Additional Topics of Interest

Cybersecurity Consultancy Symantec VPN
Symantec Firewall Security Firms

Progent's Symantec consultants can assist you to maintain discontinued Symantec firewall and Symantec VPN products including the Raptor and Symantec VelociRaptor family or show you how to upgrade to current firewall solutions. Progent can also enable you to create and execute a comprehensive security plan that can incorporate firewall/VPN appliances and software, outsourced security and network defense services, server and application monitoring software, and formal policies and enforcement procedures. Progent has the expertise to be your single resource for continuing network support, maintenance, education, and security consulting.

Microsoft Operations Manager Specialist
Comprehensive Event Management Setup and Support

Medium-size companies can enjoy all the advantages of Microsoft System Center Operations Manager 2007 and have fast access to Progent's Microsoft and Cisco Premier Certified IT support professionals. With Progent's economically priced network support packages, mid-size organizations can select a simple co-sourcing package based on Microsoft Operations Manager with network monitoring, proactive warnings, comprehensive system analysis, Help Desk support, and remote troubleshooting. For businesses with line-of-business applications who need high availability networking, Progent offers a complete 24x7 outsourcing package. Progent supports Microsoft System Center Operations Manager to provide medium-size company information systems world-class availability, security and performance.

Configuration Cisco CCIE Online
Cisco CCIE Remote Setup Service

Progent's Cisco CCIE-certified network infrastructure experts have extensive experience assisting Internet Service Providers to architect, deploy, manage, tune, and troubleshoot high-availability, scalable network environments suitable for public networks.

Information Technology Consulting macOS Lion Networking
Consultants OS X Infrastructure

Progent's Mac support engineers can help you with a wide range of network foundation areas such as system architecture, remote and mobile access, internetwork communication, security, and emerging technologies such as VoIP and fast wireless connectivity. For company networks built exclusively on Mac OS X or for environments that use a mix of Mac, Linux and Windows powered servers and workstations, Progent has the knowledge and depth to deal with the challenge of designing, configuring, and maintaining a network architecture that is robust, safe, productive and supportive of your corporate goals. Progent can show you how to deploy Apple's Xserve enterprise servers, Xserve RAID non-stop storage systems, and Xsan SAN systems. Progent can also provide skilled experts to help you with Cisco routers and switches.

Duo Multi-factor Authentication Support and Integration
Online Troubleshooting Duo Two-factor Authentication (2FA)

Progent's Duo services incorporate Cisco's Duo cloud technology to defend against compromised passwords by using two-factor authentication. Duo enables one-tap identity confirmation with Apple iOS, Google Android, and other out-of-band devices.

ProSight Reporting Infrastructure Management On-site Support
Technical Support ProSight Reporting Network Infrastructure Management

ProSight Reporting is an expanding line of in-depth reporting tools created to integrate with the top ticketing and network monitoring applications such as ConnectWise Manage, ConnectWise Automate, Customer Thermometer, Auvik, and SentinelOne.

Setup and Support Colbolt Linux
Ubuntu Linux Consultants

Progent's Linux support experts provide small and mid-size companies and developers assistance with managing and maintaining Linux computers that coexist with Microsoft-based technology. Progent can give your organization contact with Linux experts, consulting professionals premier by Microsoft and Cisco, and security specialists with CISSP certification. This wide range of expertise provides you with an easy single consulting firm to show you how to build and maintain a protected and robust mixed-platform connectivity and communications infrastructure that supports Linux and Microsoft interoperability by combining Microsoft Windows with leading Linux derivatives such as RedHat Linux, SUSE Linux, CentOS, Ubuntu Linux, PCLinuxOS, fedora Linux, Gentoo, Mandrake, Debian-GNU, and Slackware.

Juniper Junos os Protecting
Security Tech Services Juniper Junos

Progent's Juniper-certified network consultants can help you to plan and deploy Juniper Firewall and VPN technology, optimize and troubleshoot your network infrastructure, and upgrade efficiently from outdated products to current releases. Progent's Junos OS engineers can provide expertise with Juniper's premier network control software to help you to streamline the administration and strengthen the protection of your Juniper VPN devices and routers. Progent also has broad experience maintaining Juniper's NetScreen OS and ScreenOS software productss and can assist you maintain environments that incorporate a mix of Juniper's OS platforms.

NotPetya ransomware recovery Consultant Services
Ryuk ransomware protection Consulting Services

Progent's ransomware consultants can help your business to assess your ransomware defenses, monitor and guard your IT environment, help with settlement negotiations with a hacker, and reconstruct an information system damaged by a ransomware cryptoworm like Ryuk, Maze, Sodinokibi, Netwalker, Snatch or Egregor.

Immediate Cybersecurity Inventory Consult
Professionals External Cybersecurity Inventory

Progent offers small businesses a pair of ultra-affordable network security inventory scanning packages that include, for a preset fee, remotely administered scans of your security profile which are analyzed by professional security specialists who interpret the data collected by the remote scan, present objective summaries of your current security vulnerability, and offer suggestions for enhancements. Progent has developed two non-overlapping network security evaluation scanning packages for external and internal security scanning that are priced to fit the budgetary realities of small businesses while delivering enterprise-class assessments of your IT network's vulnerability to assault.