Additional Topics of Interest

Iowa Support Organizations
New York Network Assessment

If your business does not need urgent online support but you think you will need technical services with your information system in the near future, you can save time and expenses and guarantee that the appropriate expertise will be ready when you need it by contacting a Progent sales specialist and registering as a client. For details, call 800-993-9400 or email information@progent.com.

Software Security Consultant Remote PC and Smartphone
Small Business IT Consulting Group Remote PC and Smartphone

Progent's remote access and smartphone synchronization specialists can assist you to plan and configure connectivity solutions for remote desktop PCs, laptops, and smartphones so they work seamlessly with your IT network, enabling you to improve the efficiency of your off-site workforce.

24-Hour Multi-factor Authentication Computer Consultants
Zero Trust Cybersecurity Network Consultants

Progent's Duo managed services utilize Cisco's Duo cloud technology to protect against password theft by using two-factor authentication. Duo supports one-tap identity verification with iOS, Google Android, and other out-of-band devices.

Penetration Testing Auditor
Cybersecurity Pen Testing Cybersecurity Firms

Stealth penetration checking is a key part of any overall IT system security plan. Progent's security experts can run thorough intrusion tests without the knowledge of your organization's in-house network support resources. Stealth penetration checking uncovers whether current security defense tools such as intrusion detection alerts and event history monitoring are properly set up and actively monitored. Progent can implement continuous automatic penetration testing to define your internal/external attack surface and to detect ways that vulnerabilities, improper configurations, compromised credentials, skipped patches, and unsound product defaults can be combined by threat actors into the multi-front attacks common to modern versions of ransomware.

McAfee Consultants
Symantec Compliance Audit

Progent provides companies of any size professional consulting for Intrusion Protection Systems and IPsec VPN solutions from leading firewall and VPN security vendors including Palo Alto Networks, WatchGuard, Juniper Networks, Fortinet, and SonicWall. Progent can show you how to create a comprehensive security strategy and choose the right products from a variety of vendors to support your security objectives while sticking within your budget limits.

Exchange 2016 Data Loss Prevention Network Consultants
Emergency Integration Support Exchange Server 2016

Progent can assist your business in any and all facets of your migration to Microsoft Exchange 2016 such as planning high availability (HA) system topology for a local, cloud-based or hybrid deployment; CAL licensing requirements for Exchange Server and Windows Server 2012 R2 or later; moving mailboxes; Hyper-V design; determining mass storage capacity required for your VMs, mailbox databases and logs; setting up hardware load balancing (HLB) for fault-tolerant client access services; planning, setting up and validating Exchange Servers and Windows Servers and Database Availability Groups (DAGs); setting up collaboration with SharePoint; preparing the firewall; resolving SSL issues; providing client remediation with Office desktop or Microsoft 365; and setting up Outlook on the web.

Emergency .NET MAUI Programming
.NET macOS Development Group

Progent's software developers have worked for two decades with .NET technologies and the Visual Studio development system and can create or modernize .NET apps rapidly and affordably.

Cisco Virtual Private Network Online Troubleshooting
24-Hour Cisco Virtual Private Network Information Technology Consulting

Progent's Cisco Security/VPN professionals and CCIE and CCNP certified experts can help your small or medium sized company deploy and support Cisco's security and VPN technology including routers, switches, firewalls, intrusion detection systems and VPN access concentrators. Cisco VPN products include both off-site access and site-to-site VPNs with Cisco IOS Software and AIM hardware encryption cards, and hardware devices, such as a VPN concentrator, router, Cisco PIX Firewall, or dedicated VPN server for dial-up services. Cisco VPN solutions are easy to administer and provide the flexibility to expand with your growing business needs. Progent's Cisco-Premier network experts are familiar with Cisco's comprehensive family of products targeted at eliminating data pilfering, virus and worm assaults, DDoS attacks, and other security risks to your network. Progent can show you how to deploy Cisco products to achieve safe access, intrusion protection, and comprehensive Identity services based on Cisco ACS using RADIUS security and TACACS to establish a central user access control foundation for user authentication, permissions, and accounting from an easy-to-use Web interface.

