SentinelOne Dealer and Integration ExpertsSentinelOne's Singularity product line is a subscription-based, cloud-centered cyberthreat management stack that features computer learning software and advanced services to deliver enterprise-class endpoint detection and response (Singularity Control and Complete) and managed detection and response (Singularity Complete with Vigilance MDR). SentinelOne's low-profile agents can be installed in minutes to guard endpoints against increasingly sophisticated cyberthreats including ransomware, known and zero-day malware, trojan viruses, hacking toolkits, RAM exploits, malicious scripts, harmful macros, and living-off-the-land attacks. SentinelOne agents are available for Microsoft Windows, macOS, Linux, and Kubernetes powered endpoints. Supported form factors include physical, virtual, VDI desktops, hybrid data centers, and cloud service providers. Because SentinelOne software agents are autonomous, they can provide cutting-edge behavior-based protection in real time even if endpoints are unattached to the cloud.

Progent is a certified SentinelOne Partner and reseller and manages thousands of endpoints protected by SentinelOne Singularity technology. SentinelOne is always the first incident response tool activated by Progent to gain control and visibility of a customer's system at the outset of a ransomware recovery. SentinelOne is also the key technology powering Progent's Active Security Monitoring managed services. SentinelOne was ranked as a leading visionary in Gartner's 2022 Magic Quadrant for Endpoint Protection Platforms and attained the most correlated tactics and techniques in real-time during the 2022 MITRE ATT&CK Phase 4 Evaluation. Gartner concludes, "This reaffirms its (SentinelOne's) ability to detect all attacks and provide full details of the techniques and tactics used." SentinelOne also outscored all competitors for every use case in Gartner's evaluation of Critical Capabilities for Endpoint Protection Platforms.

Singularity Packages for SentinelOne Endpoint Detection and Response
SentinelOne's Singularity family has several tiers of endpoint security product packages provided as a worldwide SaaS platform that features high availability, centralized policy management, AI powered malware intelligence, rapid restoration, and a data-driven dashboard for security analytics. Packages include Control for enhanced management, Complete for smart forensics, and Complete with Vigilance MDR for 24/7 advanced monitoring and response. The product tiers are additive. Control and Complete each include all the features and options of the level beneath it. Subscription rates begins at $10 for each endpoint per month for small customers with substantial discounts for bigger accounts. There is no minimum device count.

The SentinelOne Control Package
The SentinelOne Control Package is the base software and is 100% maintained by the client. For some examples: Endpoint agents need to be updated in the SentinelOne portal, allow rules need to be set, exclusions need to be made, blacklists should be created, threats must be responded to, and many other day-to-day activities that someone in your organization needs to manage and maintain. SentinelOne is just like any other security product in that it has frequent updates to keep its defenses current. Progent can assist with or directly handle these items, but there is additional time and materials billing for all services performed.

With the Control Package you manage your own portal and while Progent and SentinelOne personnel are monitoring and or receiving alerts of serious threats in your environment, we have no authorization to do any work in your environment and will only do best efforts to alert you in case of a serious threat.

Features of the SentinelOne Control Package include:

