Expanding your at-home workforce may have a significant effect on IT architecture, cybersecurity, and company processes. Progent has two decades of experience helping businesses of all sizes to plan, configure, administer, tune, and debug IT environments that incorporate work-from-home employees. Progent can help your Barra da Tijuca organization to pick the appropriate tools and follow best practices in creating and maintaining a secure virtual office ecosystem for telecommuters that promotes collaboration and returns top business value. Progent offers support services that go from as-needed expertise for getting you over challenging IT roadblocks to comprehensive project management to help you carry out business-critical tasks.
Progent can help Barra da Tijuca, Rio de Janeiro organizations to with any aspect of creating a high-functioning work-from-home ecosystem by delivering network infrastructure configuration services, VoIP PBX troubleshooting, video conferencing support, collaboration platform selection and deployment, public cloud integration, helpdesk outsourcing, cybersecurity, backup/restore solutions, and streamlined management.
Security and Compliance for At-Home Workers
Work-from-Home (WFH) employees typically utilize their own computers and usually operate in an unsecured physical space. This situation multiplies their susceptibility to malware attacks and calls for careful configuration of corporate firewalls, AV tools, multi-factor authentication, remote monitoring, intensive end-user education, and the development of policies built on best practices. Progent's veteran team of IT security support experts can help you to plan, deploy and maintain an effective cybersecurity solution that protects vital IT resources in environments that incorporate at-home workers.
Firewalls allow you to build a network that can be securely accessed by on-premises users as well as by an at-home workforce, mobile employees, vendors, clients, and other stakeholders. Next-generation firewall appliances allow you to assign and manage appropriate access rights to various classes of users and to scale your network and modify your security as your business evolves and as network attacks become increasingly complex. Progent works with both current and older security devices from all leading vendors like Cisco, Palo Alto Networks, Check Point, Juniper, SonicWall and Fortinet. For details about Progent's firewall configuration services, go to firewall support expertise.
Online Endpoint Monitoring makes it possible to track the disparate computers utilized by remote workers and either block or spot and respond to modern cyber attacks like ransomware. With ProSight Active Security Monitoring services, a small-footprint software agent is installed on every secured endpoint, watching all activity and utilizing advanced machine learning from SentinelOne to identify zero-day attacks on arrival. When a cyberattack is discovered, ProSight Active Security Monitoring instantly isolates the targeted endpoint device from the corporate network to quarantine the malware. Since the ProSight ASM software agent is autonomous, endpoint devices stay secure even if they are not connected to the Internet. Progent is a SentinelOne Partner, dealer, and integrator. For more information about ProSight Active Security Monitoring, see remote endpoint security monitoring for an at-home workforce.
Progent's Duo MFA services incorporate Cisco's Duo technology to protect against stolen passwords by using two-factor authentication. Duo enables one-tap identity confirmation with iOS, Google Android, and other out-of-band devices. Using Duo 2FA, whenever you sign into a secured online account and enter your password you are requested to verify your identity via a device that only you have and that is accessed using a different ("out-of-band") network channel. A broad selection of devices can be used as this added means of authentication including an iPhone or Android or watch, a hardware/software token, a landline telephone, etc. You can designate several verification devices. For details about ProSight Duo two-factor identity validation services, refer to Duo MFA two-factor authentication services for teleworkers.
Security Audits can evaluate the exposure of your network to all types of external and local security threats for an environment that includes teleworkers. Progent can deploy online, automated security inventory software for rapidly and economically uncovering a wide variety of security holes that can be found over the Internet. Progent's security audit experts, which can be provided by network security professionals with top certifications such as CISA, CISSP, and GIAC, can assist you to audit your workflows and policies and assess your IT architecture to enable you to design the highest level of security for your telecommuters.
Download White Paper: Securing a Work-From-Home (WFH) Network
To read or download a white paper about key things to focus on for protecting a network that incorporates work-from-home staff, click:
Securing a Work-From-Home (WFH) Environment White Paper. (PDF - 2.4 MB)
Contact Progent for At-Home Worker Expertise
To contact Progent about creating and managing an efficient work-from-home environment for your Barra da Tijuca, Rio de Janeiro business, phone