ProSight Email Guard Spam and Content Filtering ConsultingProSight Email Guard from Progent uses the services and infrastructure of leading data security companies to provide centralized management and comprehensive protection for all your inbound and outbound email. The hybrid architecture of ProSight Email Guard combines a Cloud Protection Layer with an on-premises security gateway appliance to deliver world-class defense against spam, viruses, spoofing, phishing, spyware, Denial of Service (DoS) attacks, Directory Harvest Attacks (DHAs), and other email-borne threats.

ProSight Email Guard's Cloud Protection Layer acts as a first line of defense and keeps the vast majority of threats from reaching your security perimeter. This reduces your vulnerability to external attacks and conserves system resources. Email Guard's on-premises security gateway provides a deeper layer of inspection for inbound email. For outbound email, the local security gateway offers anti-virus and anti-spam filtering, policy-based Data Loss Prevention (DLP), Data Leakage Protection, Content Filtering and outbound email encryption. The local email security gateway can also manage your Exchange Server deployment to monitor and protect internal email traffic that never reaches your security gateway.

ProSight Email Guard works with any email platform and offers enhanced features for Exchange Server.

The architecture of the ProSight Email Guard solution includes four main components that stand between the Internet and the email server at your data center:

  • Update Center
  • Cloud Protection Layer
  • Email Guard Security Gateway Appliance
  • Message Center
Email Guard's Architecture

ProSight Email Guard's hybrid architecture provides comprehensive protection for inbound and outbound email traffic

Update Center
The Update Center is a technology center staffed 24x7x365 by security experts who gather emails, URLs, binaries and other data collected from thousands of collection points worldwide, aggregate and analyze this information, and develop defenses, rules and signatures to update ProSight Email Guard's defense mechanism in order to provide zero-hour protection against the latest email-borne threats. Advanced filtering techniques and heuristic rules analysis used by the Update Center include reputation analysis, intent analysis, and predictive sender profiling. The result is a spam and virus filtering solution that blocks a very high percentage of threats yet delivers a very low number of false positives.

Cloud Protection Layer
The Cloud Protection Layer, which is kept current by the Update Center, provides spam and virus prefiltering using advanced technologies that include anti-fraud intelligence and blocking polymorphic viruses that can change their signatures to escape detection. Made up of multiple hardened datacenters worldwide, the Cloud Protection Layer has the capacity to handle Denial of Service attacks as well as email surges that occur during specific periods of the day. Because this cloud-based service stands between the Internet and the Email Guard security gateway, the majority of malicious email can be eliminated before it reaches your security perimeter. To help with disaster recovery and email continuity, the Cloud Protection Layer offers spooling. If your on-premises data center is disrupted, the spooling feature can store all inbound email in the cloud for up to 96 hours or direct it to an alternate destination while you repair the problem.

ProSight Email Guard Security Gateway Hardware Appliance
The ProSight Email Guard Security Gateway is a physical rack-mountable appliance that provides comprehensive protection for inbound, outbound and internal email. The gateway is automatically updated in real time by the Update Center without requiring management intervention. One of the gateway's deep inspection features is a multi-pass OCR engine that protects against image spam, where text is embedded within a graphic in order to hide content from spam filters. Another feature for filtering inbound email is link protection, which automatically evaluates and rewrites fraudulent URLs contained in a message. A plug-in agent for Microsoft Exchange Server offers virus protection for internal email traffic that does not access the gateway, for example emails from Outlook Web Access.

The ProSight Email Guard Security Gateway offers Data Loss Prevention (DLP) by allowing administrators to enforce content policies for outbound email in order to keep sensitive corporate information from being inadvertently leaked. The gateway can also be configured to block invalid bounce messages, which are outbound non-delivery reports to forged email addresses. In addition, the gateway offers a variety of encryption features for outbound email and supports inbound and outbound rate control. The Email Guard Security Gateway is available in several models to match your capacity requirements and security needs and can be clustered for higher performance and availability.

Message Center
The Message Center is a cloud-based service for encrypting outbound email. Emails that match policy are sent securely from the Email Guard Security Gateway to the Message Center. At the Message Center, the sender's email is encrypted using Advanced Encryption Service with a 256-bit cipher (AES-256) and stored for retrieval. The Message Centers sends the recipient a notification that includes a link to visit in order to retrieve the message. The link requires a web browser using HTTPS. The recipient selects a password and the Message Center delivers the encrypted message.

Email Guard's Outbound Encryption

The recipient only needs to establish a password for the first encrypted email received from the message center. Any replies are also sent via the Message Center to maintain security. Encryption key management is handled automatically by the Message Center, and the keys used to encrypt the data are stored in separate areas to provide physical security. Email traffic between the Email Guard Security Gateway and the Message Center and between the Message Center and the recipient are encrypted via SMTP over TLS.

In addition to policy-based encryption, Email Guard also provides an add-in for Microsoft Exchange Server that allows users to specify encryption from within Outlook.

Management Features
The ProSight Email Guard security gateway is integrated with a web-based management portal that provides a simple, centralized interface for viewing and managing all devices, services, policies and configurations. The cloud management tool offers global, domain-level, and individual user policy control. User-level policy management includes block lists, allow lists, quarantining, scoring thresholds, tagging and Bayesian analysis. At the domain level, you can manage policy for inbound and outbound quarantines, outbound encryption, plus block and allow lists based on IP address or sender/recipient email address or domain. Other management features include reports, graphs, statistics; recipient validation via LDAP; support for multiple domains; and delegated domain administration and help desk role.

Download the ProSight Email Guard Datasheet
To view the ProSight Email Guard datasheet, click: ProSight Email Guard Cloud-managed Services Datasheet (94 Kb PDF file).

