Enlarging your at-home workforce can have a significant effect on network architecture, security, and corporate workflows. Progent has two decades of background assisting small and mid-size businesses to plan, configure, administer, optimize, and debug IT networks that support a remote workforce. Progent can help your Adelaide company to select the appropriate tools and follow best practices in building and maintaining a secure virtual ecosystem for teleworkers that facilitates teamwork and delivers maximum business value. Progent can provide services ranging from as-needed expertise for getting you over challenging IT bottlenecks to full project management to help you successfully complete business-critical tasks.

Progent can assist Adelaide, South Australia organizations to succeed with any facet of building a high-performing work-from-home ecosystem by providing network infrastructure configuration services, IP voice expertise, video conferencing integration, collaboration platform customization and training, public cloud connectivity, helpdesk services, endpoint security, data protection solutions, and streamlined management.

Security and Compliance for Teleworkers
Work-from-Home (WFH) staff members commonly use their own computers and often work in a poorly secured physical area. This situation multiplies their susceptibility to cyber attacks and calls for careful configuration of corporate firewalls, AV tools, multi-factor authentication, remote monitoring, extensive end-user training, and the creation of security policies built on leading practices. Progent's veteran group of IT security support experts can help your business to design, implement and manage a compliant security solution that protects vital IT assets in environments that include remote workers.

Firewall Integration Services for At-Home WorkersFirewalls allow you to create a network environment that can be safely utilized by on-premises users and by telecommuters, mobile users, suppliers, clients, and the public. Modern firewall appliances permit you to configure and control different access rights to different groups of users and to scale your network and adjust your cybersecurity posture as your company evolves and as cyber threats become increasingly sophisticated. Progent supports both current and legacy firewall appliances from all leading manufacturers like Cisco, Palo Alto Networks, WatchGuard, Juniper, and Fortinet. To learn more about Progent's firewall integration services, refer to firewall configuration and support expertise.

Remote Endpoint Monitoring and Management Services for TelecommutersOnline Endpoint Security Monitoring makes it easy to track the disparate devices utilized by remote workers and either block or spot and respond to modern threats such as ransomware. With Progent's ProSight Active Security Monitoring (ASM) services, a small-footprint agent is installed on each secured endpoint, monitoring all activity and utilizing advanced machine learning and full execution context from SentinelOne to identify new attacks before they can spread. When a cyberattack is spotted, ProSight ASM instantly isolates the impacted device from the network to quarantine the threat. Because the ProSight ASM agent is self-contained, endpoints stay secure even if they are not connected to the Internet. Progent is a SentinelOne Partner, dealer, and integrator. For more information about ProSight Active Security Monitoring, go to remote endpoint monitoring for teleworkers.

Two-factor Authentication (2FA) Services for TelecommutersProgent's Duo authentication Managed Services utilize Cisco's Duo technology to protect against compromised passwords through the use of two-factor authentication. Duo supports single-tap identity verification on Apple iOS, Google Android, and other personal devices. Using Duo 2FA, when you log into a protected online account and enter your password you are asked to verify your identity on a unit that only you have and that is accessed using a different ("out-of-band") network channel. A broad selection of out-of-band devices can be utilized for this second form of authentication such as a smartphone or wearable, a hardware token, a landline telephone, etc. You can designate multiple validation devices. For details about Duo identity authentication services, visit Cisco Duo MFA two-factor authentication services for an at-home workforce.

Security Audit Services for At-Home WorkersSecurity Audits can evaluate the vulnerability of your network to all types of external and internal security threats for an environment that incorporates teleworkers. Progent can run online, automated cybersecurity analysis software for rapidly and affordably detecting a broad range of security weaknesses that can be found over the Internet. Progent's security audit experts, which can be provided by data security experts with advanced credentials such as CISM, ISSAP, and GIAC, can help you to evaluate your operations and policies and review your IT architecture to allow you to design the highest level of protection for your telecommuters.

NodeZero Pentetration Testing for At-Home WorkersHorizon3.ai's NodeZero PEN Testing Platform is a breakthrough penetration test (pentest) product family that supports autonomous threat assessment of your at-home environment and your internal and perimeter networks so you can find, rank, remediate, and verify security weaknesses before malicious hackers can take advantage of them. Progent's pentest experts can help you to use NodeZero to carry out thorough pentests of your network perimeter and your internal IT infrastructure so you can determine your present security profile. Progent can also assist you to strengthen your existing network security and can help you to plan and deploy a unified cybersecurity ecosystem that simplifies management and provides maximum protection for on-prem, cloud-based, remote, and perimeter IT assets. To find out more details about Progent's vulnerability analysis solutions powered by on NodeZero's penetration test platform, visit Consulting Services for NodeZero's Pentest Products.

Download White Paper: Protecting a Work-From-Home Network
To view or download a white paper describing key things to focus on for protecting an IT environment that supports telecommuters, click:
Securing a Work-From-Home (WFH) Environment White Paper. (PDF - 2.4 MB)

Contact Progent for At-Home Worker Support Services
To contact Progent about building and maintaining an efficient work-from-home environment for your Adelaide, South Australia organization, phone 1-800-993-9400 or refer to Contact Progent.