Expanding your telecommuter workforce can have a major impact on IT architecture, security/compliance, and corporate processes. Progent has two decades of background helping SMBs to design, configure, administer, tune, and troubleshoot IT environments that incorporate work-from-home employees. Progent can assist your Adelaide organization to select the right tools and adhere to leading practices in creating and operating a safe virtual office ecosystem for teleworkers that promotes collaboration and returns top business value. Progent offers support services ranging from on demand expertise for getting you over challenging technical roadblocks to comprehensive project management to help you carry out business-critical initiatives.
Progent's consultants can assist Adelaide, South Australia businesses to with any facet of building a high-functioning remote work ecosystem by delivering network infrastructure design and configuration services, IP voice expertise, video conferencing support, collaboration platform selection and deployment, public cloud integration, helpdesk augmentation, security and compliance, data protection solutions, and centralized management.
Security and Compliance for Teleworkers
Work-from-Home (WFH) staff members commonly utilize their own computing devices and often work in an unsecured physical area. This increases their vulnerability to cyber attacks and calls for careful configuration of corporate firewalls, anti-malware tools, MFA-based identity verification, remote monitoring, intensive user education, and the development of security policies built on leading practices. Progent's veteran team of cybersecurity support experts can assist your business to design, deploy and maintain a compliant security solution that protects vital IT resources in networks that incorporate telecommuters.
Firewalls allow companies to create a network environment that can be safely accessed by on-premises users and by telecommuters, mobile employees, vendors, clients, and other stakeholders. Next-generation firewall devices permit you to configure and control appropriate permissions to different classes of users and to expand your network and modify your security profile as your business evolves and as cyber threats grow more complex. Progent supports both current and older security devices from all leading vendors like Cisco, Palo Alto Networks, Check Point, Juniper, SonicWall and Fortinet. For more information about Progent's firewall support services, visit firewall integration and support services.
Remote Endpoint Security Monitoring makes it easy to track the disparate computers used by telecommuters and either block or spot and respond to the latest cyber attacks such as ransomware. With ProSight Active Security Monitoring services, a lightweight software agent is put on every secured endpoint, watching all activity and using state-of-the-art behavioral threat analysis from SentinelOne to detect zero-day attacks before they can spread. When a cyberattack is discovered, ProSight Active Security Monitoring immediately isolates the impacted endpoint device from the network to contain the threat. Since the ProSight Active Security Monitoring software agent is self-contained, endpoint devices stay protected even when they are not connected to the Internet. Progent is a SentinelOne Partner, dealer, and integrator. To learn more about ProSight ASM, see remote endpoint monitoring for at-home workers.
Progent's Duo MFA services utilize Cisco's Duo technology to defend against stolen passwords by using two-factor authentication. Duo enables single-tap identity verification with iOS, Google Android, and other personal devices. With 2FA, when you log into a secured online account and enter your password you are asked to confirm your identity via a unit that only you possess and that uses a different network channel. A wide selection of out-of-band devices can be utilized as this second form of authentication including a smartphone or wearable, a hardware/software token, a landline telephone, etc. You can register several verification devices. To find out more about Duo two-factor identity authentication services, go to Cisco Duo MFA two-factor authentication services for teleworkers.
Security Audits can assess the exposure of your information system to all types of external and internal security attacks for an environment that incorporates at-home workers. Progent can run online, automated security analysis scanning for rapidly and affordably uncovering a broad range of security gaps that can be found via the Internet. Progent's endpoint security assessment experts, which can be provided by network security professionals with advanced credentials such as CISA, CISSP, and GIAC, can help your business to evaluate your workflows and governance policies and assess your IT infrastructure to allow you to design the highest level of security for your telecommuters.
Download White Paper: Protecting a Work-From-Home Environment
To view or download a white paper describing critical areas to focus on for protecting an IT environment that incorporates telecommuters, click:
Protecting a Work-From-Home (WFH) Network White Paper. (PDF - 2.4 MB)
Contact Progent for At-Home Worker Support Services
To get in touch with Progent about creating and managing an efficient telecommuter environment for your Adelaide, South Australia business, phone