Expanding your remote workforce can have a significant impact on IT architecture, security/compliance, and corporate culture. Progent has two decades of experience helping businesses of all sizes to design, configure, administer, optimize, and debug IT networks that incorporate at-home workers. Progent can assist your Akron company to pick the appropriate tools and adhere to leading practices in creating and operating a secure virtual office solution for teleworkers that facilitates teamwork and returns maximum value. Progent can provide support services that go from as-needed guidance for getting you over occasional technical bottlenecks to full project management or co-management to help you successfully complete business-critical tasks.

Progent's consultants can help Akron, Ohio businesses to with any aspect of creating a high-functioning work-at-home ecosystem by delivering infrastructure configuration services, VoIP PBX expertise, voice/video conferencing support, collaboration platform selection and deployment, public cloud integration, Call Desk services, cybersecurity, data protection solutions, and unified management.

Cybersecurity for Teleworkers
At-home employees commonly use their own computers and usually work in a poorly secured physical area. This increases their susceptibility to malware threats and calls for careful deployment of firewalls, anti-malware tools, MFA-based identity verification, remote monitoring, thorough end-user training, and the development of security policies based on leading practices. Progent's seasoned group of cybersecurity solutions consultants can assist you to design, configure and manage an effective security solution that protects critical IT resources in networks that incorporate remote workers.

Firewall Integration Services for At-Home WorkersFirewalls allow companies to build a network environment that can be securely utilized by on-premises users as well as by at-home workers, mobile workers, vendors, clients, and other stakeholders. Modern firewall appliances permit you to assign and control appropriate permissions to various groups of users and to expand your IT network and adjust your cybersecurity posture as your company evolves and as cyber threats become increasingly complex. Progent works with both new and older firewall appliances from all major vendors like Cisco, Palo Alto Networks, Check Point, Juniper, and Fortinet. To learn more about Progent's firewall integration services, go to firewall support expertise.

Remote Endpoint Monitoring Services for At-Home WorkersRemote Endpoint Monitoring makes it possible to watch over the various devices utilized by at-home workers and either block or spot and respond to the latest cyber attacks like ransomware. With Progent's ProSight Active Security Monitoring services, a small-footprint software agent is put on every secured endpoint device, monitoring all activity and utilizing advanced machine learning from SentinelOne to identify new threats on arrival. When an attack is spotted, ProSight Active Security Monitoring instantly isolates the infected endpoint device from the network to quarantine the malware. Because the ProSight Active Security Monitoring agent is autonomous, endpoints remain protected even when they are disconnected from the Internet. For more information about ProSight ASM, go to remote endpoint monitoring for an at-home workforce.

Two-factor Authentication Services for TeleworkersProgent's Duo authentication managed services utilize Cisco's Duo technology to protect against compromised passwords through the use of two-factor authentication. Duo supports single-tap identity confirmation with iOS, Google Android, and other out-of-band devices. With 2FA, when you sign into a secured application and give your password you are requested to confirm who you are on a unit that only you have and that uses a different ("out-of-band") network channel. A wide selection of devices can be used as this second means of ID validation including an iPhone or Android or watch, a hardware token, a landline telephone, etc. You can register multiple validation devices. To find out more about Duo identity authentication services, go to Duo MFA two-factor authentication services for remote workers.

Security Audit Services for At-Home WorkersSecurity Audits can evaluate the vulnerability of your network to all types of external and local security threats for a network that incorporates teleworkers. Progent can run online, automated cybersecurity inventory software for quickly and economically uncovering a broad range of security holes that can be surfaced via the Internet. Progent's security audit experts, which can be managed by security experts with top credentials such as CISM, ISSAP, and GIAC, can help your company to audit your operations and policies and review your network infrastructure to allow you to implement top-level security for your at-home workers.

Download White Paper: Securing a Work-From-Home Environment
To view or download a white paper describing key areas to concentrate on for securing a network that incorporates telecommuters, click:
Protecting a Work-From-Home (WFH) Network White Paper. (PDF - 2.4 MB)

Contact Progent for Telecommuter Expertise
To contact Progent about creating and managing a productive work-from-home solution for your Akron, Ohio organization, phone 1-800-993-9400 or visit Contact Progent.