Enlarging your at-home workforce may have a significant effect on network architecture, cybersecurity, and corporate workflows. Progent has 20 years of experience assisting small and mid-size businesses to plan, deploy, administer, tune, and debug IT environments that incorporate a remote workforce. Progent can help your Akron company to pick the right technologies and adhere to best practices in creating and maintaining a safe virtual ecosystem for teleworkers that facilitates collaboration and returns top business value. Progent offers support services that go from on demand expertise for helping you past challenging IT roadblocks to full project management or co-management to help you successfully complete business-critical initiatives.

Progent can help Akron, Ohio businesses to succeed with any facet of creating a high-performing work-from-home environment by delivering network infrastructure design and configuration services, IP voice troubleshooting, voice/video conferencing integration, collaboration platform selection and deployment, cloud integration, helpdesk augmentation, data security, data protection solutions, and unified management.

Security and Compliance for Telecommuters
Work-from-Home (WFH) staff members commonly utilize their personal computers and usually work in a poorly secured physical environment. This situation multiplies their vulnerability to cyber threats and requires careful deployment of firewalls, anti-malware tools, multi-factor authentication, remote monitoring, extensive user training, and the development of policies built on best practices. Progent's seasoned team of cybersecurity solutions experts can assist you to plan, deploy and manage a compliant cybersecurity solution that guards vital IT resources in networks that include at-home workers.

Firewall Integration Services for At-Home WorkersFirewalls allow companies to create a network that can be securely utilized by local users as well as by teleworkers, mobile users, vendors, customers, and other stakeholders. Next-generation firewall devices permit you to configure and manage appropriate access rights to different classes of users and to expand your network and modify your security profile as your business evolves and as network attacks grow more sophisticated. Progent supports both current and legacy firewall appliances from all major manufacturers like Cisco, Palo Alto Networks, Check Point, Juniper, SonicWall and Fortinet. For details about Progent's firewall support services, refer to firewall integration and support services.

Remote Security Monitoring and Management for TelecommutersRemote Endpoint Monitoring makes it easy to watch over the disparate devices utilized by remote workers and either block or spot and respond to modern cyber attacks such as ransomware. With ProSight Active Security Monitoring (ASM) services, a lightweight agent is put on each secured endpoint device, watching all activity and using state-of-the-art machine learning from SentinelOne to detect new threats on arrival. When a cyberattack is spotted, ProSight Active Security Monitoring immediately isolates the impacted endpoint device from the network to contain the threat. Since the ProSight ASM software agent is autonomous, endpoints stay protected even when they are offline. Progent is a SentinelOne Partner, reseller, and integrator. For more information about ProSight ASM, refer to remote endpoint security monitoring for teleworkers.

Two-factor Authentication (2FA) Services for TeleworkersProgent's Duo authentication Managed Services utilize Cisco's Duo cloud technology to defend against compromised passwords by using two-factor authentication (2FA). Duo enables single-tap identity confirmation on iOS, Google Android, and other out-of-band devices. Using Duo 2FA, when you log into a protected online account and enter your password you are asked to verify who you are via a device that only you possess and that is accessed using a different ("out-of-band") network channel. A broad range of devices can be used as this added means of ID validation such as a smartphone or watch, a hardware/software token, a landline phone, etc. You may designate multiple verification devices. For more information about Duo two-factor identity validation services, go to Cisco Duo MFA two-factor authentication (2FA) services for teleworkers.

Security Audit Services for At-Home WorkersSecurity Audits can assess the exposure of your network to all classes of outside and internal security threats for a network that includes remote workers. Progent can deploy online, automated cybersecurity inventory software for quickly and affordably detecting a wide variety of security holes that can be found over the Internet. Progent's endpoint security assessment consulting services, which can be provided by security professionals with top certifications such as CISA, ISSAP, and GIAC, can help your business to audit your operations and governance policies and assess your WAN infrastructure to enable you to design the highest level of protection for your telecommuters.

NodeZero Pentetration Testing for Work-from-Home EnpointsHorizon3.ai's NodeZero PEN Testing Platform is a breakthrough penetration test (pentest) product family that supports automated threat assessment of your work-from-home connectivity solution as well as your internal and perimeter networks to help you expose, prioritize, remediate, and verify security weaknesses before threat actors can exploit them. Progent can assist you to use NodeZero to perform comprehensive penetration tests of your network perimeter and your internal IT infrastructure in order to evaluate your current security posture. Progent's NodeZero experts can also assist you to harden your existing network security and can help you to design and deploy a unified cybersecurity strategy that streamlines management and provides optimum cyber defense for on-prem, multi-cloud, at-home, and perimeter IT assets. To find out more details about Progent's vulnerability assessment solutions based on on NodeZero's PEN test products, refer to Consulting Services for NodeZero's Pentest Platform.

Download White Paper: Securing a Work-From-Home (WFH) Network
To view or download a white paper describing key areas to concentrate on for securing an IT environment that incorporates work-from-home staff, click:
Securing a Work-From-Home Network White Paper. (PDF - 2.4 MB)

Contact Progent for Remote Workforce Expertise
To contact Progent about building and managing an efficient work-from-home environment for your Akron, Ohio company, call 1-800-993-9400 or visit Contact Progent.