Enlarging your remote workforce can have a major impact on IT infrastructure, security/compliance, and corporate processes. Progent has 20 years of experience helping businesses of all sizes to design, configure, manage, optimize, and debug IT networks that support work-from-home employees. Progent can assist your Barra da Tijuca company to select the right tools and follow leading practices in creating and maintaining a safe virtual ecosystem for teleworkers that facilitates teamwork and delivers maximum value. Progent can provide support services ranging from on demand guidance for getting you past challenging technical roadblocks to comprehensive project management or co-management to help you successfully complete mission-critical initiatives.
Progent's consultants can help Barra da Tijuca, Rio de Janeiro companies to with any aspect of creating a high-performing telecommuting environment by delivering infrastructure design and configuration services, IP voice expertise, video conferencing integration, collaboration platform customization and training, cloud integration, Help Desk outsourcing, cybersecurity, data protection solutions, and streamlined management.
Cybersecurity for Remote Workers
Work-from-Home employees commonly utilize their personal computers and often work in a poorly secured physical area. This increases their vulnerability to cyber attacks and calls for careful configuration of firewalls, AV tools, multi-factor authentication, remote monitoring, thorough user education, and the development of security policies based on leading practices. Progent's seasoned team of IT security support consultants can assist you to design, deploy and manage an effective cybersecurity solution that guards critical information resources in networks that incorporate remote workers.
Firewalls enable you to build a network environment that can be securely utilized by local users as well as by telecommuters, mobile users, suppliers, customers, and other stakeholders. Modern firewall appliances allow you to assign and manage different permissions to different groups of users and to expand your network and modify your cybersecurity posture as your company evolves and as cyber threats become more complex. Progent works with both new and older firewall appliances from all major manufacturers including Cisco, Palo Alto Networks, Check Point, Juniper, and Fortinet. For details about Progent's firewall configuration services, refer to firewall support services.
Online Endpoint Security Monitoring makes it possible to watch over the disparate devices used by an at-home workforce and either reject or spot and mitigate the latest threats such as ransomware. With Progent's ProSight Active Security Monitoring (ASM) services, a lightweight software agent is put on every secured endpoint, monitoring all activity and utilizing state-of-the-art behavioral threat analysis from SentinelOne to identify zero-day threats at inception. When an attack is spotted, ProSight Active Security Monitoring immediately isolates the infected endpoint device from the network to contain the malware. Since the ProSight Active Security Monitoring software agent is self-contained, endpoints remain protected even if they are not connected to the Internet. Progent is a SentinelOne Partner, dealer, and integrator. For details about ProSight Active Security Monitoring, see remote endpoint security monitoring for an at-home workforce.
Progent's Duo authentication service plans incorporate Cisco's Duo cloud technology to defend against stolen passwords through the use of two-factor authentication (2FA). Duo enables single-tap identity verification with iOS, Android, and other personal devices. Using Duo 2FA, whenever you sign into a secured application and give your password you are asked to verify your identity on a device that only you have and that uses a different network channel. A wide range of out-of-band devices can be used as this second means of ID validation including a smartphone or wearable, a hardware token, a landline telephone, etc. You may designate multiple validation devices. To learn more about Duo two-factor identity authentication services, see Cisco Duo MFA two-factor authentication (2FA) services for teleworkers.
Security Audits can evaluate the exposure of your network to all classes of external and internal security attacks for an environment that includes telecommuters. Progent can deploy online, automated security analysis software for rapidly and economically uncovering a wide variety of security holes that can be found via the Internet. Progent's security audit experts, which can be managed by network security experts with advanced credentials including CISM, CISSP, and GIAC, can help you to evaluate your processes and policies and review your IT infrastructure to allow you to implement top-level protection for your remote workers.
Download White Paper: Protecting a Work-From-Home Environment
To view or download a white paper about critical areas to concentrate on for securing an IT environment that includes telecommuters, click:
Protecting a Work-From-Home (WFH) Environment White Paper. (PDF - 2.4 MB)
Contact Progent for Remote Workforce Support Services
To get in touch with Progent about building and maintaining a productive work-from-home environment for your Barra da Tijuca, Rio de Janeiro business, call