Progent is seeking to hire fulltime, results-oriented Microsoft certified consultants with Microsoft Certified Systems Engineer credentials; Cisco accredited network consultants who have Cisco CCDP or CCIE credentials; security professionals with CISSP or CISA or comparable security credentials; and high-end network design experts with a background in mobile access, wireless networking, service continuity, workplace recovery, information protection, and virtual servers. Progent also is hiring employees who can work on Progent's staff of desktop support specialists and off-site support experts. Also, Progent is seeking talented managers able to operate effectively in our fast-paced, virtual office culture.
For small and midsize organizations, network security and compliance can be too complex to stay ahead of yet too dangerous to ignore. The world's largest enterprises have been breached, and the top cloud service providers have on occasion been knocked out. It seems like there's no place to run. Progent makes it affordable for smaller businesses to implement critical security tasks successfully by offering the advantage of billed time to the closest minute with no minimum billing for remote help. You can have the help of a world-class information expert to deliver precisely the help you need when you require it. Progentís CISA, CISM, GIAC, CISSP and ISSAP premier consultants can help you with any aspect of network security including security audits, virus defense and recovery, spam and email content filtering, email data leak prevention, regulatory compliance reporting, and creating a comprehensive security plan.
Progent's Check Point firewall experts can help you design, integrate, and manage firewall solutions that rely on Check Point Software NGFW security gateways and Check Point's cloud-based SandBlast security services. Progent can also help you maintain older Check Point firewall models or migrate efficiently to Check Point's modern firewalls.
Progentís Cisco-Certified network experts offer professional PIX Firewall consulting services encompassing design, integration and maintenance of Cisco firewall and Cisco security products. The Cisco PIX 500 Security Appliance Series of Cisco firewalls delivers strong user and application policy enforcement, mutlivector threat security, and secure connectivity services. Ranging from small, plug-and-play desktop appliances for small businesses and home offices to modular gigabit products, Cisco PIX firewalls offer a healthy level of security, speed and reliability for information networks of all sizes. PIX firewalls are build around a proven, specially designed platform, PIX OS, avoiding possible OS-specific security vulnerabilities. The Cisco PIX Firewall has received ICSA Firewall and IPsec certification as well as Common Criteria EAL4 evaluation status. PIX firewalls provide an array of integrated security and connectivity services, including powerful application-aware firewall services, Voice over IP and multimedia security, multi-site and remote-access IPsec VPN networking, intelligent access services, and extensive administrative tools. Progentís network consultants can help you choose and integrate any Cisco PIX 500 Series firewalls such as the Cisco PIX 501 Firewall, the Cisco PIX 506 Firewall, the Cisco PIX 506E, PIX 515 Firewalls, the PIX 515E Firewall, the Cisco PIX 520 Firewall, Cisco PIX 525 Firewalls and the Cisco PIX 535.
Progent's Microsoft-certified consultants offer remote or in-person support to assist companies of any size to design, implement, manage, and repair a backup solution based on System Center 2012 Data Protection Manager (SCDPM 2012). Progent's consultants can help you to migrate from older releases of Data Protection Manager or from a different backup system, and Progent can integrate your SCDPM 2012 deployment for onsite, cloud, or hybrid environments. Progent can provide as-needed help for fixing particularly stubborn problems, or full project management support. Progent's consultants can also assist your business to incorporate SCDPM 2012 into an enterprise-class disaster recovery strategy.
Progent's Intune consultants can assist you to assess the strategic value of utilizing Microsoft Intune for managing your portable devices including notebooks, smartphones, and tablets powered by Windows, iOS, and Google Android. Progent can assist your company to define policies, plan and deploy test environments to confirm the appropriateness of Intune for your network, deploy Intune throughout your IT ecosystem, combine Intune with SCCM for single-console change management, and provide ongoing support for your Microsoft Intune deployment.
VMware's NSX virtual network technology enables you to build entire networks in software. NSX permits virtual networks to be provisioned in minutes and managed with a high degree of automation independent of the physical components used by the basic network infrastructure. VMware Site Recovery Manager allows programmatic disaster recovery, application mobility, plus transparent site relocation, failback and site re-protect. Site Recovery Manager also permits non-intrusive testing for site recovery, updates and patches and can generate audit reports to confirm complete service restoration, validate SLAs and demonstrate compliance. When used with VMware's NSX virtual network technology, VMware SRM can rapidly restore the entire logical network topology at the secondary datacenter. Progent can provide the skills of a VCDX certified VMware NSX consulting expert and VMware Site Recovery Manager integration specialist to help you to design, configure, test and manage a DR system powered by VMware SRM and VMware NSX.
