Expanding your at-home workforce may have a major impact on IT infrastructure, security/compliance, and company workflows. Progent has 20 years of background assisting businesses of all sizes to design, deploy, administer, tune, and debug IT networks that incorporate a remote workforce. Progent can help your Augusta-Richmond County organization to select the right technologies and follow best practices in building and maintaining a secure virtual office ecosystem for telecommuters that promotes teamwork and delivers maximum value. Progent offers services ranging from as-needed expertise for getting you over occasional IT bottlenecks to full project management or co-management to help you carry out mission-critical tasks.
Progent can assist Augusta-Richmond County, Georgia companies to with any facet of building a high-functioning work-at-home ecosystem by delivering infrastructure design and configuration services, VoIP PBX troubleshooting, video conferencing integration, collaboration platform selection and deployment, public cloud integration, helpdesk augmentation, security and compliance, backup/restore solutions, and centralized management.
Security for At-Home Workers
Work-from-Home (WFH) staff members commonly utilize their own computing devices and often operate in an unsecured physical space. This increases their vulnerability to cyber threats and requires judicious configuration of corporate firewalls, AV tools, multi-factor authentication, remote monitoring, extensive end-user training, and the development of policies built on best practices. Progent's seasoned group of cybersecurity support experts can assist you to design, configure and manage a compliant security solution that protects critical IT resources in networks that incorporate an at-home workforce.
Firewalls enable companies to build a network environment that can be securely utilized by local users and by at-home workers, mobile workers, vendors, clients, and other stakeholders. Next-generation firewall appliances allow you to assign and manage different access rights to various groups of users and to scale your IT network and adjust your security as your company evolves and as cyber threats become increasingly complex. Progent supports both current and older security devices from all leading vendors like Cisco, Palo Alto Networks, Check Point, Juniper, and Fortinet. For more information about Progent's firewall support services, go to firewall support expertise.
Remote Endpoint Security Monitoring makes it easy to watch over the various computers utilized by teleworkers and either block or spot and respond to modern cyber attacks such as ransomware. With ProSight Active Security Monitoring (ASM) services, a lightweight agent is installed on each secured endpoint device, monitoring all activity and using state-of-the-art machine learning from SentinelOne to detect zero-day attacks on arrival. When a cyberattack is spotted, ProSight Active Security Monitoring immediately isolates the targeted endpoint device from the corporate network to quarantine the threat. Since the ProSight Active Security Monitoring agent is autonomous, endpoints remain protected even if they are disconnected from the Internet. Progent is a SentinelOne Partner, reseller, and integrator. To find out more about ProSight ASM, refer to remote endpoint monitoring for remote workers.
Progent's Duo MFA services utilize Cisco's Duo cloud technology to defend against compromised passwords through the use of two-factor authentication. Duo enables one-tap identity verification on iOS, Google Android, and other personal devices. With Duo 2FA, when you sign into a secured online account and enter your password you are requested to verify your identity via a device that only you possess and that uses a separate network channel. A broad selection of out-of-band devices can be utilized for this added form of ID validation including an iPhone or Android or wearable, a hardware/software token, a landline phone, etc. You can register multiple validation devices. For details about Duo two-factor identity validation services, refer to Cisco Duo MFA two-factor authentication (2FA) services for an at-home workforce.
Security Audits can evaluate the exposure of your information system to all classes of external and local security attacks for an environment that incorporates remote workers. Progent can run online, automated cybersecurity analysis scanning for rapidly and economically uncovering a wide variety of security holes that can be surfaced over the Internet. Progent's security assessment experts, which can be provided by security professionals with advanced credentials such as CISM, ISSAP, and GIAC, can assist you to audit your processes and policies and review your IT architecture to allow you to design top-level protection for your remote workers.
Download White Paper: Protecting a Work-From-Home (WFH) Environment
To read or download a white paper describing key areas to focus on for securing an IT environment that supports telecommuters, click:
Protecting a Work-From-Home Environment White Paper. (PDF - 2.4 MB)
Contact Progent for Remote Workforce Support Services
To get in touch with Progent about building and managing a productive telecommuter environment for your Augusta-Richmond County, Georgia organization, call