More Questions and Answers
Can Progent help me configure Database Availability Groups for Exchange 2013?
A Database Availability Group (DAG) is the basic unit of high availability (HA) and resilience for Microsoft Exchange Server 2013 Mailbox servers. First offered in Exchange Server 2010, a DAG is a collection of up to 16 Mailbox servers in which any server in a DAG can host a copy of an Exchange mailbox database from any other server. DAG servers cooperate with one another to restore unassisted from breakdowns that impact mailbox databases. Progent's Microsoft certified Exchange experts offer Database Availability Group consulting services to assist your organization to design, install and administer an HA environment for your Exchange mailboxes. In addition, Progent's Microsoft Exchange 2016 experts can help you move your Exchange Server 2013 DAG deployment to Exchange 2016.
Does Progent offer consulting support for Cisco's Meraki cloud-managed Wi-Fi access points?
Progent's Cisco Meraki Wi-Fi access point experts offer online and onsite support services to help businesses of any size to plan, deploy, maintain, upgrade or debug Wi-Fi networks that include Cisco Meraki APs. Progent can help you to set up and support Meraki-based wireless networks for sites that can range from a telecommuter's home or a remote office all the way to a campus or a nationwide enterprise. Progent can also help you to integrate additional Cisco products including switches, ASR routers and firewalls to create a seamless ecosystem that delivers the same access, performance, security compliance, ease of management and uptime for wired and Wi-Fi users irrespective of their mobility or device. (Refer to Cisco Meraki switches consulting and troubleshooting services.)
Can Progent help us set up and maintain Cisco Unity Connection or Unity Express (CUE)?
Cisco Unity Connection, an integrated expansion of Cisco Unified Communications Manager, is a converged voicemail system that accelerates teamwork by providing a variety of alternatives for accessing calls and messages within a framework that is simple to deploy and administer. Unity Connection lets you read and manage voice messages from your email inbox, browser, Jabber, a Cisco Unified IP endpoint, a smartphone, or a tablet. Cisco Unity Express (CUE), offered in certain Cisco ISR routers, offers cost-effective voicemail, unified messaging, interactive voice response (IVR), and greeting services for small to medium businesses (SMBs) and enterprise branch offices with as many as 500 voice mailboxes. Progent's Cisco-certified CCIE network consultants offer Cisco Unity Connection and Unity Express (CUE) configuration and technical support services to make sure your voice messaging deployment delivers the highest possible business value.
Can Progent help implement virtual desktops with Windows Server 2016?
Microsoft's desktop virtualization solutions reduce the work required for IT managers to install software programs so that they are standardized throughout an entire user base, offer the power to manage rights to critical information, and enable fast installation of additional or upgraded workstations. In Windows Server 2016, the Terminal Services utility has been enhanced and renamed Remote Desktop Services or RDS. Microsoft's innovative Virtual Desktop Infrastructure behind RDS simplifies client connectivity, improves performance, strengthens security, centralizes management, and offers a nearly transparent user experience. Progent's desktop virtualization consultants can assist you to evaluate the strategic advantages of Microsoft's virtual desktop technologies, set up pilot and on-line deployments, improve your system architecture to accommodate virtualized desktops efficiently, assess and resolve security problems, and train your IT managers to utilize best practices to achieve a fast ROI from desktop virtualization.
Does Progent offer stealth penetration testing services?
Stealth intrusion testing is an important part of any overall network security plan. Progentís security experts can run thorough unannounced penetration security tests without the awareness of your organization's in-house network support resources. Stealth penetration checking shows whether existing security defense systems such as intrusion detection warnings and event history monitoring are correctly configured and consistently monitored.
How can Progent help us protect ourselves against Ransomware?
Progent's ProSight Ransomware Preparedness Report service is a low-cost service built around a brief phone discussion with a Progent backup/recovery consultant. The fact-finding interview is designed to help evaluate your company's ability either to block or recover rapidly from a ransomware incident. Progent will consult with you personally to collect information concerning your existing AV defense and backup platform, and Progent will then deliver a custom Basic Security and Best Practices Report document describing how you can apply best practices to build an efficient security and backup/recovery environment that aligns with your company's needs. For details, visit The ProSight Ransomware Preparedness Report Service.
Can Progent provide the expertise of a CRISC-certified risk management consultant?
The Certified in Risk and Information Systems Control (CRISC) program was initiated by ISACA to validate an IT professional's skills to design, deploy, and support IS control mechanisms to mitigate risk. Progent offers the expertise of a CRISC-certified risk management consultant to assist you to create and carry out a risk management strategy that follows leading practices promoted by CRISC and crafted to match your company's risk tolerance, business objectives, and budgetary guidelines.
Can Progent help us integrate our environment with Microsoft Azure Service?
Progent's Microsoft Azure integration experts can help you with every stage of Azure cloud integration including requirements definition, readiness evaluation, solution design, pre-production testing, implementation, automated administration, performance tuning, software license controls, disaster recovery preparedness, security policy enforcement, and regulatory compliance assessment. Progent can assist you to set up and debug firewalls and VPN connections so your clients can safely access to Azure-based services, and Progent's Microsoft-certified consultants can help you set up critical Microsoft platforms to run in the cloud including Microsoft Windows Server, Exchange, SQL Server and SharePoint. Progent can also assist you to set up a hybrid environment that transparently combines physical datacenters with Azure-based services.
How can Progent help us protect our network from ransomware and other modern threats?
Progent's ProSight Active Security Monitoring endpoint protection solution incorporates cutting edge behavior-based machine learning technology to defend endpoint devices as well as physical and virtual servers against new malware assaults like ransomware and email phishing, which routinely evade traditional signature-based anti-virus tools. ProSight ASM safeguards on-premises and cloud-based resources and offers a unified platform to address the entire threat progression including protection, infiltration detection, mitigation, cleanup, and post-attack forensics. Key capabilities include one-click rollback with Windows Volume Shadow Copy Service and automatic system-wide immunization against new threats. Learn about the complete ProSight portfolio of low-cost managed services for small businesses.
More Questions and Answers
If your small business is in Fremont or anywhere in Silicon Valley
and you require technical assistance, information technology outsourcing, or top-level expertise from a Progent engineer,
call 510-933-0400 or visit Contact Progent.