Expanding your telecommuter workforce can have a significant effect on IT architecture, security, and corporate workflows. Progent has two decades of background helping businesses of all sizes to plan, deploy, administer, tune, and troubleshoot IT environments that support a remote workforce. Progent can help your Baltimore organization to pick the appropriate tools and adhere to best practices in creating and operating a secure virtual solution for telecommuters that promotes collaboration and delivers maximum business value. Progent offers support services ranging from on demand expertise for getting you past challenging IT bottlenecks to full project management or co-management to help you successfully complete mission-critical tasks.
Progent's consultants can help Baltimore, Maryland organizations to succeed with any facet of creating a high-functioning work-at-home ecosystem by providing network infrastructure design and configuration services, IP voice troubleshooting, voice/video conferencing integration, collaboration platform selection and deployment, cloud integration, Help Desk outsourcing, endpoint security, backup/restore solutions, and streamlined management.
Security and Compliance for Telecommuters
Work-from-Home workers typically use their own computing devices and usually work in a poorly secured physical space. This situation multiplies their vulnerability to cyber threats and requires judicious configuration of corporate firewalls, anti-malware tools, multi-factor authentication, remote endpoint monitoring, extensive end-user education, and the creation of security policies built on leading practices. Progent's seasoned roster of IT security support experts can assist your business to plan, deploy and maintain an effective security solution that protects vital IT assets in environments that incorporate an at-home workforce.
Firewalls enable companies to create a network environment that can be safely accessed by on-premises users as well as by teleworkers, mobile workers, suppliers, clients, and other stakeholders. Modern firewall appliances permit you to configure and manage different permissions to different classes of users and to scale your IT network and adjust your security as your business evolves and as network attacks become increasingly sophisticated. Progent works with both current and legacy firewall devices from all major vendors including Cisco, Palo Alto Networks, Check Point, Juniper, and Fortinet. For more information about Progent's firewall support expertise, visit firewall support expertise.
Remote Endpoint Security Monitoring makes it possible to track the disparate computers utilized by an at-home workforce and either reject or identify and mitigate the latest cyber attacks such as ransomware. With ProSight Active Security Monitoring (ASM) services, a lightweight agent is installed on each secured endpoint device, monitoring all activity and using state-of-the-art machine learning from SentinelOne to detect new attacks on arrival. When an attack is discovered, ProSight Active Security Monitoring instantly disconnects the impacted device from the network to contain the threat. Since the ProSight ASM agent is self-contained, endpoints stay secure even when they are offline. To find out more about ProSight Active Security Monitoring, visit remote endpoint monitoring for an at-home workforce.
Progent's Duo authentication managed services utilize Cisco's Duo technology to protect against compromised passwords by using two-factor authentication. Duo enables single-tap identity confirmation on iOS, Android, and other personal devices. With Duo 2FA, whenever you sign into a secured online account and give your password you are requested to verify your identity on a device that only you possess and that is accessed using a different ("out-of-band") network channel. A wide selection of out-of-band devices can be used for this second means of authentication including a smartphone or wearable, a hardware token, a landline telephone, etc. You may register several verification devices. To learn more about Duo identity validation services, visit Cisco Duo MFA two-factor authentication (2FA) services for telecommuters.
Security Audits can evaluate the vulnerability of your information system to all classes of external and internal security threats for a network that includes teleworkers. Progent can run online, automated cybersecurity analysis scanning for rapidly and economically detecting a broad range of security weaknesses that can be found over the Internet. Progent's security audit experts, which can be managed by security professionals with advanced certifications including CISA, CISSP, and GIAC, can assist your business to audit your operations and governance policies and review your WAN architecture to allow you to design top-level protection for your telecommuters.
Download White Paper: Securing a Work-From-Home (WFH) Environment
To read or download a white paper about key areas to concentrate on for protecting an IT environment that incorporates work-from-home staff, click:
Securing a Work-From-Home (WFH) Network White Paper. (PDF - 2.4 MB)
Contact Progent for Telecommuter Expertise
To contact Progent about building and managing a productive telecommuter solution for your Baltimore, Maryland business, call 1-800-993-9400 or go to Contact Progent.