration Manager solution for local, cloud, or hybrid environments.

Ekahau Sidekick Wi-Fi Network Design Computer Consultant
Ekahau Sidekick Wi-Fi Network Design Troubleshooting

Progent's Ekahau-certified Wi-Fi network design consultants can help your business to design, deploy, tune, manage and debug a Wi-Fi network customized for your venue. Progent offers online or on-premises expertise for Ekahau Pro for predictive Wi-Fi design, Ekahau Sidekick for onsite RF signal analysis, Ekahau Analyzer for resolving RF issues, and Ekahau Insights for managing the performance of multiple Wi-Fi sites.

Duo Multi-factor Authentication Network Consultants
Two-factor Authentication (2FA) Configuration

Progent's Duo services utilize Cisco's Duo technology to protect against stolen passwords by using two-factor authentication (2FA). Duo supports one-tap identity verification on Apple iOS, Android, and other out-of-band devices.

Microsoft SQL 2008 Integration Services
Microsoft SQL Server 2008 On-site Support

SQL Server 2008 delivers powerful, standardized tools to IT professionals as well as to information workers, lessening the complexity of designing, deploying, administering, and using company information and database programs on platforms ranging from handheld devices to enterprise information systems. The sophistication and integration requirements of Microsoft SQL Server 2008 call for a network consulting firm with real-world expertise and wide knowledge in planning and deploying data-driven, end-to-end business technology solutions. The knowledge and experience of Progent's Microsoft-certified technical team, with an average of more than 10 years of background supporting Microsoft integration, assures you success in designing, configuring and managing Microsoft SQL Server 2008 applications that are seamlessly integrated with the Microsoft .NET environment.

NinjaOne RMM and Progent NOC Server Management On-site Technical Support
24/7/365 NinjaOne RMM and Progent NOC Network Management Support and Setup

A centerpiece of Progent's Network Operations Center (NOC) is its powerful integration of NinjaOne RMM, a comprehensive RMM solution which facilitates automated alerts and streamlined incident response.

Top Ranked Dynamics 365 Business Central Applications Support
Navision and Dynamics NAV Support and Help

Progent can provide online and onsite deployment, migration, application development, BI reporting for Dynamics 365 Business Central (formerly Dynamivs NAV).

Support Outsourcing ASA and PIX Firewalls
Cisco ASA and VMware IT Consultant

Progent's Cisco-Premier technology consultants offer experienced PIX Firewall consulting services covering design, integration and maintenance of Cisco firewall and Cisco security technology. The Cisco PIX 500 Security Appliance Series of Cisco firewalls offers strong user and software policy enforcement, mutlivector threat security, and secure access services. Extending from compact, easy-to-install desktop devices for small offices and home offices to scalable gigabit products, Cisco PIX firewalls provide a healthy level of protection, speed and availability for information networks of all sizes. PIX firewalls are build around a hardened, purpose-built platform, PIX OS, minimizing possible OS-specific security vulnerabilities. The Cisco PIX Firewall has been awarded ICSA Firewall and IPsec certification plus Common Criteria EAL4 evaluation status. PIX firewalls deliver an array of integrated protection and connectivity services, including powerful application-aware firewall services, VoIP and multimedia security, multi-site and remote-access IPsec VPN connectivity, intelligent access services, and extensive management solutions. Progent's Cisco experts can help you select and integrate any Cisco PIX 500 Series firewalls such as the Cisco PIX 501 Firewall, the Cisco PIX 506 Firewall, the Cisco PIX 506E, PIX 515 Firewalls, the PIX 515E Firewall, the Cisco PIX 520 Firewall, Cisco PIX 525 Firewalls and the Cisco PIX 535.

Juniper Junos Security Firms
Juniper Junos BGT Intrusion Detection

Progent's Juniper-certified network engineer can assist your company to plan and implement Juniper Firewall and VPN platforms, optimize and troubleshoot your infrastructure, and migrate efficiently from outdated devices to the latest versions. Progent's Junos OS consultants can provide expertise with Juniper's premier network operating system to enable your business to simplify the management and strengthen the security of your Juniper VPN appliances and firewalls. Progent also has extensive background supporting Juniper's NetScreen OS and ScreenOS operating system platforms and can assist you maintain networks that incorporate a mix of Juniper's software platforms.