Expanding your remote workforce can have a significant impact on IT architecture, cybersecurity, and corporate culture. Progent has two decades of experience helping SMBs to plan, deploy, manage, optimize, and troubleshoot IT networks that support a remote workforce. Progent can help your Akron organization to select the right technologies and follow best practices in creating and operating a secure virtual ecosystem for telecommuters that promotes collaboration and returns maximum business value. Progent offers services that go from on demand expertise for getting you over challenging technical bottlenecks to full project management to help you carry out mission-critical initiatives.

Progent can help Akron, Ohio businesses to succeed with any aspect of creating a high-functioning work-at-home environment by providing network infrastructure configuration services, VoIP PBX troubleshooting, voice/video conferencing integration, collaboration platform customization and training, public cloud connectivity, Help Desk services, data security, backup/restore solutions, and streamlined management.

Security and Compliance for Remote Workers
At-home employees commonly utilize their own computing devices and usually operate in an unsecured physical environment. This situation multiplies their vulnerability to cyber attacks and calls for judicious configuration of corporate firewalls, AV tools, multi-factor authentication, remote monitoring, thorough end-user training, and the creation of security policies built on leading practices. Progent's seasoned team of data security support experts can assist you to plan, deploy and maintain an effective cybersecurity solution that protects critical information resources in networks that include an at-home workforce.

Firewall Integration Services for At-Home WorkersFirewalls enable you to create a network that can be securely utilized by local users as well as by telecommuters, mobile employees, suppliers, clients, and other stakeholders. Next-generation firewall devices allow you to configure and control different access rights to different groups of users and to expand your network and adjust your cybersecurity posture as your business evolves and as network attacks become increasingly sophisticated. Progent supports both new and older firewall devices from all leading vendors including Cisco, Palo Alto Networks, Check Point, Juniper, SonicWall and Fortinet. For details about Progent's firewall configuration services, go to firewall configuration and support expertise.

Remote Security Monitoring and Management for TeleworkersRemote Endpoint Security Monitoring makes it possible to watch over the disparate devices utilized by at-home workers and either reject or identify and respond to modern cyber attacks like ransomware. With ProSight Active Security Monitoring services, a small-footprint agent is installed on every protected endpoint device, monitoring all activity and using state-of-the-art machine learning and full execution context from SentinelOne to detect new attacks before they can spread. When a cyberattack is discovered, ProSight ASM instantly isolates the infected device from the network to contain the malware. Because the ProSight ASM agent is self-contained, endpoints remain protected even if they are disconnected from the Internet. Progent is a SentinelOne Partner, dealer, and integrator. For details about ProSight ASM, refer to remote endpoint monitoring for telecommuters.

Two-factor Authentication (2FA) Services for TeleworkersProgent's Duo MFA Service Plans incorporate Cisco's Duo technology to defend against password theft through the use of two-factor authentication (2FA). Duo supports one-tap identity verification on iOS, Android, and other personal devices. Using Duo 2FA, when you sign into a secured application and enter your password you are requested to confirm who you are on a unit that only you possess and that is accessed using a separate network channel. A broad selection of out-of-band devices can be used for this second means of ID validation such as a smartphone or wearable, a hardware/software token, a landline telephone, etc. You may register several verification devices. To find out more about Duo two-factor identity validation services, go to Duo MFA two-factor authentication services for at-home workers.

Security Audit Services for At-Home WorkersSecurity Audits can assess the vulnerability of your information system to all classes of external and internal security threats for a network that incorporates remote workers. Progent can run remote, automated security analysis software for quickly and economically uncovering a broad range of security holes that can be found via the Internet. Progent's security assessment experts, which can be provided by security professionals with advanced certifications such as CISA, CISSP, and GIAC, can assist your company to evaluate your processes and governance policies and review your WAN infrastructure to enable you to design the highest level of security for your remote workers.

NodeZero Pen Testing for Work-from-Home EnpointsHorizon3.ai's NodeZero PEN Testing Platform is a breakthrough penetration test (pentest) product family that supports automated testing of your at-home connectivity solution and your internal and perimeter networks to help you identify, rank, fix, and verify cybersecurity weaknesses before threat actors can take advantage of them. Progent can assist you to use NodeZero to perform comprehensive pentests of your network perimeter and your internal network so you can determine your current security profile. Progent's NodeZero experts can also help you to harden your network security and can assist you to plan and deploy a unified cybersecurity strategy that streamlines management and delivers maximum cyber defense for on-prem, cloud-based, at-home, and perimeter IT resources. To learn more information about Progent's threat analysis solutions powered by on NodeZero's penetration test products, see Consulting Support for NodeZero's Penetration Test Platform.

Download White Paper: Securing a Work-From-Home (WFH) Environment
To read or download a white paper describing key areas to concentrate on for securing an IT environment that includes telecommuters, click:
Protecting a Work-From-Home (WFH) Environment White Paper. (PDF - 2.4 MB)

Contact Progent for Telecommuter Expertise
To contact Progent about building and managing an efficient work-from-home environment for your Akron, Ohio business, call 1-800-993-9400 or refer to Contact Progent.