With Cisco Catalyst switches for small and medium-sized companies, Cisco enables organizations to gain the full benefits of adding intelligent services to their IT infrastructures. Cisco's switching technology allows you to deploy capabilities that make your IT network highly available to handle time-critical requirements, expandable to support future growth, secure enough to guard confidential information, and capable of prioritizing and controlling traffic flows to optimize network performance. Progent's CCIE and CCNP certified engineers can help you pick out and deploy Catalyst switches that make sense for your company. In addition, Progent's CISM and CISSP certified security specialists can help you develop a strategic protection plan and configure Cisco Catalyst switches so they powerfully support your security policies. Cisco Catalyst switching products that Progent supports include the Cisco Catalyst 2960 switches, Cisco Catalyst 3560 switches, Cisco Catalyst 4500 switches, and Cisco Catalyst 6500 Series Switches.
Progent's Microsoft-certified consultants can assist organizations of any size to assess Windows 10 or to upgrade to Windows 10 from any older version of Windows. Online and onsite evaluation and upgrade support for Windows 10 available from Progent include ROI estimates, project supervision, application and driver compatibility testing, pilot systems, virtualization architecture, Cloud and hybrid integration, mobile device management and synchronization, teleworker access, security and compliance, streamlined deployment and administration, network infrastructure optimization, Wi-Fi support, business continuity planning, group and personal training for IT support personnel and end users, and post-migration consulting support.
Progentís IT outsourcing services offer budget-friendly computer support for small businesses. Whether it involves designing network architecture, setting up an in-house Help Desk or outsourcing a one, deploying a new email platform, monitoring your system, or creating an on-line eCommerce application, outsourcing your IT technical services can contain expenses and eliminate uncertainties, permitting IT support expenses to increase in a more moderate and controlled fashion than is feasible by assembling a bulky, knowledgeable in-house IT organization. Progentís Outsourcing White Paper and flyers explain how Progent can enable you to build a protected and robust network architecture for your critical applications powered by Windows such as Microsoft Office XP, Office 2003, and Office 2000.
Progent's CISSP-premier cybersecurity experts can assist businesses of all sizes with any aspect of IT security. Progent can help implement cost-effective cybersecurity solutions that protect a small office against advanced threats or Progent can plan, deploy, and monitor a comprehensive security environment for hybrid enterprise networks that support onsite, remote, and mobile clients accessing IT resources distributed over multiple physical datacenters and various clouds.
Configuration Manager automates application and device deployment at scale, simplifies compliance settings management, keeps track of network assets, guards against corporate data leakage, performs network health reporting, allows secure self service, and offers a single point of control for managing multi-operating system networks based on on-prem, cloud-centric, or hybrid deployment models. Progent's Microsoft-certified SCCM consultants and Microsoft Azure cloud integration experts can help your organization with any facet of designing, implementing, operating and repairing a SCCM deployment for local, cloud-based, or hybrid networks.
Progent's Cisco-certified CCIE networking experts can assist your business to set up, manage, update, optimize and troubleshoot Catalyst switches. Progent can also assist you to harden the security and compliance of Catalyst switches and migrate efficiently from outdated appliances to current devices.
Progent's Microsoft-certified failover clustering consultants can assist businesses to assess the benefits of adopting Windows Server 2012 clustering technology to build a powerful high-availability/disaster recovery strategy, assist you to plan and install a Windows Server 2012 system, deliver online and on-premises consulting expertise and technical support for clusters that include physical servers or virtual machines, and help you to centralize the management of clustered servers.
The complexity and integration demands of Microsoft Windows Servers requires an IT consulting firm with practical experience and in-depth knowledge in planning and integrating seamless, comprehensive network technology solutions. The background of Progent's Microsoft-certified experts, which averages more than 10 years supporting Microsoft integration, ensures you success deploying Windows Server 2008 and Windows Server 2003 to align optimally with your strategic objectives. Progentís consulting support can help you with planning, installing, administering, and supporting Windows Server solutions that maximize the business value of your computer network. Progentís consultants can assist you with Microsoft Windows 2008 Server, Windows 2003 Server, Windows 2000 Server, or Microsoft Windows NT Server plus Windows 8, Windows 7, Windows XP and other desktop clients.
Progent can provide affordable remote access to engineers skilled in a broad range of products and services that deliver solutions for backing up Windows, Mac, and Linux servers and desktops plus notebooks and smartphones. Progent can provide expertise for leading backup products such as Acronis Backup and Recovery, Barracuda Backup, Altaro VM Backup, Symantec Backup Exec, BackupAssist Software, CrashPlan PRO, Double-Take Backup, Mozy, Retrospect, Apple Time Machine, VMware Data Recovery (VDR), and Oracle Solaris FLARs. Progent's consultants can help you to design, upgrade, or troubleshoot data backup solutions for a variety of architectures including local, remote, cloud, or a mix.