  • Endpoint Prevention (EPP) to block a broad range of malware, Trojans, hacking tools, and ransomware before they get a foothold
  • ActiveEDR Basic for Endpoint Detection and Response works in real-time with or without cloud connectivity. ActiveEDR identifies highly sophisticated malware, memory exploits and other fileless assaults as they try to do compromise your network.
  • ActiveEDR Recovery gets users back in business in minutes and includes 100% remediation plus rollback for all supported versions of MS Windows.
  • Endpoint Control for Policy-based management of all USB and Bluetooth peripherals (Windows, Mac)
  • Firewall Control for Policy-based control of network connectivity to and from assets, including location awareness (Win, Mac, Linux)
  • Vulnerability Management, along with Application Inventory, for details of 3rd party applications with recognized vulnerabilities mapped to the MITRE Common Vulnerabilities and Exposures (CVE) cybersecurity database
  • Secure Remote Shell support for direct endpoint access by incident responders and forensics personnel
  • Autonomous SentinelOne agent Storyline Engine
  • Combined Static AI and SentinelOne Cloud Intelligence file-based assault defense
  • Behavioral AI fileless incursion detection
  • Autonomous Threat, Remediation, and Rollback
  • Quarantine endpoint from system, Incident Analysis, Agent Anti-tamper, App inventory
  • Rogue device discovery
The SentinelOne Complete Package
The SentinelOne Complete Package has the core features and operates with all the extra functions of the Control package and also includes single-agent advanced endpoint detection and response, hunting throughout endpoints, cloud, and Internet-of-Things (IoT). The bundle eliminates significant effort for security admins, security operations center analysts, threat hunters, and incident responders by automatically correlating events and mapping it into the MITRE ATT&CK framework to investigate root causes. The SentinelOne Complete Package includes a powerful EDR feature set:
  • Co-Managed environment with Progent being sent alarms and notices of all threats and activities in your system. Clients are responsible for reacting to threats in their system and optional assistance time and material is available from Progent's security experts
  • ActiveEDR Advanced provides visibility of all benign data.
  • ActiveEDR Advanced provides enterprise threat hunting. SentinelOne is differentiated with the ease-of-use characterized by the active quality of the solution in autonomously responding to attacks.
  • Storyline feature for Automated Forensics and quick root cause analysis (RCA). All OS stories are automatically contextualized with SentinelOne’s patented TrueContext function, simplifying analysts' complex job of event correlation so they can arrive at the root cause with reduced MTTR.
  • Storyline Active Response (STAR) combats zero-day threats with customized detection and hunting rules.
  • Deep visibility Storyline Pivot and Hunt technology by MITRE ATT&CK technique
  • EDR Hunting Data storage from 14 days standard to 365 days optional
  • Timelines, file fetch, file integrity monitoring, sandbox integrations
  • Other response alternatives are available and personalized to your needs. Includes 1 hour of training in advanced features and routine management of the SentinelOne portal. During this time, Progent will train in the creation of Exclusions, Blocklists, Mitigation, Agent Updates, Notifications, Client Reports, Application Features, Activity Logs and UI configuration Alerts.
Add-in for the SentinelOne Complete Package package include adding software-defined network discovery and aggregated active/passive device mapping through SentinelOne's Vigilance with MDR package plus elimination of agent installation gaps with configurable job automation. Progent can also provide optional monthly client portal checks and threat response guidance.

Complete with Vigilance Respond Managed Detection and Response Services
Vigilance Respond and Vigilance Respond Pro are optional Managed Detection and Response services for subscribers to the Singularity Complete package. These subscriptions include digital forensics and full 24x7 incident response provided by Tier-1, Tier-2, and Tier-3 IT security professionals. Vigilance Respond subscriptions include confirmation of cyberthreats, event prioritization and triage, false positive management and dashboard cleanup, accelerated threat resolution, management reporting, service level agreements, and escalation to the customer's cybersecurity team.

Vigilance MDR analysts classify threat alerts based on a hierarchy ranging from Benign to Urgent True Positive. This classification dictates how the Vigilance analyst responds to the threat. There are five classes of threats and consequent responses. Most alerts require no action by the client.

Benign Alert - False Positive
Vigilance resolves the issue and annotates the SentinelOne console. For single False Positive alerts, no other responses or notifications are required. For repeated False Positive alerts, Vigilance will escalate the issue to the customer to offer or agree to an appropriate exclusion or agent update as required.

Malicious Alert - True Positive Non-Urgent, Potentially unwanted Program (PuP)
Vigilance takes action to ensure the threat is blacklisted, resolved, and documented. Typically, no alert will be sent to the client unless the issue calls for additional activity.

Malicious Alert - True Positive / No Action Necessary
Vigilance performs proper actions including remediation to ensure the threat is quarantined. Once the SentinelOne analyst confirms the threat is deleted, the analyst will transmit a verification alert to the client.

Malicious Alert - True Positive Non-Urgent / Action Necessary
Vigilance takes proper actions including remediation to make sure the threat is isolated. Once the SentinelOne analyst confirms the threat is deleted, the analyst will send a confirmation notice to the client. Follow-up activity such as re-imaging may be required in some cases.

Malicious Alert - True Positive Urgent / Action Needed
Vigilance may respond strongly in high priority breach incidents including pursuing agent remediation actions and disconnecting affected network endpoints to stall the attack and block further lateral movement and spread. The analyst will send a proactive alert informing the customer of the issue and ask for immediate response.