Other Managed Services Available from Progent
In addition to ProSight Email Guard, Progent offers other affordably-priced ProSight managed service packages that address key components of your information system such as security, backup/recovery, virtual server hosting, IT documentation management, and network infrastructure management. By partnering with leading technology innovators, Progent can offer small and mid-size businesses the benefits of the same advanced technology used by global enterprises. Managed services available from Progent include:

  • ProSight Active Security Monitoring: Endpoint Protection and Ransomware Defense
    ProSight Active Security Monitoring (ASM) is an endpoint protection (EPP) service that utilizes cutting edge behavior analysis technology to defend physical and virtual endpoint devices against modern malware assaults like ransomware and file-less exploits, which routinely get by traditional signature-matching AV tools. ProSight ASM safeguards local and cloud-based resources and offers a unified platform to manage the complete malware attack lifecycle including protection, detection, containment, cleanup, and forensics. Key capabilities include one-click rollback with Windows Volume Shadow Copy Service and automatic system-wide immunization against newly discovered threats. Read more about Progent's ProSight Active Security Monitoring next-generation endpoint protection and ransomware defense.

  • ProSight Enhanced Security Protection: Endpoint Protection and Exchange Email Filtering
    ProSight Enhanced Security Protection (ESP) managed services offer affordable multi-layer protection for physical and virtual servers, desktops, smartphones, and Exchange Server. ProSight ESP uses contextual security and modern behavior analysis for continuously monitoring and reacting to cyber assaults from all attack vectors. ProSight ESP offers two-way firewall protection, intrusion alarms, device control, and web filtering through leading-edge technologies incorporated within a single agent managed from a unified console. Progent's security and virtualization experts can help your business to design and implement a ProSight ESP environment that addresses your organization's specific needs and that allows you prove compliance with legal and industry information security regulations. Progent will help you specify and configure policies that ProSight ESP will manage, and Progent will monitor your network and react to alarms that require immediate action. Progent's consultants can also help your company to install and verify a backup and disaster recovery system such as ProSight Data Protection Services so you can get back in business quickly from a potentially disastrous cyber attack such as ransomware. Learn more about Progent's ProSight Enhanced Security Protection (ESP) unified physical and virtual endpoint protection and Exchange filtering.

  • ProSight Data Protection Services: Managed Backup and Recovery
    ProSight Data Protection Services provide small and mid-sized organizations an affordable and fully managed solution for secure backup/disaster recovery (BDR). Available at a fixed monthly cost, ProSight Data Protection Services automates your backup activities and allows fast restoration of vital data, apps and virtual machines that have become lost or damaged as a result of component failures, software bugs, disasters, human mistakes, or malware attacks such as ransomware. ProSight Data Protection Services can help you back up, retrieve and restore files, folders, applications, system images/, as well as Hyper-V and VMware virtual machine images/. Critical data can be protected on the cloud, to a local device, or mirrored to both. Progent's cloud backup specialists can deliver world-class support to configure ProSight DPS to be compliant with government and industry regulatory requirements like HIPPA, FIRPA, PCI and Safe Harbor and, when necessary, can help you to recover your business-critical information. Find out more about ProSight DPS Managed Backup.

  • ProSight WAN Watch: Infrastructure Management
    ProSight WAN Watch is an infrastructure monitoring and management service that makes it easy and affordable for smaller organizations to map out, monitor, optimize and troubleshoot their networking appliances such as switches, firewalls, and load balancers as well as servers, client computers and other devices. Using state-of-the-art Remote Monitoring and Management technology, WAN Watch makes sure that network maps are always updated, copies and manages the configuration of almost all devices on your network, tracks performance, and generates notices when issues are detected. By automating time-consuming management and troubleshooting activities, WAN Watch can knock hours off ordinary chores such as making network diagrams, expanding your network, finding appliances that require critical software patches, or isolating performance bottlenecks. Find out more details about ProSight WAN Watch infrastructure monitoring and management services.

  • ProSight LAN Watch: Server and Desktop Remote Monitoring
    ProSight LAN Watch is Progent’s server and desktop monitoring managed service that incorporates state-of-the-art remote monitoring and management (RMM) techniques to help keep your network operating efficiently by checking the state of critical computers that power your information system. When ProSight LAN Watch uncovers an issue, an alert is transmitted immediately to your specified IT management staff and your assigned Progent engineering consultant so any potential issues can be addressed before they have a chance to disrupt your network. Learn more details about ProSight LAN Watch server and desktop monitoring services.

  • ProSight Virtual Hosting: Hosted Virtual Machines at Progent's Tier III Data Center
    With Progent's ProSight Virtual Hosting service, a small or mid-size organization can have its critical servers and apps hosted in a protected Tier III data center on a high-performance virtual machine host configured and managed by Progent's IT support professionals. With Progent's ProSight Virtual Hosting model, the client retains ownership of the data, the OS platforms, and the apps. Since the system is virtualized, it can be moved immediately to a different hardware solution without requiring a time-consuming and technically risky configuration procedure. With ProSight Virtual Hosting, your business is not locked into a single hosting provider. Learn more details about ProSight Virtual Hosting services.

  • ProSight IT Asset Management: Network Documentation Management
    Progent's ProSight IT Asset Management service is an IT infrastructure documentation management service that allows you to capture, maintain, retrieve and safeguard information related to your IT infrastructure, procedures, applications, and services. You can quickly find passwords or IP addresses and be alerted about upcoming expirations of SSLs or warranties. By cleaning up and organizing your IT documentation, you can eliminate up to 50% of time thrown away searching for critical information about your IT network. ProSight IT Asset Management features a common location for holding and sharing all documents required for managing your network infrastructure like standard operating procedures (SOPs) and self-service instructions. ProSight IT Asset Management also offers a high level of automation for collecting and relating IT information. Whether you’re planning improvements, doing maintenance, or reacting to an emergency, ProSight IT Asset Management gets you the data you need when you need it. Find out more about Progent's ProSight IT Asset Management service.
Download Progent's 10 Benefits of Managed IT Services White Paper
To download a white paper explaining why managed services are rapidly replacing the old break/fix model of IT support for small and mid-size companies, click:
10 Benefits of Managed IT Services. (PDF - 710 KB)

ProSight Network Audits
Progent's ProSight Network Audits are a quick and affordable way for small and medium-size organizations to obtain an unbiased evaluation of the overall health of their IT system. Based on some of the top remote monitoring and management (RMM) tools available, and supervised by Progent's world-class team of IT experts, ProSight Network Audits show you how closely the configuration of your core infrastructure assets conform to best practices. Both the Basic and Advanced options for ProSight Network Audit services are offered at a low, one-time cost and provide instant ROI such as a more manageable Active Directory system. Both also come with one year of state-of-the-art remote network monitoring and management (RMM). Advantages can include simpler network management, improved compliance with government and industry security standards, more efficient utilization of network assets, quicker troubleshooting, more dependable backup and restore, and increased uptime. See more about Progent's ProSight Network Audits network infrastructure review.

