Additional Topics of Interest
Mac Office Consultant Services
Microsoft Office for Mac allows Apple Macintosh users to run the industry's most familiar business applications. Progent's Apple-certified Mac experts can help you configure Microsoft Office for Macintosh on a mixed-platform network that incorporates Apple OS X and Windows-powered computers so that Mac users can take advantage of the new features in Word, Excel, PowerPoint and Entourage for Mac in order to share information and network resources with colleagues who run Microsoft Windows. Progent's consultants have experience with both Mac and Windows technology and can support networks that mix Mac with Windows systems with extensive resource sharing, or networks which carefully limit collaboration between Mac and Windows systems.
ISA Server 2006 Consulting Services
Microsoft ISA 2006 is a comprehensive edge gateway that provides a powerful application layer firewall, VPN, proxy, and Web caching solution for securing the Internet-facing networks of any organization against a broad range of attacks. Progent's Microsoft ISA Server 2006 support professionals can help you plan, cost-justify, pilot, install, customize and manage the any version of ISA Server on your network.
ProSight Next Generation Endpoint Protection Network Consultant
ProSight Active Security Monitoring (ASM) is an endpoint protection service that incorporates next generation behavior-based machine learning tools to guard endpoint devices as well as physical and virtual servers against new malware assaults such as ransomware and email phishing, which easily escape legacy signature-based anti-virus products. ProSight ASM protects local and cloud resources and provides a single platform to automate the entire malware attack progression including filtering, infiltration detection, containment, remediation, and forensics. Top features include one-click rollback with Windows VSS and automatic network-wide immunization against newly discovered threats.
SMS Server 2003 Migration Specialist
Microsoft Systems Management Server 2003 offers extra functionality for change and configuration management of Windows-powered systems through introducing Feature Packs. Feature Packs lower the overall operational costs of managing and deploying software by making it easier to install system images, control mobile computers, and run management tools. In addition to alerting you about techniques to save management costs by installing SMS 2003 Feature Packs, Progent's consultants can help you plan and implement IT tasks that cover processes that Feature Packs are designed to streamline. Progent's migration and upgrade services can lower cost and eliminate business disruption as you transition to the latest operating systems and programs. Progent's wireless engineers can help you define sensible procedures and policies to manage PDAs and smart mobile phones so your field force stays productive and secure. Progent's CISSP-certified consultants and CISM-certified security experts can help you design a security strategy that incorporates policies, processes and technologies to keep your IT network safe.
MS SQL Technical Support Services
Microsoft SQL Server 2005 offers indispensable, familiar tools to IT professionals and information workers, lessening the difficulty of designing, deploying, managing, and using company information and database applications on platforms ranging from mobile devices to corporate information networks. The complexity and integration requirements of Microsoft SQL Server 2005 call for a network consulting firm with hands-on experience and broad knowledge in designing and deploying data-driven, comprehensive business technology solutions. The knowledge and experience of Progent's Microsoft-certified technical team, with an average of over 10 years of background involving Microsoft technology, assures you success in planning, deploying and managing Microsoft SQL Server 2005 solutions that are well integrated with the Microsoft .NET platform.
NetApp MetroCluster Switchover Professionals
NetApp MetroCluster is a disaster recovery platform that combines failover storage clustering with synchronous replication to provide fast, zero RPO disaster recovery between datacenters that are up to 300km apart. Progent's roster of seasoned IT consultants can help your business to plan, configure, administer, upgrade, test and repair a disaster recovery solution built around NetApp MetroCluster. Progent can assist you to choose a topology for your MetroCluster environment that aligns with your functional needs and budget. Progent can ensure you follow best practices for installing your MetroCluster solution by providing guidance with tasks like assigning shelf IDs, determining aggregate layout, provisioning volumes, setting up NetApp Snapshot, provisioning Cisco and Brocade switches, implementing a tiebreaker mechanism, setting up a TCP/IP configuration replication network between your storage clusters, and verifying your MetroCluster disaster recovery solution to verify compliance with industry standards and regulatory mandates.
Altaro VM Backup Scheduling Remote Support Services
Altaro VM Backup software provides small businesses a reliable and budget-friendly platform for backing up and restoring Hyper-V and VMware-powered VMs. Altaro VM Backup can be used for local, remote, multi-site, and cloud architectures and also enables low-cost cloud backup to Microsoft Azure Block Blob storage. Headline features include state-of-the-art inline deduplication to cut backup storage needs, Continuous Data Protection (CDP) with backup spacing as little as five minutes for reducing your Recovery Point Objective (RPO), military-grade encryption, item-level recovery capability for individual files and emails, extensive support for Windows Cluster Shared Volumes (CSV) and VMware vCenter for managing larger environments, and the ability to leverage Volume Shadow Copy Service (VSS) to back up live virtual machines without downtime. Progent is an Altaro partner and offers a broad array of services to assist you to design, deploy, manage and troubleshoot a backup and disaster recovery solution based on Altaro VM Backup.
Exchange Email Hosting Specialist
Progent's Exchange Server Hosting Services offer a world-class data center that features backed-up electrical and cooling systems, round-the-clock staffed security and IT support center, and fault-tolerant connections to tier-1 Internet service providers. Hosted Microsoft Exchange servers are configured as virtualized machines for fault tolerance, smooth scalability, and rapid recovery. Services feature integration with your network, connectivity with handheld computing devices, continual tracking of efficiency and security, spam and virus protection, patch and service pack management, Helpdesk services, daily backup, and full email management services.
GIAC Security and Compliance Check Consulting
GIAC (Global Information Assurance Certification) was established in 1999 to validate the skill of information technology security experts. GIAC accreditations are recognized by companies and institutions all over the world including and the United States National Security Agency. Progent's GIAC-certified information assurance consultants can provide expertise with all of the security services addressed under GIAC accreditation including auditing network vulnerability, security incident management and response, traffic analysis, web services security and security information and event management (SIEM) solutions.
Cybersecurity Architecture Consultancy
Progent's ISSAP Premier security consultants, or Information Systems Security Architecture Professionals, are experts who have been awarded ISSAP status through rigorous examination and extensive experience with network security design. ISSAP security experts have in-depth knowledge of access management systems and methodologies, telecommunications and network infrastructure protection, cryptography, requirements analysis, business continuity and DRP, and physical security integration. Progent's ISSAP-premier security experts can assist your company with all aspects of architecture security.