In addition to including all the features of SentinelOne Control and SentinelOne Complete, SentinelOne Complete with Vigilance MDR adds 24x7 Monitoring with Immediate Threat Response, Remote Script Orchestration, and Ranger:

  • Co-Managed Solution with Progent receiving alerts and notifications of all threats and activities in your environment and combined SOC response, offering 3 levels of 24x7x365 Detection and Response. All threats are neutralized and responded to in close to real-time. Additional remediation options after threat mitigation are available and customized to your organization's needs.
  • Remote Script Orchestration enables enterprises to send scripts to a single machine, several machines, or even millions of machines, to react to current and future cyberattacks instantly. Security Teams can dispatch tailored scripts or choose from a wide selection of jobs – ranging from incident response to forensics artifact collection and even network administration. In combination with SentinelOne Storyline Active Response (STAR), analysts benefit from automated workflows that take incident response to the next level.
  • Ranger allows unparalleled visibility into your system. Ranger is network-efficient by intelligently designating a few SentinelOne agents per subnet to undertake network mapping missions. Selected "Rangers" passively track network broadcast data including ARP, DHCP, and other network observances. Admins can modify current scan policies and specify multiple IP Protocols for machine learning including ICMP, SNMP, UDP, TCP, SMB, and more. Rangers correlate all learned information within the backend to characterize familiar and unfamiliar devices. Ranger device inventories show what is attached to your system, where they are attached, and which protocols the devices listen on. Ranger permits you to discover and eliminate SentinelOne Agent deployment oversights using Ranger Deploy, a peer-to-peer deployment (Windows, Mac, Linux). Ranger allows you to monitor how unfamiliar devices communicate with managed hosts and quarantine suspect devices from managed devices with a click.
Includes one hour of training in advanced features and day-to-day management of the SentinelOne portal. During this time, we will instruct customers how to create Exclusions, Blocklists, Mitigation, Agent Updates, Notifications, Client Reports, Application Features, Activity Logs and UI configuration Alerts. Progent can provide tailored additional training for your company's requirements on a time and materials basis.

Download Progent's SentinelOne Singularity Packages Datasheets
See datasheets about Progent's SentinelOne Singularity products and services:

Why Progent?
Progent's team of more than 150 consulting professionals includes experts in every facet of information technology associated with small and mid-size organizations. With this scope of expertise, Progent can be your single point of contact for integrating a cohesive security environment that offers immediate business value. In addition to the endpoint security available from SentinelOne products and services, Progent offers a catalog of managed services and specially-priced IT support packages designed to assist SMBs to design, implement, validate, and manage networks that feature enterprise-class cybersecurity and low total cost of ownership.

Progent has in-depth experience with all the endpoint devices, servers and virtual machines that can be protected by SentinelOne technologies and services. Progent offers services that include Windows 11 migration expertise, Windows 10 integration, Linux integration, Mac OS X and macOS support, iPhone and iPad consulting, Android configuration, Windows Server 2022 integration consulting, Windows Server 2019 migration expertise, Hyper-V virtualization consulting, and VMware vSphere support consulting.

For fast rollback, Progent's Windows Server experts can assist you to configure Windows Volume Shadow Copy Service (VSS). Progent also offers online and on premises access to certified Cisco CCIE consultants to help you to plan, defend or troubleshoot your infrastructure. If your network incorporates cloud resources, Progent offers the guidance of Microsoft Azure consultants, Amazon AWS experts, and Google Cloud integration consultants.

Contact Progent about SentinelOne Sales and Configuration Services
To learn more about how Progent can help you to buy or integrate SentinelOne endpoint security products, call 1-800-993-9400 or visit Contact Progent.



An index of content::

  • 24 Hour Consultants Cisco Parsippany-Fairfield, NJ Cisco Technology Providers Parsippany New Jersey
  • 24/7/365 At Home Workers Cheyenne Guidance - Cloud Technology Consultants Cheyenne Wyoming Award Winning Remote Workers Cheyenne Assistance - Cloud Solutions Expertise Cheyenne WY

  • Network Consultant Microsoft ISA Server
    ISA 2004 Standard Edition Server Professionals

    Progent's certified Internet Security and Acceleration Server consulting experts have broad backgrounds developing corporate security solutions for IT networks with many locations, mobile users, and line-of-business eCommerce applications. A Progent ISA 2004 Firewall consultant is ready to help your small company plan and implement a configuration of Microsoft ISA Server 2004 that meets your information security requirements without limiting your network.