The ProSight Ransomware Preparedness Report Service
The ProSight Ransomware Preparedness Report is an affordable service built around a phone interview with a Progent information assurance expert. The fact-finding interview is designed to assess your company's ability either to defend against ransomware or recover rapidly following an assault by a ransomware strain like Ryuk, WannaCry, MongoLock, or Hermes. Progent will work with you directly to collect information concerning your existing AV defense and backup system, and Progent will then produce a custom Basic Security and Best Practices Report document describing how you can apply best practices to deploy an efficient security and backup/recovery system that reduces your vulnerability to ransomware and aligns with your company's needs. For more information, see The ProSight Ransomware Preparedness Report.

Contact Progent for More Information about ProSight Email Guard Security Gateway Services
If you are interested in using Progent's ProSight Email Guard security gateway or need help with any aspect of email infrastructure or security, call 800-993-9400 or visit Contact Progent.

Glossary of Terms Related to Spam Filtering Technology

Term Definition

AES-256

The Advanced Encryption Standard (AES) is a cyber security specification adopted by the National Institute of Standards and Technology (NIST). AES-256 offers the highest level of encryption available within the AES family.

Allow List

Also called a whitelist, contains email addresses or domain names that are exempted from being blocked by a spam filter.

Anti-fraud Intelligence

Linguistic analysis to protect against fraudulent emails, which can take the form of spear phishing, spoofing, fee frauds or bogus offers of help.

Bayesian Analysis

A linguistic algorithm that develops profiles of the words and phrases used in legitimate email collected from specific users or organizations and determines whether new email from these sources fit their linguistic profile. Emails that are out of character have a higher likelihood of being spam.

Block List

Also called a blacklist, contains email addresses or domain names that are to be blocked by a spam filter.

Content Filtering

Most commonly refers to the ability to block or whitelist websites based on category, reputation, use of encryption, specified URL or other characteristics. In the context of ProSight Email Guard, content filtering refers to the ability to block, allow or quarantine an email message based on the results of scanning specified components of the message including subject, headers, body, attachments, sender, and recipient. (See Content Policies.)

Content Policies

Content policies allow administrators to define email filtering based on any combination of subject, headers, body, attachments, sender, or recipient. For example, specified keywords, categories or character sets can be automatically detected and blocked. Based on content policy, administrators can configure their email security gateway to block, allow or quarantine inbound or outbound email and to encrypt outbound email. Careful management of content policies can keep an organization from being blacklisted as a source of spam and other malware.

Data Leakage Protection

Often used as an alternative to data loss prevention (DLP), but can imply that compromised data retains its availability to authorized users and keeps its integrity. (See Data Loss Prevention.)

Data Loss Prevention (DLP)

Data loss prevention (DLP) for email entails scanning the content of email messages and attachments and blocking the transmission of sensitive information. DLP allows administrators to establish and enforce policies that block or encrypt outbound email that could carry inappropriate information. DLP features included in ProSight Email Guard can also help organizations avoid reputation loss and stay in compliance with industry security standards and government regulations such as HIPAA and Sarbanes-Oxley.

Delegated Administration

With ProSight Email Guard, control of domain-level settings can be assigned to the Domain Admin role, which has the most permissions, the Helpdesk role, with fewer permissions, or the Governance, Risk Management and Compliance (GRC) Account role, which has a specific role with limited permissions. The User role allows users to view and manage their own account and their quarantine inbox and related settings. Delegation significantly reduces the burden of email administration by safely offloading certain management responsibilities.

Denial of Service (DoS) Attack

An attack designed to bring down a network by flooding it with useless traffic. DDOS (Distributed Denial of Service) is an attack by multiple systems, often compromised by a Trojan, on a single system.

Directory Harvest Attack (DHA)

Scripted attempts designed to steal directory information from unprotected email servers. Spammers send messages with a generic address to your SMTP mail server. For example, spammers will try sending “ed@acme.com,” “sue@acme.com” or other names until the server recognizes a name and accepts a message. Spammers combine dictionaries of common names and tabulate which addresses work and which do not. The technique can yield an overwhelming number of delivery requests, consuming server processing power. Spammers then sell the compiled list of valid email addresses to other spammers, resulting in spam for new and unused accounts.

False Positive

A valid email incorrectly identified as spam. Without any tuning, ProSight Email Guard has a false positive rate of 0.01 percent, one of the lowest in the industry.

Hardened Datacenter

Highly secure, fault-tolerant facilities housing IT equipment connected to telecommunications networks. The facilities accommodate web servers, email servers, switches, routers, mass storage and other critical equipment and feature redundancy, backup power, and physical security. Cloud-based infrastructure can combine multiple hardened datacenters in separate geographic regions for high availability and disaster recovery.

Heuristic Rules Analysis

A branch of artificial intelligence whereby expert systems use programs that are self-learning and improve with experience. With spam filtering, the more messages processed the better the results.

HTTPS

The use of Secure Socket Layer (SSL) or Transport Layer Security (TLS) under standard HTTP layering to provide secure web access through encryption.

Image Spam

Image spam, which at one point represented around one third of all Internet traffic, is a technique that hides text, typically a URL, by embedding it within an image. ProSight Email Guard uses an Optical Character Reader (OCR) engine to detect this threat. The Update Center also maintains Internet traps known as "honeypots" to build blacklists of image spam senders.

Intent Analysis

Multi-level analysis that recursively follows web links, email addresses and phone numbers embedded in email messages to determine whether they are associated with legitimate entities. Intent analysis also analyzes domain attributes to profile email campaigns.

Key Management

Email encryption requires the sender and recipient to exchange their encryption keys before sending or receiving protected emails. Key management is complex and includes the creation, distribution, safe storage, exchange and use of encryption keys. ProSight Email Guard's cloud-based solution for email encryption stores keys centrally and manages them automatically without burdening administrators or users.

