Enlarging your at-home workforce can have a significant impact on network architecture, security, and company culture. Progent has two decades of experience helping small and mid-size businesses to plan, deploy, administer, optimize, and debug IT environments that support a remote workforce. Progent can assist your Adelaide company to pick the right technologies and adhere to leading practices in creating and maintaining a safe virtual ecosystem for telecommuters that promotes collaboration and returns top value. Progent can provide support services ranging from as-needed expertise for helping you past occasional technical roadblocks to comprehensive project management or co-management to help you successfully complete mission-critical tasks.
Progent can assist Adelaide, South Australia businesses to with any facet of creating a high-performing work-at-home ecosystem by delivering network infrastructure configuration services, IP voice expertise, video conferencing support, collaboration platform customization and training, cloud integration, Call Desk services, security and compliance, backup/restore solutions, and centralized management.
Security for Teleworkers
Work-from-Home employees typically use their personal computers and usually work in an unsecured physical area. This situation increases their susceptibility to malware threats and requires careful deployment of firewalls, AV tools, multi-factor authentication, remote monitoring, intensive end-user training, and the development of security policies based on leading practices. Progent's seasoned team of data security support experts can help you to plan, implement and maintain an effective security solution that guards critical IT assets in environments that include telecommuters.
Firewalls allow you to build a network environment that can be securely accessed by on-premises users and by an at-home workforce, mobile workers, suppliers, customers, and the public. Modern firewall devices permit you to assign and manage appropriate access rights to different classes of users and to expand your network and adjust your cybersecurity posture as your business evolves and as cyber threats grow increasingly sophisticated. Progent works with both current and older firewall appliances from all leading vendors like Cisco, Palo Alto Networks, Check Point, Juniper, SonicWall and Fortinet. For details about Progent's firewall integration services, refer to firewall configuration and support services.
Remote Endpoint Security Monitoring makes it possible to watch over the disparate devices used by an at-home workforce and either block or identify and respond to the latest threats like ransomware. With ProSight Active Security Monitoring services, a small-footprint agent is installed on every secured endpoint, watching all activity and using state-of-the-art machine learning and full execution context from SentinelOne to identify zero-day attacks before they can spread. When a cyberattack is spotted, ProSight Active Security Monitoring immediately disconnects the impacted endpoint device from the network to contain the malware. Because the ProSight ASM agent is self-contained, endpoint devices stay secure even when they are not connected to the Internet. To find out more about ProSight ASM, see remote endpoint monitoring for remote workers.
Progent's Duo authentication service plans utilize Cisco's Duo cloud technology to defend against password theft by using two-factor authentication (2FA). Duo supports one-tap identity verification on iOS, Google Android, and other personal devices. Using Duo 2FA, whenever you sign into a protected application and enter your password you are asked to confirm who you are via a unit that only you have and that uses a separate network channel. A broad range of devices can be used as this added form of ID validation such as a smartphone or watch, a hardware token, a landline phone, etc. You can register multiple validation devices. To learn more about Duo identity authentication services, visit Duo MFA two-factor authentication (2FA) services for remote workers.
Security Audits can assess the exposure of your network to all types of outside and local security threats for a network that incorporates telecommuters. Progent can run online, automated security analysis software for quickly and economically detecting a wide variety of security gaps that can be surfaced over the Internet. Progent's endpoint security assessment consulting services, which can be managed by security experts with top credentials including CISA, CISSP, and GIAC, can help your company to audit your processes and governance policies and review your IT infrastructure to allow you to design top-level security for your an at-home workforce.
Download White Paper: Securing a Work-From-Home (WFH) Environment
To view or download a white paper describing key areas to concentrate on for securing an IT environment that incorporates telecommuters, click:
Securing a Work-From-Home Environment White Paper. (PDF - 2.4 MB)
Contact Progent for Telecommuter Support Services
To get in touch with Progent about building and managing an efficient work-from-home solution for your Adelaide, South Australia business, phone 1-800-993-9400 or go to Contact Progent.