Progent offers small businesses a pair of low-cost network security evaluation scanning packages that provide, at a set fee, remotely administered scans of your security profile which are analyzed by certified security engineers who interpret the results of the remote scan, deliver objective summaries of your current network security, and make recommendations for enhancements. Progent has developed two complementary network security inventory scanning packages for external and internal security testing that are priced to meet the restricted budgets of small companies while delivering enterprise-quality evaluations of your network's exposure to assault.
For smaller organizations, computer security and compliance can be too complicated to master but too risky to overlook. The world's biggest enterprises have been breached, and the top cloud services have on occasion been knocked out. It looks as though there's no place to hide. Progent makes it affordable for smaller organizations to implement critical security tasks successfully by providing the benefit of billed time to the nearest minute with no minimum billing for remote support. This means you can have access to a world-class computer expert to deliver just the help you need when you need it. Progentís CISA, CISM, GIAC, CISSP and ISSAP premier consultants can assist you with any aspect of network security including security audits, malware screening and recovery, spam and email content filtering, email data loss and data leak protection, compliance reporting, and creating a comprehensive security plan.
Progent's Cisco CCIE-certified networking experts can assist your organization to maintain older PIX 500 or ASA 5500 firewalls or transition to Cisco ASA 5500-X security appliances. Progent can also help you to configure, administer, upgrade and troubleshoot Cisco ASA 5500-X security appliances with Firepower Services.
Progentís certified consultants offer small and medium size companies enterprise-grade consulting support for SMS Server and System Center Configuration Manager 2007, Microsoft's standard tools for update and configuration automation. Configuration Manager is Microsoft's new title for the change management platform formerly known as SMS Server. System Center Configuration Manager 2007 offers a variety of enhancements to Systems Management Server 2003 including full automation, built-in Vista Microsoft Windows Server 2008 support, NAP security support, and boot image management. Progentís certified engineers can show you how to use SMS 2003 or Configuration Manager effectively for automated operating system and application software deployment, security patch control, application tracking, and software license reconciliation. Progent's engineers can also assist you to migrate efficiently from SMS Server 2003 to Configuration Manager.
Progent's expert consultants can help you define and implement an efficient in-place Microsoft Exchange 2003 migration plan that avoids productivity downtime, simplifies long-term service demands, and makes your Exchange Server 2003 easy to administer. For complex multiple server or multi-location migrations, Progent offers the background to complete your move quickly and economically. Progent's Exchange Server 2003 help, troubleshooting, and design offerings include expertise with the integration of third-party enhancements of Microsoft Exchange Server 2003 that are best aligned to your business goals.
If you are an information technology consultant with system support experience, joining Progent and working for our clients will enhance your abilities via collaboration with Progent's staff of motivated, world-class consultants. Progent's focus on offering network consulting and technical help to small and midsize companies will offer you the opportunity to work closely with decision makers and contribute tangibly to the success of dynamic organizations. In addition, Progent's virtual office environment offers the most advanced tools for off-site support and wireless access to help you to come up with speedy fixes when you troubleshoot business-critical issues.
If your business network mixes Solaris platforms with Microsoft Windows, Progent can show you how to integrate your computers into a cohesive network that allows all your OS platforms to run side by side for easy administration, transparent information exchange, high availability, enhanced throughput, and strong security. Progent's Sun Solaris and Windows coexistence assistance offerings include IT infrastructure integration and support, support for Windows services for UNIX, online network monitoring and management, online technical support and troubleshooting, in-person technical support, and Helpdesk support.
Secure Application Publishing with Internet Security and Acceleration Server 2006 provides more control over intranet applications while enabling enhanced productivity by making these resources available to authorized remote users. Internet Security and Acceleration Server can guard business applications, services, and information across all network components with application-layer filtering and powerful publishing tools. Progent's Microsoft-expert Internet Security and Acceleration Server experts can show you how to design, install, set up, and support Internet Security and Acceleration Server 2006 on your system so that your business achieves a smart and affordable balance of protection, convenience, and performance.
Cisco's security and offsite connectivity solutions for small to medium sized companies offer a full range of easy-to-administer security hardware and software to help safeguard your wired and wireless information system. Cisco's Virtual Private Network product family includes switches, firewalls, intrusion detection systems, and Virtual Private Network access concentrators. Progent's professional staff of consultants includes field-proven engineers with Cisco CCIE and Cisco Certified Network Professional qualifications who can assist your organization to evaluate Cisco Virtual Private Network, Cisco RADIUS Security, and other Cisco protection solutions that fit most closely with your business goals.
Progent's disaster recovery planning and business continuity consultants can show you how to create a disaster recovery plan in case of an IT system catastrophe. Progent can show you how to define a comprehensive disaster recovery plan that includes scheduled disaster recovery evaluations and drills. Progent's Microsoft and Cisco-certified consultants can also show you how to create an affordable, non-stop system solution that takes into account reliability issues involving a broad array of network technologies and procedures.