Expanding your at-home workforce may have a significant impact on network infrastructure, cybersecurity, and company culture. Progent has 20 years of experience helping small and mid-size businesses to plan, configure, manage, tune, and debug IT networks that incorporate at-home workers. Progent can assist your Baltimore organization to select the appropriate tools and follow best practices in building and maintaining a safe virtual office solution for teleworkers that promotes collaboration and returns maximum business value. Progent can provide services ranging from on demand expertise for helping you over challenging technical bottlenecks to comprehensive project management to help you carry out business-critical initiatives.
Progent can help Baltimore, Maryland organizations to succeed with any facet of building a high-functioning telecommuting environment by delivering infrastructure configuration services, IP voice troubleshooting, video conferencing support, collaboration platform customization and training, public cloud connectivity, Help Desk outsourcing, endpoint security, backup/restore solutions, and unified management.
Cybersecurity for At-Home Workers
Work-from-Home (WFH) employees commonly utilize their personal computing devices and usually work in an unsecured physical area. This increases their vulnerability to malware threats and calls for careful configuration of corporate firewalls, anti-malware tools, multi-factor authentication, remote monitoring, extensive end-user training, and the development of security policies built on best practices. Progent's veteran team of data security solutions consultants can help you to design, configure and maintain an effective cybersecurity solution that protects critical information assets in networks that include telecommuters.
Firewalls allow you to build a network that can be securely accessed by on-premises users as well as by at-home workers, mobile employees, vendors, customers, and other stakeholders. Next-generation firewall appliances permit you to configure and control different access rights to different classes of users and to expand your network and modify your cybersecurity posture as your business evolves and as network attacks become more sophisticated. Progent supports both new and older firewall appliances from all leading manufacturers including Cisco, Palo Alto Networks, Check Point, Juniper, and Fortinet. For more information about Progent's firewall integration expertise, refer to firewall integration and support expertise.
Remote Endpoint Monitoring makes it easy to track the disparate devices utilized by telecommuters and either reject or identify and respond to the latest cyber attacks such as ransomware. With ProSight Active Security Monitoring services, a lightweight agent is installed on every secured endpoint, monitoring all activity and utilizing advanced machine learning and full execution context from SentinelOne to identify new threats before they can spread. When a cyberattack is discovered, ProSight ASM immediately disconnects the targeted endpoint from the corporate network to contain the malware. Because the ProSight Active Security Monitoring software agent is self-contained, endpoint devices remain protected even when they are not connected to the Internet. Progent is a SentinelOne Partner, dealer, and integrator. To learn more about ProSight Active Security Monitoring, go to remote endpoint monitoring for teleworkers.
Progent's Duo authentication Managed Services incorporate Cisco's Duo cloud technology to defend against stolen passwords by using two-factor authentication (2FA). Duo supports one-tap identity verification with iOS, Android, and other out-of-band devices. Using 2FA, when you sign into a secured online account and enter your password you are requested to confirm who you are on a unit that only you have and that uses a separate network channel. A broad selection of out-of-band devices can be utilized as this added means of ID validation including an iPhone or Android or watch, a hardware/software token, a landline phone, etc. You can register multiple validation devices. For more information about ProSight Duo identity authentication services, see Cisco Duo MFA two-factor authentication (2FA) services for telecommuters.
Security Audits can evaluate the vulnerability of your information system to all types of outside and internal security attacks for a network that includes at-home workers. Progent can run remote, automated security inventory software for quickly and economically uncovering a wide variety of security gaps that can be found over the Internet. Progent's endpoint security assessment consulting services, which can be managed by network security experts with top certifications including CISA, ISSAP, and GIAC, can assist you to evaluate your workflows and governance policies and review your network infrastructure to allow you to design the highest level of security for your remote workers.
Horizon3.ai's NodeZero Penetration Testing Platform is a cutting-edge penetration test (pentest) product family that can deliver automated testing of your at-home environment and your internal and perimeter networks so you can find, prioritize, fix, and confirm cybersecurity vulnerabilities before malicious hackers can exploit them. Progent can help you to use NodeZero to perform thorough pentests of your perimeter and your internal IT infrastructure so you can determine your current security profile. Progent can also assist you to strengthen your existing network security and can assist you to design and implement a cohesive cybersecurity ecosystem that simplifies management and provides optimum cyber defense for on-prem, multi-cloud, remote, and perimeter IT assets. To find out additional details about Progent's threat assessment services powered by on NodeZero's pentest platform, visit Consulting Services for NodeZero's Pentest Platform.
Download White Paper: Securing a Work-From-Home Environment
To view or download a white paper describing key things to focus on for protecting a network that includes work-from-home staff, click:
Protecting a Work-From-Home (WFH) Network White Paper. (PDF - 2.4 MB)
Contact Progent for Telecommuter Expertise
To contact Progent about building and managing an efficient work-from-home solution for your Baltimore, Maryland organization, phone