  • 24/7/365 Cybersecurity Pen Testing Security Consultancies PEN Testing Cybersecurity Contractor

  • Microsoft Operations Manager Consultant Services
    Comprehensive Event Management Integration Services

    Progent provides a variety of IT support packages for small businesses. These IT outsourcing and network monitoring services are built around the proactive problem handling capabilities of Microsoft Operations Manager 2007, a state-of-the-art server and system support software platform that tracks the reliability, throughput, and safety of your information system and isolates potential problems before they can disrupt your network. With Progent's affordably priced IT service programs, small companies can select a basic co-sourcing package built around Operations Manager 2007 with server monitoring, reporting, Help Desk and online service or a complete 24x7 outsourcing solution.

  • 24x7x365 Springfield Remote Workers Help Desk Call Center Augmentation Consulting Hampden County Massachusetts Springfield At Home Workers Call Desk Outsourcing Consulting Services Hampden County Massachusetts
  • At Home Workers Londrina Expertise - VoIP Solutions Expertise Estado do Paraná At Home Workforce Londrina Consulting and Support Services - VoIP Systems Expertise
  • Berkshire Open Now Cisco Small Business Network Consultants Cisco Network Specialist Reading
  • BlackBerry Professional Software Small Business Specialist Mexico City, Iztapalapa Small Business IT Consulting Firm BlackBerry Redirector Mexico City, CDMX
  • CISM Consultant Freelancing Jobs Virtual Office Job Cisco CCIE Storage Networking Network Consulting Winston-Salem
  • Cisco Certified Migration Company Milwaukee, WI, Madison, WI, Green Bay, WI, Kenosha, WI Network Administration Milwaukee, WI, Madison, WI, Green Bay, WI, Kenosha, WI
  • Consultant Services SentinelOne Phishing Protection
  • Cisco Information Technology Installation Service Cisco IT Consultants
  • Cisco Remote Support Aurora, Denver, Boulder Cisco Technical Support Outsource Aurora Colorado
  • Cisco Small Office Network Consulting Services Monterey County Cisco Computer Network Support Monterey
  • Clearwater Florida Clearwater At Home Workers Cybersecurity Systems Assistance 24-7 Clearwater Remote Workers Security Solutions Consulting Services Clearwater, Pinellas County
  • Columbus Teleworkers Columbus Consulting Experts - Voice/Video Conferencing Solutions Expertise Columbus At Home Workers Video Conferencing Systems Expertise Columbus, GA
  • Services SentinelOne Ransomware Recovery
  • Edison Hermes Crypto-Ransomware Cleanup Edison-Somerset County, New Jersey Edison Edison Ransomware Recovery
  • Exchange 2016 SharePoint integration Consulting Services Exchange 2016 Office 365 integration Outsourcing
  • Exchange 2019 Consulting Organization San Francisco Peninsula Redwood City, CA Microsoft Exchange Server 2007 Service
  • Florianópolis Crypto-Ransomware Dharma Readiness Assessment Florianopolis-Palhoça Florianópolis Crypto-Ransomware Locky Readiness Evaluation
  • Immediate Work at Home Employees Expertise near me in Lima - Integration Consulting Santiago de Surco District Telecommuters Consulting Services - Lima - Setup Assistance Santiago de Surco District
  • Jersey City Remote Workers Collaboration Technology Guidance Jersey City Newport Centre Jersey City New Jersey Work at Home Employees Jersey City Consultants - Collaboration Systems Guidance
  • Largest At Home Workers Florianópolis Consulting Services - Video Conferencing Solutions Guidance Florianopolis, SC At Home Workers Florianópolis Consulting - Video Conferencing Technology Assistance Florianopolis

  • Top IT Consulting 64-bit Upgrade
    Microsoft Experts 64-bit Processing Engineer

    Progent's Microsoft-expert engineers can help you to update your desktops from 32 bits to 64 bits. Progent can assist your company to calculate the risks and advantages of moving to 64-bit PC desktop processing, design an affordable migration process that minimizes operational disruptions, and deliver economical, expert remote support to aid your organization to configure 64-bit desktop operating systems and applications on your current hardware.

