Expanding your at-home workforce may have a major impact on IT architecture, cybersecurity, and company processes. Progent has two decades of experience assisting small and mid-size businesses to plan, deploy, administer, optimize, and troubleshoot IT environments that support a remote workforce. Progent can help your Atlanta organization to select the appropriate tools and adhere to leading practices in creating and maintaining a secure virtual office solution for telecommuters that promotes collaboration and delivers maximum business value. Progent offers support services that go from on demand expertise for helping you over challenging IT roadblocks to comprehensive project management or co-management to help you carry out mission-critical initiatives.
Progent can help Atlanta, Georgia businesses to with any aspect of building a high-performing work-at-home environment by providing infrastructure design and configuration services, IP voice troubleshooting, voice/video conferencing support, collaboration platform customization and training, cloud connectivity, Call Desk services, security and compliance, data protection solutions, and centralized management.
Cybersecurity for Remote Workers
Work-from-Home workers typically utilize their own devices and usually work in an unsecured physical space. This situation multiplies their vulnerability to cyber attacks and calls for judicious deployment of corporate firewalls, AV tools, multi-factor authentication, remote monitoring, thorough end-user education, and the development of security policies built on best practices. Progent's seasoned roster of data security support consultants can assist you to plan, configure and maintain a compliant cybersecurity solution that protects critical IT resources in environments that incorporate remote workers.
Firewalls enable you to create a network environment that can be securely utilized by on-premises users as well as by an at-home workforce, mobile employees, vendors, clients, and other stakeholders. Modern firewall devices permit you to configure and control appropriate permissions to various groups of users and to expand your network and modify your security as your business evolves and as cyber threats become increasingly complex. Progent supports both current and legacy security appliances from all major vendors like Cisco, Palo Alto Networks, WatchGuard, Juniper, SonicWall and Fortinet. For more information about Progent's firewall integration expertise, visit firewall configuration and support services.
Remote Endpoint Security Monitoring makes it easy to watch over the various computers used by at-home workers and either block or identify and mitigate the latest cyber attacks like ransomware. With Progent's ProSight Active Security Monitoring (ASM) services, a small-footprint software agent is put on every secured endpoint device, monitoring all activity and using state-of-the-art machine learning and full execution context from SentinelOne to identify new attacks at inception. When a cyberattack is discovered, ProSight ASM immediately isolates the infected endpoint from the network to contain the threat. Since the ProSight Active Security Monitoring software agent is autonomous, endpoints remain secure even if they are disconnected from the Internet. For more information about ProSight ASM, visit remote endpoint security monitoring for at-home workers.
Progent's Duo authentication services incorporate Cisco's Duo technology to protect against compromised passwords by using two-factor authentication (2FA). Duo supports one-tap identity verification on Apple iOS, Android, and other personal devices. Using 2FA, when you sign into a protected online account and enter your password you are requested to verify your identity via a device that only you possess and that is accessed using a separate network channel. A wide selection of out-of-band devices can be used for this added form of authentication such as a smartphone or wearable, a hardware token, a landline phone, etc. You can register several verification devices. For details about ProSight Duo identity authentication services, visit Duo MFA two-factor authentication services for remote workers.
Security Audits can assess the exposure of your network to all types of external and local security attacks for an environment that includes remote workers. Progent can run remote, automated cybersecurity analysis software for rapidly and affordably uncovering a wide variety of security weaknesses that can be surfaced via the Internet. Progent's endpoint security assessment experts, which can be managed by security professionals with advanced certifications such as CISA, CISSP, and GIAC, can help your business to evaluate your operations and governance policies and assess your WAN architecture to enable you to implement the highest level of security for your at-home workers.
Download White Paper: Securing a Work-From-Home Network
To view or download a white paper describing key things to concentrate on for protecting an IT environment that supports telecommuters, click:
Securing a Work-From-Home Environment White Paper. (PDF - 2.4 MB)
Contact Progent for Telecommuter Support Services
To contact Progent about creating and managing an efficient telecommuter solution for your Atlanta, Georgia company, phone 1-800-993-9400 or visit Contact Progent.