Expanding your telecommuter workforce can have a significant effect on network infrastructure, security, and company culture. Progent has two decades of background assisting businesses of all sizes to design, deploy, manage, optimize, and troubleshoot IT networks that support at-home workers. Progent can help your Austin company to pick the right technologies and adhere to leading practices in creating and maintaining a secure virtual ecosystem for teleworkers that promotes teamwork and delivers top value. Progent offers support services that go from as-needed guidance for helping you past challenging technical roadblocks to comprehensive project management or co-management to help you carry out mission-critical tasks.
Progent can help Austin, Texas companies to with any facet of creating a high-performing work-at-home environment by delivering network infrastructure configuration services, IP voice troubleshooting, voice/video conferencing integration, collaboration platform customization and training, cloud integration, Call Desk augmentation, security monitoring, data protection solutions, and unified management.
Security and Compliance for Telecommuters
Work-from-Home staff members typically use their personal devices and often operate in a poorly secured physical environment. This situation multiplies their vulnerability to cyber attacks and calls for careful configuration of firewalls, anti-malware tools, MFA-based identity verification, remote monitoring, intensive user education, and the creation of policies based on leading practices. Progent's seasoned group of cybersecurity solutions experts can assist your business to design, configure and maintain a compliant security solution that guards critical information resources in networks that incorporate telecommuters.
Firewalls allow companies to build a network that can be securely utilized by on-premises users as well as by an at-home workforce, mobile users, suppliers, customers, and the public. Modern firewall appliances allow you to configure and control different permissions to various groups of users and to expand your network and adjust your cybersecurity posture as your company evolves and as network attacks become more complex. Progent works with both new and older security appliances from all leading vendors including Cisco, Palo Alto Networks, WatchGuard, Juniper, SonicWall and Fortinet. To learn more about Progent's firewall integration services, go to firewall integration and support services.
Online Endpoint Monitoring makes it easy to track the various computers used by teleworkers and either block or spot and respond to modern cyber attacks like ransomware. With Progent's ProSight Active Security Monitoring services, a lightweight software agent is put on each protected endpoint, watching all activity and using advanced machine learning and full execution context from SentinelOne to identify new threats before they can spread. When an attack is spotted, ProSight Active Security Monitoring instantly isolates the impacted device from the corporate network to contain the threat. Since the ProSight Active Security Monitoring agent is self-contained, endpoints remain protected even when they are offline. For more information about ProSight Active Security Monitoring, visit remote endpoint security monitoring for at-home workers.
Progent's Duo authentication services incorporate Cisco's Duo technology to protect against stolen passwords through the use of two-factor authentication. Duo supports single-tap identity confirmation with iOS, Android, and other personal devices. Using Duo 2FA, when you log into a secured application and enter your password you are requested to confirm who you are on a device that only you have and that is accessed using a different ("out-of-band") network channel. A broad selection of devices can be used for this second form of ID validation including a smartphone or wearable, a hardware/software token, a landline phone, etc. You may designate multiple verification devices. For details about Duo identity validation services, see Cisco Duo MFA two-factor authentication (2FA) services for at-home workers.
Security Audits can assess the exposure of your information system to all types of external and local security attacks for an environment that includes an at-home workforce. Progent can deploy remote, automated cybersecurity analysis software for rapidly and affordably detecting a wide variety of security gaps that can be surfaced over the Internet. Progent's endpoint security audit experts, which can be managed by security professionals with advanced certifications such as CISA, CISSP, and GIAC, can assist you to evaluate your processes and governance policies and review your WAN infrastructure to enable you to design top-level protection for your teleworkers.
Download White Paper: Protecting a Work-From-Home Environment
To view or download a white paper describing key things to focus on for securing a network that includes telecommuters, click:
Securing a Work-From-Home (WFH) Network White Paper. (PDF - 2.4 MB)
Contact Progent for Remote Workforce Expertise
To contact Progent about creating and maintaining an efficient telecommuter environment for your Austin, Texas business, call 1-800-993-9400 or go to Contact Progent.