Additional Topics of Interest

Recruit Network Consultant Employment
Freelance Cisco Consulting Employment Opportunities

Progent is seeking a variety of full-time employees such as motivated MCSEs; connectivity experts who have Cisco CCDP or CCIE certification; and consultants for fault-tolerant system design with experience in mobile connectivity, wireless networking, high-availability environments, disaster recovery solutions, data protection, and server virtualization. We are also hiring workstation support technicians, off-site service professionals, and CISSP or CISA accredited security consultants. Progent is also looking for veteran managers and administrators able to operate efficiently in Progent's high-growth, virtual office environment. Progent works with freelance consultants who have in-depth expertise and working experience in crucial information technology areas outside Progent's main service concentration. Our Experts Group hires independent consultants who can provide advice and programming support for mission-critical solutions such as Manufacturing Resource Planning, Enterprise Resource Planning, or CRM; possess in-depth knowledge of non-Microsoft platforms such as Linux, Apple OS, or Sun, or offer world-class skills in areas such as telecommunications, web site design, EDI, eCommerce, or dbm programming. Independent consultants premier by us cooperate with our staff engineers to provide comprehensive solutions for small business networks.

Cisco Security Support and Help
Cisco PIX Firewall Support and Setup

Cisco's PIX firewalls have reached end of life and Cisco may no longer offer support these devices. Progent continues to offer technical assistance for Cisco's PIX Series firewalls to help you with maintenance and Progent can also help you determine whether to migrate to next generation firewall products from Cisco. Progent's Cisco-certified specialists can help your company design and carry out a smooth upgrade to Cisco ASA 5500-X Series firewalls following industry best practices.

Largest SQL Server 2008 Migration Consulting
Reports Microsoft T-SQL

Progent's certified SQL Server developers and database administrators offer online consulting to assist organizations of all sizes to create, manage, and troubleshoot applications based on Microsoft's SQL Server RDBMS platform and Microsoft's .NET architecture. Progent's SQL Server consultants can provide support for any element of the application life cycle in solutions that range from small office databases to N-tier VLDB applications and data warehousing.

Consulting Juniper SA4500 SSL VPN
24/7 Juniper SSL VPN Router Security Firms

SSL VPN makes it possible to establish a secure Internet connection between an enterprise network and virtually any remote computer without the need for pre-installed client software. Progent's Juniper-certified consultants can help you design, manage, and troubleshoot SSL VPN solutions based on Juniper's AS Series of remote access appliances.

Security Information and Event Management Professionals
Audit GIAC Certified Information Assurance

GIAC (Global Information Assurance Certification) was founded in 1999 to validate the skill of network security experts. GIAC certifications are recognized by companies and institutions all over the world including and the United States NSA. Progent's GIAC-certified information assurance consultants offer expertise with all of the security services covered under GIAC accreditation such as evaluating infrastructure vulnerability, incident handling, intrusion detection, web application security and security information and event management (SIEM) solutions.

24-Hour Catalyst 9120AX Access Point Online Support Services
Catalyst 802.11ax AP Migration Remote Consulting

Progent's Cisco-certified Catalyst 802.11ax Wi-Fi 6 and Wi-Fi 6E Wireless Access Point experts offer economical online and onsite help for Catalyst next-generation Wi-Fi 6 and Wi-Fi 6E wireless APs.

Solaris Network Consulting
Urgent Network Consultants Sun Solaris

If your company operates a Solaris network or a mixed-platform computer system, Progent's CISM, CISSP and ISSAP-certified security specialists can help your whole enterprise in a wide array of security topics such as security administration procedures, security design and models, access control products and techniques, applications development security, business processes security, hardware security, telecommunications, network and web security, and business continuity planning. CISM and CISSP stipulate the core skills and international standards of knowledge that information security managers are expected to master. These accreditations offer executive management the confidence that consultants who have earned their CISM, CISSP or ISSAP certification have demonstrated the background and knowledge to deliver world-class security management and consulting help.

Microsoft and Cisco Certified Consulting Services Company Oklahoma
Louisiana IT Outsourcing Firm

Progent's National Support Center provides nationwide remote assistance for Windows and Cisco-based small business information networks. Progent's Microsoft and Cisco-Premier service professionals provide telephone support and online secure computer access to troubleshoot and repair network problems rapidly and economically. The scope of technical expertise available from Progent's team of nationwide service professionals allows Progent to escalate even the most difficult problems to competent experts as required.

Windows and UNIX Consulting Services
Best Support and Setup Windows, UNIX, Solaris

If your company operates a UNIX, Linux, or Sun Solaris environment or a multi-OS network, Progent's CISM and CISSP-premier security specialists can help your entire organization in a wide array of security areas such as security management procedures, security architecture and strategies, access management systems and techniques, software development security, business processes security, hardware security, communications, infrastructure and Internet security, and disaster recovery preparedness. CISA and CISM stipulate the core skills and international standards of knowledge that information security managers are expected to possess. These certification give executive management the confidence that consultants who have earned their CISA or CISSP qualification have demonstrated the background and theory to offer effective security support and consulting services.

Consultant Herakles/QTS Test Lab
Herakles/QTS Test Lab Consultancy

Progent's Test and Training Lab located at the QTS Data Center is available for testing mission-critical applications, developing cost-effective system upgrade procedures, evaluating and optimizing performance, designing or verifying disaster recovery strategies, resolving compatibility issues, and establishing training systems for the latest technologies. For Progent clients without adequate internal resources to assemble effective pilot systems, the lab cuts capital outlay and engineering risk while keeping vital IT initiatives on schedule.

SonicWall TZ350 Firewall information Systems Audit
SonicWall NSA 5650 Firewall Technology Consulting Services

Progent's certified SonicWall firewall consultants can show you how to integrate, manage, and tune SonicWall firewall devices including the newer SonicWall TZ and NSa families of firewalls and the legacy SonicWall PRO 2040 devices. Progent's CISM and CISA-certified cybersecurity consultants can help you incorporate SonicWall firewalls into an end-to-end security solution and build security into your corporate operations.

Remote Solaris IT Services
Solaris Consultant Services

Progent's Sun Solaris family support experts offer small and mid-size businesses and developers support for administering and maintaining Solaris systems that coexist with Microsoft-based networks. Progent can give your business contact with Solaris consultants, consulting professionals certified by Microsoft and Cisco, and security specialists with CISM and CISA credentials. This wide array of experience provides you with an easy one-stop source to show you how to create and maintain a protected and robust cross-platform network and communications environment that allows Sun Solaris and Microsoft coexistence by integrating Microsoft Windows with major variants of UNIX including Apple Mac OS X, Solaris, IBM AIX, HP-UX, Berkeley UNIX (BSD), SCO UNIX, and Silicon Graphics IRIX or major Linux variations such as RedHat Linux, SUSE, CentOS Linux, Ubuntu Linux, PCLinuxOS, fedora, Gentoo, Mandrake/Mandriva, Debian GNU/Linux, and Slackware Linux.

Consultant NodeZero Certified Security Penetration Testing
NodeZero Certified Cybersecurity Pen Testing Security Contractor

Progent's certified cybersecurity consultants can perform NodeZero-powered threat assessments to make sure your security defense systems and policies are properly configured and effective.