LDAP

The Lightweight Directory Access Protocol (LDAP) is an open, industry-standard application protocol for accessing and maintaining distributed directory information services over an IP network. ProSight Email Guard's Exchange Accelerator/LDAP Verification feature uses the LDAP support built into Microsoft Exchange to protect against dictionary attacks, which attempt to break into a system by trying every word in a hacker's "dictionary" of possible passwords.

Link Protection

ProSight Email Guard's Link Protection, when activated, automatically rewrites any URL embedded within an inbound email and directs it to a safe URL before delivering the email. If the recipient clicks on the embedded URL, ProSight Email Guard evaluates the link for validity and reputation. If the domain appears to be valid, the user is directed to that website. If the URL is suspicious, the user is directed to a warning page which shows the actual link and explains why the URL was blocked.

OCR Engine

Embedding text in images/ is an established technique used by spammers to avoid detection by the text processing mechanisms in anti-spam engines. An optical character recognition (OCR) engine allows a spam filter to analyze the text rendered inside an image. Before submitting images/ to the OCR engine, ProSight Email Guard uses a variety of image processing technologies to normalize images/ whose text has been obfuscated with speckling, shading or color manipulation. The Update Center also uses advanced image processing algorithms to create fingerprints that can be used to block messages containing image spam.

Phishing

A scam that usually involves a fraudulent email purporting to come from a legitimate sender such as a bank and that either contains links to a spoofed website or else tries to talk the recipient into disclosing private information such as a password or social security number. ProSight Email Guard detects Phishing scams by using a specialized Bayesian database. Attacks that include information that suggests familiarity or friendship with the recipient are known as Spear Phishing and account for about 91% of email attacks.

Polymorphic Viruses

A virus that self encrypts by changing its signature to avoid detection by simple virus scanners. ProSight Email Guard relies on a supercomputing grid that uses a partial checksum approach to identify the unchanged signature portions of a virus body.

Predictive Sender Profiling

Identifying suspicious behaviors from sources who currently have clean reputations, for example newly infected bots on otherwise legitimate computers.

Quarantining

A quarantined email can be sent to an individual quarantine inbox assigned to the recipient or to a global quarantine mailbox designated by the administrator. Individuals can have quarantine accounts on the ProSight Email Guard security gateway, which takes the load off the email server, or on their regular mailbox. In this case, ProSight Email Guard alters the subject text of quarantined messages to show that the message could be spam.

Rate Control

The ability to pace inbound or outbound email from a single IP address or email address based on pre-configured frequency thresholds. Delivery of messages from sources that exceed the threshold is delayed in order to stabilize system performance.

Reputation Analysis

The use of databases that include the IP of addresses for known spammers, safe email senders, and web addresses known to be associated with spam. Email from IP addresses with poor reputations or whose content includes web addresses with poor reputations can be identified and handled according to spam policies.

Scoring Thresholds

After an email passes through the ProSight Email Guard security gateway it is given a score ranging from 1 to 10 representing the likelihood that the message is spam. The administrator can use scoring thresholds to automate how messages are managed by choosing to allow, tag, quarantine or block emails depending on their score.

Security Perimeter

The outermost edge, such as a firewall or security gateway, over which the enterprise has control over an email message before the message is received from or passed to the Internet.

Signatures

Also called a fingerprint, a series of bytes within a virus that uniquely identifies it and that can be searched for by anti-virus filters.

Spam

Unsolicited and unwanted email usually sent in bulk as part of marketing campaigns but sometimes sent with malicious intent.

Spoofing

A phishing technique whereby an attacker uses an IP address that appears to come from a trusted host. One of the most notorious examples is the exploit from service@aol.com. Spoofing attacks often include links to a fraudulent, or spoofed, web site that impersonates a familiar web site.

Spooling

A disaster recovery feature whereby incoming email is stored temporarily in the cloud or redirected in the event that your on-premises data center is disrupted. ProSight Email Guard's Cloud Protection Layer can store all your inbound email for up to four days or direct it to an alternative destination if your email server becomes unavailable. Meanwhile, Progent can provide expert online or onsite support to bring your local system back into service quickly.

Spyware

Software that collects and possibly shares information about a person without specified consent. Common forms of spyware include cookies, adware and Trojans. The collected information is typically used for marketing, but can also be used more maliciously. Major corporations (e.g., Facebook) use spyware routinely and legally. ProSight Email Guard includes technology that provides real-time protection from malicious spyware attacks.

SMTP

Short for Simple Mail Transfer Protocol, a protocol for sending email messages between servers. SMTP email servers are a common target of Directory Harvest Attacks.

Tagging

A technique for helping users to identify filtered email that meets some criteria for being spam. Tagged emails are delivered with a customized label appended to the subject field, e.g., [BULK]. This allows users to make their own determination about how to deal with them.

TLS

The Transport Layer Security (TLS) encryption protocol allows secure communication over the Internet. The ProSight Email Guard security gateway supports SMTP over TLS to encrypt email traffic between sites over the Internet.

Viruses

Computer code that can replicate itself. Viruses are commonly spread via email and allow an attacker to steal or destroy data or take control of an infected system. Types of viruses include Trojans and worms.

Zero-hour Protection

The ability to develop and distribute defenses against newly discovered spam and viruses within minutes rather than days. The hybrid infrastructure of ProSight Email Guard is designed to provide this capability.

Also See:














© 2002-2019 Progent Corporation. All rights reserved.

More topics of interest:


An index of content::

Alexandria, Virginia Consulting Services Microsoft, Cisco and Security Certified Experts Alexandria, VA Consulting Services Firm
Exchange 2010 MailTips Engineer
Exchange 2010 OWA Configuration Delaware

Progent's Microsoft-certified consultants can provide low-cost remote and onsite support to implement your migration to Microsoft Exchange 2010, produce thorough documentation of your new email system, educate your network support team and users to get them ramped up rapidly on Microsoft Exchange Server 2010, and provide continuing management services and technical support. Progent can also help you migrate from Microsoft Exchange Server 2010 to Exchange 2013 or Exchange Server 2016.