Microsoft System Center 2016 Integration
System Center 2016 and Linux Integration Support

System Center 2016 provides important improvements in the management of hybrid cloud environments through comprehensive support for Windows Server 2016, Windows 10; unified management of heterogeneous environments that include various Linux distributions, Hyper-V and VMware vSphere; and better cloud support such as closer integration with Intune for iPhone and Google Android smartphone administration plus native integration with Operations Management Suite (OSM) for cloud-enhanced analytics. Progent's Microsoft-certified consulting team can provide world-class online and on-premises expertise for all components of System Center 2016 including Operations Manager (SCOM), Configuration Manager (SCCM), Virtual Machine Manager (SCVMM), Data Protection Manager, Orchestrator, and Service Manager (SCSM). Progent can assist your business to plan and configure a new deployment of Microsoft System Center 2016, extend or optimize an existing one, migrate efficiently from a previous version of System Center, or troubleshoot your System Center solution.

Solaris Remote Engineers
Solaris Remote Consult

Progent offers nationwide urgent phone support and consulting services for companies that operate UNIX or Linux networks or whose IT systems feature a combination of UNIX and Microsoft technology. Remote technical support provides optimum leverage for your IT dollar by extending client efficiency and limiting the time billed for network repair services. Advanced remote support technology and skilled technicians and engineers combine to enable Progent to handle the majority of network problems without squandering time and money by going to your site. In the vast majority of cases your IT issues can be dealt with over the phone or via a mix of telephone support and online connectivity. Progent can make available Cisco CCIE infrastructure engineers and CISA and CISM certified security professionals to assist you with the most difficult network issues.

ProSight Ransomware Recovery IT Consulting
Endpoint Virus Immunization Help and Support

Progent's ProSight Active Security Monitoring is an endpoint protection service that incorporates next generation behavior-based machine learning technology from SentinelOne to guard endpoint devices and physical and virtual servers against modern malware assaults such as ransomware and email phishing, which easily evade legacy signature-based anti-virus products. ProSight ASM safeguards on-premises and cloud resources and offers a single platform to automate the entire threat lifecycle including blocking, identification, mitigation, cleanup, and post-attack forensics. Top features include single-click rollback using Windows VSS and automatic system-wide immunization against newly discovered threats.

Windows, UNIX, Solaris Consulting
Solaris with Windows Consultant Services

Progent's UNIX family support services offer small companies and developers assistance with managing and supporting UNIX, Linux or Solaris environments that coexist with Microsoft-powered networks. Progent can give your organization access to UNIX experts, consulting professionals certified by Microsoft and Cisco, and security specialists with CISSP certification. This broad range of expertise offers you a convenient one-stop consulting firm to help you build and manage a secure and robust cross-platform network and communications environment that allows UNIX and Microsoft coexistence by integrating Windows with popular versions of UNIX including macOS and OS X, Solaris, IBM AIX, HP-UX, BSD, SCO and SGI/Irix or major Linux platforms such as RedHat, SuSE, Mandrake, Debian-GNU and Slackware.

Microsoft Certified Expert Exchange 2016 Office integration Support Outsourcing
Computer Consultants Exchange Server 2016

Progent can help you in any and all phases of your upgrade to Exchange 2016 including planning HA architecture for a local, Microsoft cloud connected or hybrid environment; server and CAL licensing requirements for Exchange and Windows Server 2012 R2 or later; moving mailboxes; Hyper-V design; determining storage requirements for your VMs, mailbox databases and logs; setting up hardware load balancing for fault-tolerant CAS services; designing, configuring and testing Exchange Servers and Windows Servers and Database Availability Groups (DAGs); setting up collaboration with SharePoint Server or SharePoint Online; updating your firewall; creating SSL certs; providing client remediation with Office 2010 or greater or Microsoft 365; and setting up Outlook on the web (formerly Outlook Web App).