Expanding your telecommuter workforce can have a major effect on IT architecture, cybersecurity, and company workflows. Progent has 20 years of experience assisting SMBs to plan, configure, manage, tune, and troubleshoot IT networks that incorporate work-from-home employees. Progent can help your Austin company to select the right technologies and adhere to leading practices in creating and maintaining a safe virtual office ecosystem for teleworkers that facilitates teamwork and returns top business value. Progent can provide support services that go from as-needed expertise for helping you over challenging IT roadblocks to comprehensive project management to help you successfully complete mission-critical initiatives.

Progent's consultants can assist Austin, Texas businesses to with any aspect of building a high-functioning work-from-home environment by providing infrastructure design and configuration services, IP voice troubleshooting, voice/video conferencing support, collaboration platform selection and deployment, cloud integration, helpdesk outsourcing, cybersecurity, data protection solutions, and centralized management.

Security for Teleworkers
Work-from-Home workers commonly use their personal devices and usually work in a poorly secured physical space. This situation multiplies their susceptibility to malware attacks and requires judicious configuration of firewalls, anti-malware tools, MFA-based identity verification, remote monitoring, intensive user education, and the development of security policies based on leading practices. Progent's veteran roster of cybersecurity solutions experts can help your business to plan, deploy and maintain an effective cybersecurity solution that protects critical IT resources in networks that incorporate remote workers.

Firewall Integration Services for At-Home WorkersFirewalls allow companies to create a network environment that can be securely utilized by local users and by at-home workers, mobile workers, vendors, clients, and the public. Modern firewall devices allow you to configure and control different permissions to different groups of users and to scale your network and modify your security as your business evolves and as network attacks become increasingly complex. Progent works with both current and legacy security devices from all leading manufacturers including Cisco, Palo Alto Networks, WatchGuard, Juniper, SonicWall and Fortinet. For more information about Progent's firewall integration services, see firewall support services.

Remote Endpoint Monitoring and Management Services for At-Home WorkersOnline Endpoint Monitoring makes it easy to track the various computers utilized by teleworkers and either block or identify and respond to modern threats such as ransomware. With Progent's ProSight Active Security Monitoring (ASM) services, a lightweight software agent is installed on each secured endpoint device, watching all activity and using state-of-the-art behavioral threat analysis from SentinelOne to identify zero-day attacks at inception. When an attack is spotted, ProSight Active Security Monitoring instantly isolates the infected endpoint from the network to quarantine the threat. Since the ProSight Active Security Monitoring software agent is self-contained, endpoints remain protected even when they are not connected to the Internet. Progent is a SentinelOne Partner, dealer, and integrator. To learn more about ProSight ASM, visit remote endpoint monitoring for remote workers.

Two-factor Authentication Services for Remote WorkersProgent's Duo MFA Managed Services utilize Cisco's Duo technology to defend against compromised passwords through the use of two-factor authentication (2FA). Duo supports single-tap identity verification with iOS, Google Android, and other personal devices. Using 2FA, when you log into a secured application and enter your password you are requested to verify your identity on a unit that only you have and that is accessed using a separate network channel. A wide range of out-of-band devices can be utilized for this added form of ID validation such as a smartphone or wearable, a hardware/software token, a landline phone, etc. You may register multiple verification devices. To find out more about Duo two-factor identity authentication services, go to Cisco Duo MFA two-factor authentication services for telecommuters.

Security Audit Services for At-Home WorkersSecurity Audits can assess the vulnerability of your information system to all classes of outside and internal security threats for a network that includes teleworkers. Progent can run online, automated security analysis software for rapidly and affordably uncovering a wide variety of security holes that can be surfaced over the Internet. Progent's endpoint security audit experts, which can be provided by network security experts with advanced credentials including CISA, CISSP, and GIAC, can assist your business to audit your workflows and governance policies and review your IT infrastructure to allow you to design top-level protection for your at-home workers.

NodeZero Pen Testing for At-Home WorkersHorizon3.ai's NodeZero Penetration Testing Platform is a cutting-edge penetration test (pentest) product family that supports automated testing of your at-home connectivity solution as well as your internal and perimeter networks so you can uncover, prioritize, remediate, and verify cybersecurity vulnerabilities before threat actors can exploit them. Progent's pentest experts can assist you to use NodeZero to perform comprehensive penetration tests of your perimeter and your internal IT infrastructure so you can determine your present security profile. Progent's NodeZero experts can also assist you to harden your existing network security and can help you to design and implement a cohesive cybersecurity strategy that streamlines management and delivers maximum protection for on-prem, multi-cloud, remote, and perimeter IT resources. To find out additional details about Progent's vulnerability assessment services powered by on NodeZero's penetration test platform, refer to Consulting Support for NodeZero's Penetration Test Platform.

Download White Paper: Protecting a Work-From-Home Network
To view or download a white paper describing key things to concentrate on for protecting an IT environment that incorporates telecommuters, click:
Protecting a Work-From-Home (WFH) Environment White Paper. (PDF - 2.4 MB)

Contact Progent for Telecommuter Expertise
To get in touch with Progent about creating and managing an efficient telecommuter environment for your Austin, Texas business, call 1-800-993-9400 or go to Contact Progent.