Baltimore, Maryland Information Technology Outsource Baltimore Software Consulting Firm
BlackBerry BES Software Recovery BlackBerry Redirector Network Support Consultant in Las Vegas, NV
BlackBerry Email Consulting Team Fresno, CA BlackBerry Desktop Manager Security Consulting Companies
BlackBerry Synchronization Tech Outsourcing Small Business Network Consulting Services for BlackBerry Enterprise Server
CISSP Intrusion Detection Network Security Test Virginia Beach
CISSP Security Organization Firewall Secure in Grand Rapids Michigan
Cisco CCIE Support Telecommute Job CISA Engineer Employment Opportunities
SCCM 2007 Troubleshooting Network Consultant
Largest SCCM 2007 Asset Management Computer Consulting San Rafael, California

Progent can help your business to support Microsoft System Center 2007 Configuration Manager (SCCM 2007) to streamline operations, enhance compliance, and boost productivity by making sure that operating systems and applications stay current, tracking licensing, and monitoring usage patterns to help you make informed purchasing decisions. Once your organization is set to update your SCCM 2007 configuration management solution, Progent can assist you to prepare for and carry out an efficient migration to SCCM 2012.

Cisco IT Outsourcing Firm for Houston, TX Houston, TX Technical Services
Cisco Small Office IT Consultant Cisco Small Office IT Support Kansas City, MO, Saint Louis, MO, Springfield, MO, Independence, MO
Windows Server Hyper-V 2016 Hybrid Cloud Online Technical Support
Microsoft Certified Hyper-V 2016 Failover Clusters Computer Engineer

Windows Hyper-V 2016 utilizes core features first designed for and proven on Azure, among the world's biggest public clouds. This significantly enhances the ability of Microsoft's Windows Server platform to run private cloud as well as hybrid cloud/on-premises deployment models by enhancing security, availability, expandability, manageability, dependability and disaster recovery. Progent’s Microsoft-certified consulting team can assist you to evaluate the advantages of Hyper-V 2016 for your organization, configure test systems to verify the ability of Hyper-V 2016 to run your critical applications, plan a cost-effective network topology for a cloud-centric or hybrid installation, create and execute a non-disruptive upgrade plan, educate your IT administration and support personnel, and provide as-needed consulting and debugging services to make sure that your Hyper-V 2016 investment gives you the highest possible business value.

Cisco and Microsoft Certified Expert Ontario Support Specialist Outsourcing Technical Support
IT Consultants for Windows, Linux, UNIX, Solaris
Corpus Christi, TX Linux, Windows Services

If your business computer system mixes Linux technology platforms with MS Windows, Progent can help you to integrate your computers into a unified network that permits all your OS platforms to run side by side for easy administration, seamless dataflow, high reliability, superior performance, and strong protection. Progent's Linux and Microsoft Windows integration support services feature IT infrastructure configuration and service, consulting for Microsoft Windows services for UNIX (SFU), online network monitoring and administration, online network support and troubleshooting, on-site technical support, and Help Desk Call Center outsourcing.

Citrix NetScaler Online Consulting desktop and application virtualization Consult
Windows 2000 Support Services
Windows Server 2000 Upgrade Consulting in Jackson, MO

Progent's certified Windows Server 2000 experts offer network support and information technology consulting services for the entire line of .NET Enterprise Servers, Windows 2000 Server, and Windows Server 2003. Progent's Microsoft Windows Server 2000 configuration, update, and support services include system planning, installation, documentation, on-site and remote support, Help Desk outsourcing, expert security analysis, turn-key outsourcing, and economical co-sourcing.

Cleveland, Ohio Technology Consulting Cleveland, Ohio Computer Service
IT Specialists for Illinois
Microsoft and Cisco Utah Help Center

Progent’s Technical Response Center (TRC) offers nationwide extended hours remote assistance for networks powered by Windows and Cisco products and technologies. Progent's Microsoft and Cisco-qualified service professionals provide after-hours phone help and online secure computer connection to troubleshoot and resolve technical problems quickly and affordably. The scope of IT expertise available from Progent's staff of nationwide support professionals makes it possible to escalate even the most difficult network issues to competent experts as required. For critical problems, the TRC tries to respond to your request for support within one hour.

Cloud-managed Email Security Engineer Sacramento, California Support Outsourcing for Data Center Colocation
Computer Consultancy Company for RIM BlackBerry BlackBerry Email Setup Consultancy Services Dallas Fort Worth Arlington
Computer Network Consultant for Anchorage, AK Microsoft Experts Anchorage, Alaska Network Services
Skype for Business Edge Server Pool Specialists
Consultancy for Skype for Business and Cisco UC Frisco, TX

Lync Server 2010 supports IM, Real Presence, audio and video conferencing, desktop collaboration, and both VoIP and traditional public switched telephone network calling. Lync 2010 can enhance the capability of Exchange Server, SharePoint and Office desktop or cloud-based Office 365 and streamlines administration through integration with Active Directory. Lync can also cut expenses by eliminating Voice-over-IP hardware and subscription fees, PBX gear, or conventional teleconferencing solutions. Progent's certified IM and Presence consultants offer remote and onsite support services to assist your company to maintain and troubleshoot your current Lync Server 2010 deployment or evaluate the benefits of upgrading from Lync to Skype for Business, which is the new release of the product. Progent can also assist your organization to plan and carry out a smooth Skype for Business upgrade.

Computer Outsourcing California San Jose Network Installations
Computer Specialist Network Specialists in Northern California
On-site Technical Support for Suse Linux
Integration in Edgecomb, ME

Progent's Linux support experts offer small companies and developers support for managing and maintaining Linux systems that coexist with Microsoft-powered technology. Progent offers your business access to Linux consultants, support professionals certified by Microsoft and Cisco, and security experts with CISA and CISSP credentials. This broad array of expertise offers you a convenient one-stop source to show you how to build and maintain a secure and robust mixed-platform connectivity and communications solution that allows Linux and Microsoft coexistence by combining MS Windows with leading Linux derivatives including RedHat Linux, SUSE, CentOS Linux, Ubuntu Linux, PCLOS, fedora Linux, Gentoo Linux, Mandrake, Debian-GNU, and Slackware Linux.