  • Largest Microsoft SQL 2008 Computer Consultancy Firms São Paulo-Brooklin Computer Installation SQL Server Sao Paulo, SP
  • Memphis Bartlett Germantown Collierville Memphis Offsite Workforce Endpoint Security Solutions Expertise Remote Workforce Consulting Experts in Memphis - Network Security Solutions Guidance Memphis Tennessee

  • Computer Consultancy Companies Help Desk Outsourcing
    Ransomware Hotline Small Business Network Consulting Group

    Progent imposes no initialization fee and asks no retainer for services delivered during normal business hours. Progent's small granularity does away with large bills for quick solutions so you won't be tempted to permit minor problems to stay unaddressed.

  • Microsoft SharePoint Server 2010 Technical Support Services Honolulu, HI SharePoint Server 2010 Help and Support Oahu, Hawaii, United States
  • Microsoft SharePoint Server 2013 Computer Engineer Jackson County Missouri IT Consultants SharePoint Kansas City, Jackson County
  • SentinelOne Singularity Control Integration Consultancy
  • Mission Viejo-Laguna Beach Security Audit Services Firewall Mission Viejo-Dana Point Security Security Consultancy
  • Mobile WannaCry Ransomware Negotiation Expertise Port of Mobile, Alabama Mobile Hermes Crypto-Ransomware Negotiation Consulting Mobile County Alabama
  • Technical Support SentinelOne Virus Recovery Experts
  • Network Remote Consultant Part-Time Job Port Newark After Hours Microsoft MCSA Remote Engineer Contractor Jobs Essex County New Jersey

  • High-Availability Internet Network Online Support Services
    Technical Support Services Redundant ISP

    Progent's Cisco-certified IT experts can show you how to design an economical, high availability Internet configuration solution that can achieve non-stop Internet connectivity through a broad array of fault tolerant Internet network products and services including fault tolerant BGP, transparent fail-over, and multiple Internet Service Providers. Progent can provide Cisco Certified Internetwork Expert professionals to show you how to apply the most current techniques for high availability Internet connectivity to create an affordable, fully redundant Internet network with automatic failover and other features to create zero-downtime Internet access.

  • Offsite Workforce Consultants - Stamford - Backup Technology Consulting Experts Fairfield County Connecticut Stamford Work at Home Employees Backup/Recovery Technology Consulting Experts Stamford Danbury Greenwich, U.S.A.
  • SentinelOne Singularity and Vigilance Integration Consult
  • Outsourced IT Management Services Oakdale System Recovery Modesto
  • Pasadena Telecommuters Data Protection Technology Assistance Pasadena Telecommuters Pasadena Consulting and Support Services - Backup Solutions Consulting and Support Services Pasadena, Harris County, America
  • Phobos Ransomware Hot Line Des Moines Hermes Ransomware Hot Line Des Moines, United States
  • Ransomware Business Recovery Cotati, Windsor CA MongoLock Ransomware Hot Line Santa Rosa Sonoma County
  • Ransomware Removal and Data Restore Elmhurst, IL, USA Dharma Ransomware Hot Line Glenview, IL, United States
  • Redhat Linux, Sun Solaris, UNIX Integration Services Midland Texas Onsite Technical Support Fedora Linux, Sun Solaris, UNIX Midland Odessa
  • Remote Workforce Consulting Services near Spartanburg - Endpoint Management Systems Consulting Spartanburg-Duncan, SC Spartanburg Telecommuters Management Tools Consulting Services Spartanburg South Carolina
  • Remote Workforce Dallas Consulting and Support Services - Help Desk Call Center Outsourcing Consulting Services Downtown Dallas Teleworkers Dallas Consulting and Support Services - Help Desk Call Center Outsourcing Consulting Services Downtown Dallas

  • Largest SCCM 2016 Application Management On-site Support
    SCCM 2016 Application Management IT Consultants

    System Center Configuration Manager 2016 automates application and device provisioning and updating, simplifies security and compliance settings management, keeps track of network assets, protects against company data leakage, provides network health reporting, enables safe end-user self service, and offers a common control mechanism for managing multi-OS ecosystems based on on-prem, cloud, or hybrid deployment architectures. Progent's Microsoft-certified Configuration Manager 2016 consulting team and Microsoft Azure cloud integration specialists can help businesses of any size with any aspect of designing, installing, operating and troubleshooting a SCCM 2016 deployment for on-premises, cloud, or hybrid networks.

