Expanding your at-home workforce may have a major effect on network infrastructure, security, and corporate processes. Progent has 20 years of experience assisting SMBs to design, deploy, manage, optimize, and troubleshoot IT environments that incorporate work-from-home employees. Progent can assist your Baltimore company to pick the right technologies and follow best practices in building and maintaining a safe virtual office ecosystem for telecommuters that promotes teamwork and returns top business value. Progent can provide services that go from as-needed guidance for helping you past challenging technical bottlenecks to comprehensive project management or co-management to help you carry out mission-critical initiatives.
Progent can help Baltimore, Maryland companies to succeed with any aspect of creating a high-performing work-at-home environment by providing infrastructure design and configuration services, VoIP PBX troubleshooting, voice/video conferencing integration, collaboration platform selection and deployment, public cloud connectivity, helpdesk augmentation, data security, backup/restore solutions, and centralized management.
Cybersecurity for At-Home Workers
At-home staff members typically use their own computers and often operate in a poorly secured physical environment. This multiplies their susceptibility to cyber attacks and calls for judicious configuration of corporate firewalls, anti-malware tools, multi-factor authentication, remote endpoint monitoring, intensive end-user education, and the development of security policies based on leading practices. Progent's seasoned group of IT security support consultants can help you to design, implement and maintain a compliant cybersecurity solution that protects vital IT assets in environments that incorporate remote workers.
Firewalls enable companies to create a network that can be securely accessed by local users and by an at-home workforce, mobile employees, vendors, customers, and the public. Next-generation firewall appliances allow you to assign and control appropriate permissions to different groups of users and to scale your network and adjust your cybersecurity posture as your company evolves and as cyber threats become more sophisticated. Progent supports both new and older security devices from all leading manufacturers like Cisco, Palo Alto Networks, WatchGuard, Juniper, and Fortinet. For details about Progent's firewall integration services, visit firewall integration and support services.
Online Endpoint Monitoring makes it possible to watch over the disparate devices utilized by teleworkers and either reject or spot and mitigate the latest threats like ransomware. With Progent's ProSight Active Security Monitoring (ASM) services, a small-footprint agent is installed on each protected endpoint, watching all activity and utilizing state-of-the-art machine learning from SentinelOne to detect zero-day attacks at inception. When a cyberattack is discovered, ProSight Active Security Monitoring immediately isolates the impacted endpoint from the corporate network to contain the malware. Since the ProSight ASM agent is autonomous, endpoints remain secure even if they are disconnected from the Internet. Progent is a SentinelOne Partner, reseller, and integrator. To learn more about ProSight ASM, see remote endpoint security monitoring for at-home workers.
Progent's Duo authentication managed services incorporate Cisco's Duo technology to protect against compromised passwords through the use of two-factor authentication. Duo enables single-tap identity confirmation on iOS, Google Android, and other out-of-band devices. With Duo 2FA, whenever you log into a protected application and give your password you are asked to verify who you are on a device that only you possess and that is accessed using a different ("out-of-band") network channel. A broad range of devices can be utilized as this second means of authentication such as a smartphone or watch, a hardware/software token, a landline telephone, etc. You can register multiple validation devices. To find out more about Duo two-factor identity validation services, go to Cisco Duo MFA two-factor authentication services for telecommuters.
Security Audits can evaluate the vulnerability of your information system to all classes of outside and local security attacks for an environment that incorporates at-home workers. Progent can run online, automated security analysis software for quickly and economically uncovering a wide variety of security gaps that can be found over the Internet. Progent's endpoint security assessment experts, which can be provided by network security professionals with advanced credentials such as CISM, ISSAP, and GIAC, can assist you to audit your procedures and policies and review your network architecture to allow you to implement top-level security for your telecommuters.
Download White Paper: Securing a Work-From-Home (WFH) Environment
To view or download a white paper about critical areas to concentrate on for securing an IT environment that incorporates telecommuters, click:
Protecting a Work-From-Home Environment White Paper. (PDF - 2.4 MB)
Contact Progent for At-Home Worker Expertise
To contact Progent about creating and managing a productive work-from-home solution for your Baltimore, Maryland company, call