Contractor for Newark, New Jersey Newark IT Outsourcing
Web Application Security Assessment Services
Technology Professional for Computer Security Vulnerability Evaluation Baltimore, MD

Progent has created several network security service bundles intended to deliver larger institutions an objective and comprehensive security evaluation from a team of certified security consultants. All Progent's security assessment bundles incorporate a collection of services like network scans from inside and from outside your corporate firewall, professional interpretation of scanned data by accredited security consultants, creation of a paper explaining the results, plus a live high-level executive outbrief and a detailed interactive review for in-house IT managers.

Email Black Lists Consult in Oklahoma Independent CISSP Consulting Services
Email Outbound Content Filtering Specialists in Colorado Springs Local Slackware Linux, Sun Solaris, UNIX Network Consultant in Orange County Southern California
Email Predictive Sender Profiling Consult Albuquerque, NM Cisco Information Technology Consulting Firm in Newark, Essex County
Anti-Spam Reseller
Help and Support for Anti-Virus in San Antonio, TX

E-Mail Guard represents a complete service for defending against spam and virus attacks. E-Mail Guard addresses the security and administration of company email by providing continually improved spam and virus blocking, policy management, content testing, and defense against email-based DHA and denial of service attacks. E-Mail Guard also features monitoring, administration and reporting utilities plus outbound email filtering to help you fix your email system and define and regulate company security policy.

Email Scoring Thresholds Specialists Remote New York City, NY Network Engineers
Microsoft Windows 7 Consultancy
Windows 7 Consultant Services in Fort Worth, TX

Progent's Microsoft certified consultants offers offsite and onsite support expertise to help you to administer, support, and troubleshoot computers powered by Microsoft Windows 7 and can also provide help with upgrading to Windows 8.1 or Windows 10 from Windows 7. Progent can provide support for management automation, network security, disaster recovery, remote access, smartphone and tablet management, Wi-Fi configuration, and remote network monitoring.

Engineer in South Dakota Microsoft and Cisco Authorized Expert Southlake, Texas Computer Consultation
Tandberg T3 Telepresence Consulting Services
Consult in Sacramento

Progent offers the support of a veteran specialist with years of experience installing, maintaining, and upgrading video conferencing platforms from leading vendors such as Cisco/TANDBERG, Polycom, and LifeSize. Progent can work with your internal IT support group, your Internet Service Provider, and your telepresence technology vendor to help your company increase the strategic value of your telepresence ecosystem.

Engineers for ProSight Email Guard Spam Filtering Riverside - Corona Online Help for Slackware Linux, Sun Solaris, UNIX
Full-Time Job for Computer Remote Engineer El Paso, Fort Bliss Microsoft MCTS Remote Consultant Telecommuting Jobs
Solaris-Windows Migration
Sun Solaris Upgrade Consultant San Francisco, California

Progent can help you to design and implement an efficient transition from a Sun Solaris-based IT environment to a network based on Windows and capable of running Microsoft's powerful office productivity software, business applications, and developer tools. Progent's Sun Solaris, Windows and Cisco consultants and software development experts can show you how to preserve your information and reduce productivity disruption by designing an effective transition plan that preserves your existing investments in Sun Solaris application and technology. UNIX-to-Windows transition support expertise offered by Progent include evaluation of current infrastructure, transition strategy and validation, MS Exchange migration expertise, data and application software porting, and server and media migration and consolidation.

Information Technology Outsource for Exchange 2007 Exchange 2010 Server Computer Network Support Firms in Los Angeles
Technical Consultant for Meraki 802.11ac AP
Meraki Dashboard Setup and Support

Progent's Cisco-Meraki Wi-Fi access point experts can help your organization to plan, configure, manage and debug Cisco's Meraki-based Wi-Fi networks for environments from a branch office to a large campus or a nationwide enterprise. Progent can also assist clients to incorporate other Cisco devices for unified management.

Integration Firm for Cisco Mt Vernon Consultancy Services Company
Stealth Penetration Testing Cybersecurity Group
Security Organization in Los Angeles

Stealth penetration testing is a key component of any comprehensive network security plan. Progent’s security professionals can perform thorough intrusion tests without the awareness of your company's internal network support resources. Unannounced penetration checking shows whether existing security monitoring tools such as intrusion incident warnings and event history monitoring are properly configured and consistently observed.

Lawrence, Massachusetts Network Support Technician Lawrence, MA Tech Support
LifeSize 220 Series Telepresence Consultants Polycom RTX Telepresence Consult
Microsoft Certified Partner Computer Consulting for Exchange 2010 Upgrade
Oklahoma City, OK Network Consulting for Exchange 2010 SharePoint integration

Progent's Microsoft-certified consultants can deliver low-cost online and onsite help to implement your migration to Exchange Server 2010, generate extensive documentation of your new messaging system, educate your IT team and end users to get them ramped up quickly on Microsoft Exchange Server 2010, and offer continuing administrative consulting and technical help. Progent's consultants can also help you upgrade from Exchange 2010 to Exchange Server 2013 or Exchange 2016.

MS Certified Atlanta, Georgia Computer Network Specialist Atlanta, Georgia Manager
SCCM 2016 Central Administration Site Support and Integration
Tucson, AZ Microsoft Configuration Manager 2016 Remote Support Services

Configuration Manager 2016 automates software provisioning at scale, simplifies compliance settings control, inventories network resources, guards against corporate data leakage, performs network health monitoring, allows safe self service, and offers a common control mechanism for managing multi-operating system networks running on-premises, cloud, or hybrid deployment models. Progent's Microsoft-certified Configuration Manager 2016 consulting team and Microsoft Azure cloud integration specialists can assist businesses of any size with any aspect of planning, installing, operating and repairing a System Center 2016 Configuration Manager solution for on-premises, cloud, or hybrid networks.