  • SCCM 2012 Migration Consultants Computer Consultants SCCM 2012 Asset Inventory
  • SQL Server 2019 Network Assessment La Jolla, CA Design Firm SQL 2014 San Diego-University, CA, USA
  • Server Recovery Arizona MCSE Expert Certified Phoenix, AZ, Tucson, AZ, Mesa, AZ, Glendale, AZ, Scottsdale, AZ, Chandler, AZ Support Specialist
  • Small Business Support and Help Small Business Support and Integration
  • Sodinokibi Ransomware Hot Line Cambridge NotPetya Ransomware Hot Line Huntingdon
  • Subcontractor Job FAQ about Cisco CCNA FAQ about Senior Network Engineer Subcontractor Job
  • Suse Linux, Solaris, UNIX Information Technology Consulting Buffalo, Erie County Ubuntu Linux, Sun Solaris, UNIX Integration Support Buffalo
  • Symantec VPN Protection Best Cybersecurity Tech Services Symantec VPN
  • Telecommuters Consultants - Monterey - Backup/Restore Systems Consultants Monterey, CA Open Now Work at Home Employees Monterey Consultants - Backup Technology Expertise Monterey, CA
  • Teleworkers Allen Guidance - Management Systems Consulting and Support Services Allentown, Lehigh County Work at Home Employees Expertise nearby Allen - Management Systems Expertise Lehigh County Pennsylvania, America
  • SentinelOne Singularity Complete Integration Technology Professional
  • Teleworkers Expertise - Santa Cruz - Collaboration Solutions Consulting Experts Top Ranked Telecommuters Consulting and Support Services near me in Santa Cruz - Collaboration Systems Assistance Aptos, CA
  • Teleworkers Manchester Guidance - Collaboration Solutions Consulting Manchester Manchester Manchester At Home Workforce Collaboration Solutions Assistance
  • Top Ranked Aironet 802.11ac AP Upgrade Technology Consulting Aironet Wireless AP Configuration
  • SentinelOne Behavior-based Virus Detection Professionals
  • Urgent Network Consulting SharePoint Server 2013 Bellevue, WA, US 24x7 SharePoint 2013 Technical Support Services Bellevue, King County

  • Mac Online Engineer
    Mac Online Consultants

    Progent provides national remote technical support and consulting services for businesses who run Apple macOS and OS X networks or whose IT systems feature a mix of Mac and Microsoft Windows technology. Progent's experts can provide Mac clients a variety of services including desktop assistance, migration to the most recent version of macOS from other earlier editions of Apple macOS or OS X, plus help with Mac application software. Progent can also help your business with Apple iPhone and Apple iPad integration and management, or migrating to iCloud. Remote technical support offers optimum return for your IT budget by extending client efficiency and limiting the hours billed for computer analysis and repair. Sophisticated online support technology and skilled technicians and engineers combine to enable Progent to handle most IT issues without squandering time and money by going to your location. In the vast majority of cases your IT issues can be remediated by telephone or via a mix of telephone help and online connectivity. Progent can make available Cisco certified CCIE network experts and CISSP premier security professionals to assist you with the most challenging network problems.

  • Vacaville Solano County Tech Support For Small Business Vacaville-Winters Computer Consultancy Services
  • Windows Server 2016 Computer Support Consultants Uniondale-Ronkonkoma, New York Troubleshoot Windows Server 2016 Uniondale-Hauppauge, United States
  • Work from Home Employees Consulting Experts near San Bernardino - Endpoint Security Systems Consulting Experts Offsite Workforce Assistance near San Bernardino - Network Security Solutions Assistance San Bernardino, CA, America

  • Cisco ASA Firewall with Firepower Remote Support Services
    Cisco ASA Firepower Specialist

    The latest generation of ASA 5500-X Series Next-Generation Firewalls with Firepower Services offer significantly more value than Cisco's previous firewalls and have superseded the ASA 5500 and PIX firewalls for all new deployments. Progent's Cisco-premier CCIE network consultants can assist you to manage your current PIX or ASA 5500 security appliances or upgrade efficiently to ASA 5500-X firewalls with Firepower Services. Progent can also assist your business to design, configure, tune, manage and troubleshoot firewall solutions based around Cisco ASA 5500-X firewalls with Firepower Services.

  • prime infrastructure Remote Support Services 2500 Wireless Controller Support Outsourcing

  • © 2002-2025 Progent Corporation. All rights reserved.