Additional Topics of Interest
CRISC Risk and Information Systems Control Specialist
Progent can provide the services of a CRISC-certified risk management consultant to help you to plan and implement an enterprise risk management (ERM) strategy based on best practices promoted by CRISC and crafted to match your company's risk tolerance, business objectives, and IT budget.
Network Consultants for SQL Server 2008
SQL Server 2005 offers powerful, familiar tools to IT experts and network users, reducing the difficulty of designing, integrating, managing, and using company data and database programs in environments ranging from mobile devices to corporate information systems. The sophistication and integration demands of Microsoft SQL Server 2005 call for a network consulting firm with hands-on expertise and broad knowledge in designing and building data-driven, comprehensive business technology applications. The experience of Progent's Microsoft-certified engineering staff, with an average of over 10 years of background supporting Microsoft integration, assures you success in planning, deploying and managing Microsoft SQL Server 2005 solutions that are seamlessly integrated with the Microsoft .NET environment.
ProSight DPS Backup and Recovery Services Specialist
ProSight Data Protection Services offer small and medium-sized organizations a low cost and fully managed service for secure backup/disaster recovery. For a fixed monthly cost, ProSight DPS automates your backup activities and enables rapid restoration of vital data, applications and virtual machines that have become lost or corrupted as a result of hardware breakdowns, software bugs, natural disasters, human error, or malware attacks such as ransomware. ProSight Data Protection Services can help you back up, recover and restore files, folders, apps, system images, as well as Hyper-V and VMware virtual machine images. Important data can be backed up on the cloud, to a local device, or mirrored to both. Progent's disaster recovery specialists can deliver world-class expertise to set up ProSight DPS to to comply with regulatory requirements such as HIPPA, FINRA, PCI and Safe Harbor and, whenever needed, can assist you to recover your business-critical data.
Apple Mac Directory Harvest Attack Defense Security Consultancies
Progent's certified security staff can help you protect your Mac network through professional services such as running security audits, recovery from virus and worm attacks, setting up firewalls, integrating safe remote and mobile connectivity, installing monitoring software for protection against viruses, spam, and malware, and developing a comprehensive security plan adapted for the particular goals of your business network.
Consultancy for Internet Access
Progent can provide the cost-effective support of online Internet connectivity consultants to help your organization to assess or enhance your Internet services so your Internet access solution aligns with your business requirements. Services provided by Progent's engineers include evaluation of your current bandwidth use, carrier and plan analysis and ordering, network provisioning, and managing a seamless move to a new ISP and/or service plan. Network provisioning can include optimizing existing routers and configuring additional ones, implementing firewalls, and designing fault-tolerant Border Gateway Protocol configurations.
Microsoft Exchange Consultant
Progent's Microsoft-certified consultants can provide affordable online and on-premises help to implement your migration to Microsoft Exchange 2010, produce comprehensive documentation of your upgraded email system, train your IT staff and end users to get them ramped up rapidly on Microsoft Exchange Server 2010, and provide ongoing administrative consulting and technical support. Progent's consultants can also assist you to migrate from Exchange Server 2010 to Exchange Server 2013 or Exchange 2016.
Online Support for Windows Server 2012R2 Private Cloud
Progent's certified professionals can help you to assess the benefits of Windows Server 2012 R2 for your organization, develop test environments and migration plans, optimize your infrastructure for local, multi-site, cloud-based, and partial-cloud datacenters, educate your IT support staff, develop an enterprise-wide security strategy, streamline IT administration, help with application development, and build and validate a DR/BC plan.
Branch Routers Outsourcing
Cisco has designed a full product line of routers that includes appliances built to provide the security, performance, and reliability required by customers from branch offices to global enterprises. Cisco routers feature support for redundancy, automatic failthrough, and redundant power for improved reliability and network availability. Progent can show you how to select and integrate Cisco routers to build a solid foundation for your IT system and to make it easy to expand as you add new users, open new offices, install new services, open your network to clients and partners, and support a more mobile workforce. Progent can provide expertise in a range of routers powered by Cisco's IOS platform, such as the Cisco 800 series of small business routers, Cisco 1800 and 2800 Integrated Services Routers, Cisco 2900 and 3900 G2 Integrated Services Routers, Cisco ASR 1000 and 9000 Aggregation Services Routers for wide area network edge environments, Cisco CRS Carrier Routing System for core Networks, plus older 2500 and 2700 Series Routers.
Sun Solaris Technical Consultant
Progent's Solaris platform support services offer small and mid-size companies and software developers assistance with administering and maintaining Sun Solaris environments that coexist with Microsoft-based technology. Progent offers your business access to Solaris consultants, support professionals certified by Microsoft and Cisco, and security experts with CISA and CISSP credentials. This wide array of experience provides you with an easy one-stop consulting firm to show you how to create and manage a secure and reliable cross-platform connectivity and communications infrastructure that supports Sun Solaris and Microsoft interoperability by combining Windows with popular variants of UNIX including Mac OS X, Solaris, AIX UNIX from IBM, HP-UX, Berkeley UNIX (BSD), SCO UNIX, and Silicon Graphics IRIX or major Linux derivatives such as RedHat, SUSE Linux, CentOS Linux, Ubuntu, PCLinuxOS, fedora Linux, Gentoo, Mandrake/Mandriva, Debian GNU/Linux, and Slackware Linux.
Information Technology Consulting for Cisco RADIUS Security
Progentís Cisco Security/VPN consultants and CCIE and CCNP certified experts can help your small or mid-size company deploy and support Ciscoís security and VPN products including routers, switches, firewalls, intrusion detection systems and VPN access concentrators. Cisco Virtual Private Network solutions include both remote access and site-to-site VPNs with Cisco IOS Software and AIM hardware encryption cards, and hardware appliances, such as a VPN concentrator, router, Cisco PIX Firewall, or task-specific VPN server for dial-up services. Cisco VPN solutions are easy to manage and offer the flexibility to expand with your growing business needs. Progentís Cisco-Certified network experts are familiar with Ciscoís comprehensive family of products targeted at preventing data theft, virus and worm assaults, Denial of Service attacks, and other threats to your network. Progent can show you how to deploy Cisco technology to achieve secure connectivity, intrusion protection, and comprehensive Identity services based on Cisco Access Control Server using RADIUS security and TACACS to create a centralized client access control foundation for user authentication, authorization, and accounting from an easy-to-use Web interface.
Microsoft Exchange Server 2016 Migration Support Outsourcing
Progent can help you in any and all phases of your upgrade to Microsoft Exchange 2016 including planning high availability architecture for a local, cloud-based or hybrid environment; server and CAL licensing compliance for Exchange 2016 and Windows Server 2012 R2+; migrating mailboxes; Hyper-V virtualization strategy; determining storage capacity required for your virtual machines (VMs), mailbox databases and log files; setting up hardware load balancing for high-availability CAS services; planning, configuring and testing Exchange Servers and Windows Servers and DAG groups; integration with SharePoint Server or SharePoint Online; updating your firewall; creating SSL certs; performing client remediation with Office desktop or Office 365; and configuring Outlook on the web (formerly Outlook Web App).