Microsoft Dynamics GP Support and Help Microsoft GP/Great Plains Online Troubleshooting
Microsoft Exchange Small Business IT Outsourcing Services Microsoft Exchange 2016 Network Support Consulting Norfolk Chesapeake
Microsoft MCTS Consultant Contract Job Top Microsoft MCP Remote Support Employment Opportunities
Microsoft Office SharePoint Server 2010 Specialist Best SharePoint Server Computer Consulting
Microsoft SQL Server 2017 Information Technology Consulting Firm Microsoft SQL Server 2016 Installation



Progent's Microsoft-certified professionals can assist you to evaluate the business value of Windows Server 2012 R2 for your company, create pilot systems and migration plans, optimize your network infrastructure for on-premises, multi-site, cloud-based, and hybrid datacenters, train your IT support staff, develop a corporate-wide security plan, automate network management, help with creating applications, and generate and validate a DR/BC plan.

Microsoft SharePoint 2013 Support and Setup Microsoft SharePoint Server 2007 Computer Consultant in San Leandro
Security Scan Consultant Services
External Security Scan Consultant Sausalito, CA

Progent provides small organizations two ultra-affordable network security evaluation packages that include, at a set fee, remotely administered inventory scans of your network security profile which are analyzed by professional information security engineers who assess the results of the scan, present objective summaries of your current network security, and make recommendations for enhancements. Progent has developed two non-overlapping network security evaluation scanning packages for external and internal security scanning that are priced to fit the restricted budgets of small companies while providing enterprise-quality evaluations of your IT network's vulnerability to assault.

Microsoft and Cisco Authorized Expert New Orleans, Louisiana Information Technology Manager Louisiana Consulting Firms
PC Consulting for Iowa
Connecticut Support Outsourcing

If your organization does not require urgent online help but expects to need technical services with your information system soon, you can conserve time and money and guarantee that the right expertise will be available when you need it by getting in touch with a Progent sales agent and registering as a client. For details, call 800-993-9400 or send email to information@progent.com.

Migration Support Norfolk Migration Help
Milwaukee, WI, Madison, WI, Green Bay, WI, Kenosha, WI Network Support Technician Wisconsin Small Business IT Consulting
Technical Support for Antivirus
Installation support for Anti-Spam Virginia Beach, VA

E-Mail Guard is a complete service for defending against spam and virus attacks. E-Mail Guard addresses the security and administration of corporate email by offering continually improved spam and virus filtering, policy administration, content filtering, and defense against email-based DHA and denial of service attacks. E-Mail Guard also features monitoring, management and reporting tools as well as outgoing email testing to let you repair your e-mail system and specify and regulate company email policy.

Nagios Troubleshooting MRTG for Linux Consult
Networking Integration Consultants Online Troubleshooting for Small Business Network
Online Microsoft Office 365 Training Specialist
Pittsburgh Specialist for Online Acrobat Writer Training

Progent's webinars offer small companies the cost savings, simplicity, and versatility of virtual learning and the effective training techniques of expert teachers who use the latest collaboration software to emulate real-time, interactive learning environments. Progent can provide remote training for key desktop applications including components of Microsoft Office suite such as Office Excel, Word, Publisher, and Project: Microsoft Dynamics accounting and management information software such as Microsoft Dynamics GP; as well as other popular desktop applications such as Adobe Photoshop, Adobe Acrobat Writer, and Crystal Reports.

New Orleans, Louisiana Information Technology Outsourcing New Orleans Network Specialists
Oakland, CA ProSight Email Directory Harvest Protection Consulting Remote Consulting for SharePoint Server 2007 in Denver Colorado
Onsite Support for San Francisco SF Installation California
Private Cloud Hosting Consult
Virtual Server Private Cloud Hosting Consulting

Progent's Private Cloud Hosting and Management outsourcing provides comprehensive hosting of a small organization's servers in an environment that delivers the maximum level of availability and expandability and is also easy to transfer to another host. Progent's Private Cloud Hosting and Management services are based upon mature virtualization architectures that enable small and midsize businesses with mixed- platform environments to save dramatically on the costs of capital investments, infrastructure maintenance, and IT administration while achieving enterprise-class fault tolerance and an unprecedented level of vendor flexibility.

Oregon Onsite Technical Support Oregon Network Security Consulting
Outsourced IT Management Services Microsoft SQL Server 2017 IT Management
Outsourcing Technology for BlackBerry Wireless BlackBerry Wireless Networking Organization
Internet Security and Acceleration Server Online Support
Microsoft ISA Server Online Support San Francisco

Progent's certified ISA Server consultants have extensive experience with Internet Security and Acceleration Server developing Microsoft ISA Server-based security installations for IT networks with multiple offices, remote workers, and line-of-business web applications. Progent's Microsoft Firewall experts can help your small business in planning and implementing a configuration of ISA 2000 Server or ISA 2004 Server that supports your network security requirements without overly restricting your network productivity. Progent's consultants can help you migrate from Microsoft Proxy Server from Microsoft ISA 2000 to Microsoft ISA 2004 Enterprise Edition Server, ISA 2004 Standard Edition Server, or any later versions of Internet Security and Acceleration Server.

Pacifica Small Business Network Consulting Firm Pacifica Administration in Northern California
Migration Consulting for Exchange 2000
Microsoft Exchange 2000 Upgrade On-site Technical Support in Denver, CO

Years of experience with Microsoft's Exchange products makes Progent one of the most qualified computer support firms in California for integrating messaging solutions powered by Microsoft Exchange Server 2000. Progent is skilled in helping small companies get the full advantages of Exchange Server under typical scenarios such as updating from Microsoft Exchange 5.5 Server, moving from an ISP-based or POP3 Email system, and outsourcing your Microsoft Exchange Server administration.

Part Time Job CISA Consultant Employment Western New York Rochester
ProSight Email Guard Spam Filtering Consultant Services Bay Area, Northern California Cisco Colorado Small Office Computer Consultant
SCCM Mobile Device Management Online Support Services
SCCM Distribution Point Specialist in Yonkers, NY

System Center Configuration Manager automates software provisioning and updating, simplifies security and compliance settings management, inventories network assets, protects against corporate data leakage, performs health monitoring, allows safe end-user self service, and offers a single control mechanism for managing multi-OS ecosystems based on on-premises, cloud, or hybrid deployment models. Progent's Microsoft-certified Configuration Manager consultants and Azure cloud integration experts can assist you with any aspect of designing, installing, using and repairing a System Center Configuration Manager solution for local, cloud, or hybrid environments.

