Expanding your telecommuter workforce can have a significant impact on network infrastructure, cybersecurity, and corporate workflows. Progent has two decades of experience helping businesses of all sizes to design, deploy, manage, optimize, and debug IT networks that incorporate a remote workforce. Progent can assist your Boise company to select the appropriate technologies and adhere to leading practices in creating and maintaining a secure virtual solution for telecommuters that facilitates teamwork and returns maximum value. Progent can provide services that go from on demand guidance for helping you over challenging technical bottlenecks to comprehensive project management or co-management to help you successfully complete business-critical tasks.
Progent's consultants can assist Boise, Idaho organizations to succeed with any facet of creating a high-performing work-at-home environment by delivering infrastructure configuration services, VoIP PBX troubleshooting, voice/video conferencing support, collaboration platform customization and training, cloud integration, Help Desk outsourcing, security monitoring, backup/restore solutions, and unified management.
Cybersecurity for Teleworkers
Work-from-Home workers typically utilize their personal computing devices and often work in an unsecured physical space. This situation increases their susceptibility to cyber threats and requires careful deployment of firewalls, anti-malware tools, MFA-based identity verification, remote endpoint monitoring, intensive user education, and the development of security policies built on best practices. Progent's seasoned group of data security solutions experts can help your business to design, deploy and manage a compliant cybersecurity solution that guards critical information assets in networks that incorporate at-home workers.
Firewalls allow you to create a network environment that can be safely utilized by local users as well as by teleworkers, mobile users, suppliers, customers, and other stakeholders. Modern firewall appliances permit you to configure and control appropriate access rights to different classes of users and to expand your IT network and modify your security as your business evolves and as cyber threats grow increasingly complex. Progent supports both current and legacy security devices from all major manufacturers like Cisco, Palo Alto Networks, WatchGuard, Juniper, and Fortinet. To find out more about Progent's firewall configuration expertise, visit firewall integration and support expertise.
Online Endpoint Security Monitoring makes it easy to watch over the various computers used by remote workers and either reject or spot and mitigate the latest threats like ransomware. With ProSight Active Security Monitoring (ASM) services, a small-footprint software agent is installed on every secured endpoint device, watching all activity and using advanced machine learning from SentinelOne to detect zero-day attacks at inception. When an attack is spotted, ProSight Active Security Monitoring instantly disconnects the infected endpoint device from the network to contain the threat. Since the ProSight ASM software agent is self-contained, endpoint devices remain protected even when they are offline. Progent is a SentinelOne Partner, reseller, and integrator. For details about ProSight ASM, see remote endpoint security monitoring for at-home workers.
Progent's Duo authentication service plans utilize Cisco's Duo technology to defend against compromised passwords through the use of two-factor authentication. Duo supports single-tap identity confirmation on iOS, Google Android, and other personal devices. Using 2FA, when you sign into a protected online account and give your password you are asked to verify your identity via a device that only you have and that uses a different network channel. A wide range of devices can be utilized as this added form of authentication including a smartphone or watch, a hardware token, a landline telephone, etc. You can designate several validation devices. To learn more about Duo two-factor identity validation services, refer to Duo MFA two-factor authentication services for teleworkers.
Security Audits can assess the exposure of your network to all classes of external and internal security attacks for a network that includes teleworkers. Progent can deploy remote, automated cybersecurity inventory software for quickly and affordably detecting a broad range of security holes that can be surfaced over the Internet. Progent's endpoint security audit experts, which can be managed by network security experts with top credentials such as CISM, CISSP, and GIAC, can help you to evaluate your procedures and policies and assess your network architecture to enable you to design the highest level of protection for your telecommuters.
Download White Paper: Securing a Work-From-Home Environment
To view or download a white paper describing critical things to concentrate on for protecting an IT environment that incorporates work-from-home staff, click:
Protecting a Work-From-Home (WFH) Network White Paper. (PDF - 2.4 MB)
Contact Progent for At-Home Worker Expertise
To contact Progent about building and maintaining an efficient work-from-home environment for your Boise, Idaho organization, phone 1-800-993-9400 or go to Contact Progent.