Enlarging your at-home workforce may have a significant impact on IT architecture, security/compliance, and corporate workflows. Progent has two decades of experience assisting SMBs to design, deploy, administer, optimize, and debug IT environments that incorporate work-from-home employees. Progent can assist your Atlanta company to pick the appropriate technologies and adhere to best practices in creating and maintaining a secure virtual ecosystem for teleworkers that promotes teamwork and returns top business value. Progent can provide support services that go from on demand expertise for getting you past challenging IT roadblocks to full project management to help you carry out business-critical tasks.

Progent can help Atlanta, Georgia companies to succeed with any aspect of creating a high-performing telecommuting ecosystem by providing infrastructure design and configuration services, IP voice troubleshooting, voice/video conferencing integration, collaboration platform customization and training, cloud integration, Help Desk outsourcing, security monitoring, backup/restore solutions, and centralized management.

Security for Telecommuters
At-home workers commonly utilize their own computers and often work in an unsecured physical environment. This situation multiplies their vulnerability to cyber attacks and requires careful configuration of corporate firewalls, anti-malware tools, multi-factor authentication, remote endpoint monitoring, extensive end-user education, and the development of policies built on leading practices. Progent's seasoned team of cybersecurity solutions experts can assist you to design, deploy and manage a compliant security solution that protects vital IT assets in networks that incorporate remote workers.

Firewall Integration Services for At-Home WorkersFirewalls allow companies to create a network environment that can be safely accessed by local users as well as by at-home workers, mobile users, suppliers, clients, and other stakeholders. Next-generation firewall devices permit you to configure and control different access rights to different groups of users and to expand your network and modify your cybersecurity posture as your business evolves and as cyber threats become increasingly sophisticated. Progent works with both new and older security devices from all leading manufacturers like Cisco, Palo Alto Networks, Check Point, Juniper, SonicWall and Fortinet. For more information about Progent's firewall integration expertise, refer to firewall integration and support expertise.

Remote Endpoint Monitoring and Management for TelecommutersRemote Endpoint Security Monitoring makes it easy to watch over the disparate devices used by at-home workers and either block or spot and respond to modern cyber attacks like ransomware. With ProSight Active Security Monitoring (ASM) services, a small-footprint software agent is installed on each secured endpoint device, monitoring all activity and using advanced behavioral threat analysis from SentinelOne to detect new threats at inception. When an attack is spotted, ProSight ASM immediately isolates the infected endpoint device from the corporate network to quarantine the malware. Because the ProSight ASM software agent is autonomous, endpoints remain protected even if they are offline. Progent is a SentinelOne Partner, dealer, and integrator. For more information about ProSight Active Security Monitoring, visit remote endpoint monitoring for an at-home workforce.

Two-factor Authentication (2FA) Services for At-Home WorkersProgent's Duo MFA Service Plans incorporate Cisco's Duo technology to defend against stolen passwords by using two-factor authentication. Duo enables single-tap identity verification with iOS, Google Android, and other out-of-band devices. With 2FA, whenever you log into a protected online account and give your password you are requested to confirm who you are on a unit that only you have and that is accessed using a different ("out-of-band") network channel. A broad range of devices can be used as this second form of authentication such as an iPhone or Android or watch, a hardware/software token, a landline phone, etc. You can designate several verification devices. To find out more about ProSight Duo identity authentication services, go to Cisco Duo MFA two-factor authentication services for remote workers.

Security Audit Services for At-Home WorkersSecurity Audits can evaluate the exposure of your information system to all types of outside and internal security threats for an environment that includes teleworkers. Progent can run online, automated security inventory software for quickly and affordably uncovering a broad range of security gaps that can be found via the Internet. Progent's endpoint security audit consulting services, which can be managed by data security professionals with advanced credentials including CISM, CISSP, and GIAC, can assist you to audit your operations and governance policies and assess your network architecture to allow you to implement the highest level of security for your telecommuters.

NodeZero Pentetration Testing for Work-from-Home EnpointsHorizon3.ai's NodeZero PEN Testing Platform is a breakthrough penetration test (pentest) product family that supports automated testing of your work-from-home environment and your internal and perimeter networks to help you uncover, rank, fix, and confirm cybersecurity weaknesses before threat actors can exploit them. Progent can assist you to deploy NodeZero to perform comprehensive penetration tests of your perimeter and your internal IT infrastructure so you can evaluate your present security posture. Progent's NodeZero experts can also help you to harden your network security and can help you to design and deploy a cohesive cybersecurity strategy that streamlines management and provides optimum cyber defense for on-premises, multi-cloud, at-home, and perimeter IT resources. To find out more details about Progent's vulnerability analysis solutions powered by on NodeZero's penetration test products, visit Consulting Support for NodeZero's Pentest Platform.

Download White Paper: Protecting a Work-From-Home Network
To view or download a white paper describing key things to focus on for securing an IT environment that incorporates telecommuters, click:
Protecting a Work-From-Home (WFH) Environment White Paper. (PDF - 2.4 MB)

Contact Progent for At-Home Worker Expertise
To contact Progent about building and maintaining an efficient work-from-home solution for your Atlanta, Georgia company, call 1-800-993-9400 or visit Contact Progent.