ProSight Remote Network Management Consultants Managed IT Services Technology Professional
ProSight Server and Desktop RMM Network Engineer Consultants for Remote Server Monitoring
ProSight Spam Filtering Specialists in San Francisco Kirtland Air Force Base CISM Engineer Careers
Professional Services for Belmont Remote San Mateo County Consultancy in California
Postini Information Technology Consulting
Anti-Spam Small Business Subscription

E-Mail Guard is a comprehensive solution for defending against spam and virus attacks. E-Mail Guard addresses the protection and administration of corporate email by offering continually updated spam and virus filtering, policy management, content filtering, and protection against email-borne DHA and DoS attacks. E-Mail Guard also includes monitoring, administration and analysis utilities plus outbound email testing to let you fix your e-mail system and specify and enforce company security policy.

Repairing Cisco Certified Experts Denver, Colorado Business Computer Server Companies
Information Technology Consulting for prime infrastructure
Remote Support

Progent can assist your business to deploy Cisco wireless LAN controller appliances to manage and monitor wireless networks of all sizes. Progent can assist you to maintain and debug your existing Cisco Wi-Fi solution or carry out a smooth migration to Cisco's latest wireless controller solutions.

Rohnert Park Server Troubleshoot Expert Sonoma County Small Office Computer Consulting Services in Northern California
San Francisco Technology Professional Software Consulting Services
SanDiegoUCSD, CA Outsourcing Technical Support SanDiegoUCSD, CA IT Specialist
Security Certification for Security Security Team for CISSP Fort Worth, Texas
Technology Consulting for Cisco SIP Integration
Cisco CUBE Integration Network Consultant in Jackson, WY

Progent's Cisco-certified SIP integration consultants can assist your business to design, deploy, manage, troubleshoot and upgrade Cisco's SIP connectivity solutions and Cisco's CUBE-based IP PSTN trunks and can provide cost-effective online or onsite expertise to assist companies to migrate efficiently to an advanced communications network that delivers accelerated return on investment. Progent's certified Microsoft collaboration experts can assist you to set up interfaces between Cisco's CUBE Session Border Controller and Microsoft's VoIP and IP video applications such as Skype for Business or Lync for access to a SIP-based IP PSTN trunk.

Security Consulting for Intrusion Protection Systems Global Testing
Specialist for Microsoft Access application programming
Developer Firms for Microsoft Access desktop in Lutherville, MD

Progent offers cost-effective remote support for all editions of Office Access including desktop and browser-based versions and can provide expert assistance for application programming, database conversion, performance tuning, report design, and maintenance. Progent also can provide custom webinar training for Access programming and database administration.

Server Consultants for Microsoft SQL 2014 Milwaukee Racine Waukesha SQL Server 2016 Providers
Network Professional Career
MCSE Freelance Jobs in Santa Clara

Progent is looking for a range of on-staff employees such as solutions-driven Microsoft Certified Systems Engineers; connectivity consultants who have Cisco CCDP or CCIE certification; and specialists in fault-tolerant system architecture with backgrounds in mobile connectivity, wireless networking, non-stop systems, business continuity planning, data preservation, and server virtualization. We are also seeking workstation support technicians, off-site troubleshooting professionals, and CISSP or CISM certified security consultants. Progent is also looking for veteran managers able to operate efficiently in Progent's dynamic, virtual office environment. Progent works with independent consultants with in-depth expertise and working experience in crucial information technology areas outside our primary service focus. Progent's Experts Group includes independent consultants who offer consulting and programming support for line-of-business solutions that include MRP, Enterprise Resource Planning, or CRM; possess deep knowledge of non-Microsoft platforms such as Linux derivatives, Apple OS, or Sun, or offer world-class skills in areas such as telecom, web development, Electronic Data Interchange, web commerce, or dbm programming. Independent contractors qualified by Progent cooperate with our staff consultants to deliver comprehensive IT services for small business networks.

Services Manteca, CA Colorado Small Business Computer Consulting
SharePoint Server 2007 IT Services Information Technology Consulting for SharePoint in Washington DC
FAQ about Contract Microsoft Consultant Remote Support Jobs
Jobs Available in Iowa

For replies to common questions concerning becoming a consultant at Progent, go to Jobs at Progent Frequently Asked Questions.

SharePoint Server 2013 Troubleshooting Support Outsourcing
Small Business Computer Consulting Companies for San Diego San Diego, California Networking Support
Small Business Computer Consulting Company Huntington Beach Support Outsourcing Services
Solaris Online Technical Support Redhat Configuration
Catalyst 3650 Switch Integration
Global Catalyst Switch VLAN Remote Technical Support California

Progent's Cisco-certified CCIE consultants can assist you to set up, manage, update, optimize and troubleshoot Catalyst switches. Progent can also help you to enhance the security of Catalyst switches and move efficiently from legacy switches to modern devices.

Support Consultants for Cisco Milwaukee Wisconsin Cisco Small Business IT Consulting
Support and Integration Sun Solaris Professionals Colorado
System Engineers for SQL Server 2012 SQL Server 2014 Integration Specialists
Technology Consultant Jersey City Cedar Knolls Carlstadt Top Rated Cisco Technician
VMware vCloud Suite Engineers Consultant for VMware Site Recovery Manager Migration
Remote Support Services for Network Services Monitoring
Network Performance Troubleshooting Technical Consultant Richmond, VA

Progent’s ProSight WAN Watch is a network infrastructure management service that makes it simple and affordable for smaller businesses to map, monitor, enhance and troubleshoot their networking hardware such as switches, firewalls, and load balancers plus servers, printers, client computers and other networked devices. Using state-of-the-art Remote Monitoring and Management technology, ProSight WAN Watch ensures that network diagrams are kept updated, captures and manages the configuration of virtually all devices connected to your network, tracks performance, and sends notices when issues are detected. By automating complex network management activities, WAN Watch can knock hours off ordinary tasks such as making network diagrams, expanding your network, finding devices that require important updates, or isolating performance problems.

Yolo County Troubleshooting Davis Computer Consultancy Company in California