Enlarging your at-home workforce can have a major effect on IT architecture, security, and corporate processes. Progent has 20 years of background helping small and mid-size businesses to design, deploy, manage, tune, and troubleshoot IT networks that incorporate work-from-home employees. Progent can assist your Akron company to select the right technologies and adhere to best practices in building and operating a safe virtual office solution for telecommuters that facilitates collaboration and delivers maximum value. Progent offers services that go from on demand expertise for getting you past occasional technical bottlenecks to full project management or co-management to help you carry out business-critical tasks.

Progent can help Akron, Ohio organizations to succeed with any aspect of creating a high-functioning telecommuting environment by providing infrastructure configuration services, IP voice expertise, voice/video conferencing integration, collaboration platform selection and deployment, cloud integration, Help Desk augmentation, endpoint security, backup/restore solutions, and streamlined management.

Security and Compliance for Remote Workers
At-home staff members commonly use their own computing devices and usually operate in an unsecured physical environment. This multiplies their susceptibility to malware attacks and requires careful configuration of corporate firewalls, AV tools, multi-factor authentication, remote monitoring, intensive end-user training, and the development of policies built on leading practices. Progent's veteran roster of cybersecurity support consultants can help your business to plan, implement and manage a compliant cybersecurity solution that guards critical IT assets in environments that include telecommuters.

Firewall Integration Services for At-Home WorkersFirewalls enable you to build a network environment that can be safely utilized by on-premises users as well as by telecommuters, mobile employees, suppliers, clients, and the public. Next-generation firewall devices permit you to assign and manage appropriate permissions to various groups of users and to expand your network and adjust your security profile as your business evolves and as network attacks grow more complex. Progent works with both current and older security appliances from all major manufacturers like Cisco, Palo Alto Networks, WatchGuard, Juniper, SonicWall and Fortinet. To find out more about Progent's firewall configuration expertise, go to firewall integration and support expertise.

Remote Endpoint Monitoring and Management Services for At-Home WorkersRemote Endpoint Security Monitoring makes it possible to track the disparate computers utilized by remote workers and either reject or identify and mitigate the latest threats such as ransomware. With Progent's ProSight Active Security Monitoring services, a lightweight agent is installed on each protected endpoint device, monitoring all activity and using state-of-the-art behavioral threat analysis from SentinelOne to identify new attacks before they can spread. When an attack is spotted, ProSight Active Security Monitoring instantly disconnects the impacted endpoint device from the network to quarantine the malware. Since the ProSight Active Security Monitoring software agent is self-contained, endpoints stay secure even when they are not connected to the Internet. Progent is a SentinelOne Partner, reseller, and integrator. For details about ProSight Active Security Monitoring, go to remote endpoint security monitoring for remote workers.

Two-factor Authentication Services for TeleworkersProgent's Duo authentication Managed Services incorporate Cisco's Duo technology to defend against compromised passwords by using two-factor authentication (2FA). Duo enables single-tap identity confirmation with iOS, Android, and other out-of-band devices. Using Duo 2FA, whenever you log into a secured application and enter your password you are asked to confirm who you are on a unit that only you have and that uses a different ("out-of-band") network channel. A broad selection of devices can be utilized as this added means of ID validation including an iPhone or Android or wearable, a hardware token, a landline telephone, etc. You may designate multiple validation devices. To find out more about ProSight Duo two-factor identity validation services, refer to Cisco Duo MFA two-factor authentication services for telecommuters.

Security Audit Services for At-Home WorkersSecurity Audits can evaluate the exposure of your information system to all classes of external and local security attacks for a network that includes an at-home workforce. Progent can run online, automated cybersecurity analysis scanning for rapidly and affordably uncovering a broad range of security holes that can be surfaced over the Internet. Progent's security assessment experts, which can be managed by network security professionals with top credentials including CISA, CISSP, and GIAC, can help you to evaluate your processes and policies and assess your network architecture to allow you to design the highest level of security for your an at-home workforce.

NodeZero Pen Testing for Work-from-Home EnpointsHorizon3.ai's NodeZero Penetration Testing Platform is a breakthrough penetration test (pentest) product family that supports automated testing of your work-from-home connectivity solution as well as your internal and perimeter networks to help you find, prioritize, fix, and confirm cybersecurity weaknesses before threat actors can take advantage of them. Progent can help you to deploy NodeZero to perform thorough penetration tests of your network perimeter and your internal IT infrastructure so you can determine your present security profile. Progent can also assist you to harden your existing network security and can assist you to plan and deploy a cohesive cybersecurity ecosystem that streamlines management and provides maximum protection for on-premises, multi-cloud, remote, and perimeter IT assets. To find out more details about Progent's vulnerability analysis services powered by on NodeZero's PEN test platform, refer to Consulting Support for NodeZero's Penetration Test Platform.

Download White Paper: Protecting a Work-From-Home Network
To view or download a white paper about key things to concentrate on for securing an IT environment that supports work-from-home staff, click:
Securing a Work-From-Home Environment White Paper. (PDF - 2.4 MB)

Contact Progent for Remote Workforce Expertise
To contact Progent about building and maintaining an efficient work-from-home environment for your Akron, Ohio organization, call 1-800-993-9400 or visit Contact Progent.