Enlarging your telecommuter workforce can have a significant impact on network infrastructure, security/compliance, and corporate culture. Progent has 20 years of background assisting small and mid-size businesses to design, deploy, administer, tune, and troubleshoot IT networks that support work-from-home employees. Progent can assist your Austin company to select the right tools and adhere to leading practices in creating and operating a secure virtual office ecosystem for telecommuters that facilitates collaboration and returns top business value. Progent offers support services ranging from as-needed expertise for helping you past occasional technical roadblocks to comprehensive project management to help you carry out business-critical tasks.
Progent's consultants can assist Austin, Texas businesses to succeed with any facet of creating a high-functioning work-at-home environment by providing network infrastructure design and configuration services, IP voice expertise, voice/video conferencing integration, collaboration platform selection and deployment, public cloud connectivity, Call Desk services, endpoint security, data protection solutions, and unified management.
Security for Remote Workers
Work-from-Home staff members commonly use their personal computing devices and often operate in an unsecured physical area. This situation increases their vulnerability to cyber threats and requires judicious deployment of firewalls, anti-malware tools, multi-factor authentication, remote endpoint monitoring, extensive user training, and the development of security policies built on leading practices. Progent's seasoned group of cybersecurity solutions consultants can assist you to design, configure and manage an effective cybersecurity solution that protects critical IT assets in environments that include an at-home workforce.
Firewalls allow you to create a network environment that can be safely accessed by on-premises users as well as by at-home workers, mobile employees, vendors, customers, and other stakeholders. Next-generation firewall appliances permit you to assign and control appropriate permissions to various groups of users and to scale your IT network and modify your security as your company evolves and as network attacks become more sophisticated. Progent supports both new and legacy firewall devices from all major manufacturers including Cisco, Palo Alto Networks, Check Point, Juniper, SonicWall and Fortinet. To learn more about Progent's firewall integration services, go to firewall integration and support expertise.
Remote Endpoint Security Monitoring makes it possible to track the various devices used by remote workers and either block or spot and mitigate the latest threats such as ransomware. With ProSight Active Security Monitoring services, a lightweight agent is put on each secured endpoint, watching all activity and utilizing advanced machine learning and full execution context from SentinelOne to identify new threats at inception. When a cyberattack is spotted, ProSight Active Security Monitoring immediately disconnects the infected endpoint from the network to contain the threat. Because the ProSight Active Security Monitoring agent is autonomous, endpoints remain secure even if they are not connected to the Internet. Progent is a SentinelOne Partner, dealer, and integrator. For details about ProSight Active Security Monitoring, go to remote endpoint security monitoring for remote workers.
Progent's Duo authentication services incorporate Cisco's Duo technology to defend against password theft through the use of two-factor authentication. Duo enables single-tap identity confirmation on Apple iOS, Google Android, and other personal devices. With Duo 2FA, when you sign into a protected application and enter your password you are asked to confirm who you are via a unit that only you have and that is accessed using a different network channel. A wide selection of devices can be utilized as this added form of ID validation such as a smartphone or watch, a hardware token, a landline telephone, etc. You may register several verification devices. For details about ProSight Duo two-factor identity validation services, visit Cisco Duo MFA two-factor authentication (2FA) services for remote workers.
Security Audits can evaluate the exposure of your information system to all types of outside and internal security attacks for an environment that incorporates at-home workers. Progent can deploy remote, automated cybersecurity analysis software for quickly and economically detecting a wide variety of security holes that can be surfaced over the Internet. Progent's endpoint security audit consulting services, which can be managed by security professionals with top credentials such as CISA, CISSP, and GIAC, can assist your company to evaluate your workflows and governance policies and assess your network infrastructure to allow you to implement the highest level of protection for your remote workers.
Download White Paper: Protecting a Work-From-Home Network
To read or download a white paper about critical things to concentrate on for securing an IT environment that incorporates telecommuters, click:
Securing a Work-From-Home (WFH) Network White Paper. (PDF - 2.4 MB)
Contact Progent for Telecommuter Support Services
To contact Progent about building and managing a productive telecommuter environment for your Austin, Texas company, phone 1-800-993-9400 or refer to Contact Progent.