Expanding your telecommuter workforce may have a significant effect on IT architecture, security, and corporate workflows. Progent has two decades of experience helping businesses of all sizes to plan, configure, administer, tune, and troubleshoot IT networks that incorporate work-from-home employees. Progent can assist your Austin organization to select the right tools and adhere to leading practices in creating and maintaining a secure virtual office ecosystem for telecommuters that promotes collaboration and returns maximum business value. Progent can provide support services that go from on demand guidance for helping you over occasional technical bottlenecks to comprehensive project management to help you successfully complete business-critical tasks.
Progent can help Austin, Texas organizations to succeed with any aspect of creating a high-performing work-at-home ecosystem by delivering infrastructure configuration services, VoIP PBX troubleshooting, voice/video conferencing integration, collaboration platform customization and training, public cloud connectivity, Help Desk augmentation, security monitoring, data protection solutions, and centralized management.
Security for Telecommuters
Work-from-Home workers commonly utilize their personal computers and usually work in an unsecured physical environment. This situation multiplies their susceptibility to cyber attacks and calls for judicious configuration of firewalls, anti-malware tools, multi-factor authentication, remote monitoring, intensive end-user training, and the creation of policies built on leading practices. Progent's seasoned team of cybersecurity solutions consultants can help you to plan, implement and maintain a compliant security solution that protects critical information resources in networks that incorporate telecommuters.
Firewalls allow companies to create a network that can be safely accessed by local users and by telecommuters, mobile workers, vendors, customers, and other stakeholders. Next-generation firewall appliances permit you to assign and control appropriate permissions to various classes of users and to scale your network and adjust your security profile as your company evolves and as network attacks become more complex. Progent supports both new and legacy security appliances from all leading vendors including Cisco, Palo Alto Networks, Check Point, Juniper, SonicWall and Fortinet. For details about Progent's firewall integration expertise, refer to firewall configuration and support expertise.
Online Endpoint Security Monitoring makes it possible to watch over the various computers used by remote workers and either block or spot and respond to the latest threats such as ransomware. With ProSight Active Security Monitoring (ASM) services, a small-footprint agent is put on every secured endpoint, watching all activity and utilizing advanced machine learning to identify new threats before they can spread. When an attack is spotted, ProSight ASM immediately isolates the impacted endpoint from the corporate network to contain the threat. Because the ProSight Active Security Monitoring agent is autonomous, endpoint devices remain secure even when they are disconnected from the Internet. For details about ProSight Active Security Monitoring, see remote endpoint security monitoring for teleworkers.
Progent's Duo authentication managed services incorporate Cisco's Duo cloud technology to protect against stolen passwords by using two-factor authentication. Duo enables single-tap identity verification on iOS, Google Android, and other out-of-band devices. Using 2FA, when you log into a secured application and enter your password you are asked to confirm your identity on a unit that only you possess and that uses a different ("out-of-band") network channel. A wide selection of out-of-band devices can be used as this added form of authentication such as a smartphone or wearable, a hardware token, a landline telephone, etc. You can register several validation devices. For more information about Duo identity authentication services, refer to Duo MFA two-factor authentication (2FA) services for telecommuters.
Security Audits can evaluate the exposure of your network to all classes of external and local security threats for an environment that incorporates telecommuters. Progent can run remote, automated security inventory software for quickly and affordably detecting a broad range of security holes that can be surfaced over the Internet. Progent's endpoint security audit consulting services, which can be managed by data security experts with advanced certifications including CISM, ISSAP, and GIAC, can help you to audit your operations and policies and review your network infrastructure to enable you to implement the highest level of protection for your remote workers.
Download White Paper: Securing a Work-From-Home (WFH) Network
To view or download a white paper about critical things to focus on for protecting an IT environment that incorporates work-from-home staff, click:
Protecting a Work-From-Home (WFH) Environment White Paper. (PDF - 2.4 MB)
Contact Progent for At-Home Worker Expertise
To contact Progent about creating and maintaining an efficient work-from-home environment for your Austin, Texas business, phone 1-800-993-9400 or refer to Contact Progent.