Enlarging your at-home workforce may have a significant impact on network infrastructure, security, and company processes. Progent has 20 years of background assisting businesses of all sizes to plan, configure, administer, optimize, and debug IT networks that incorporate a remote workforce. Progent can help your Boston company to select the appropriate tools and follow leading practices in creating and operating a safe virtual solution for teleworkers that facilitates teamwork and delivers maximum value. Progent can provide support services ranging from on demand expertise for helping you past challenging technical roadblocks to full project management to help you successfully complete business-critical tasks.
Progent's consultants can assist Boston, Massachusetts organizations to succeed with any facet of building a high-functioning work-from-home environment by providing infrastructure design and configuration services, VoIP PBX expertise, voice/video conferencing integration, collaboration platform customization and training, public cloud integration, helpdesk outsourcing, endpoint security, data protection solutions, and centralized management.
Security for Telecommuters
Work-from-Home (WFH) workers commonly use their personal computers and usually operate in an unsecured physical environment. This situation increases their susceptibility to cyber attacks and calls for careful deployment of firewalls, AV tools, multi-factor authentication, remote monitoring, intensive user training, and the creation of security policies built on leading practices. Progent's veteran roster of IT security solutions experts can assist your business to design, configure and manage an effective security solution that protects critical IT assets in environments that incorporate at-home workers.
Firewalls enable companies to create a network environment that can be securely utilized by local users as well as by teleworkers, mobile workers, suppliers, customers, and other stakeholders. Modern firewall appliances allow you to assign and control different permissions to various groups of users and to scale your network and modify your security profile as your business evolves and as cyber threats become more complex. Progent supports both new and older firewall appliances from all major vendors including Cisco, Palo Alto Networks, WatchGuard, Juniper, and Fortinet. For details about Progent's firewall integration services, refer to firewall support expertise.
Remote Endpoint Security Monitoring makes it possible to track the various devices utilized by teleworkers and either block or spot and mitigate the latest cyber attacks such as ransomware. With Progent's ProSight Active Security Monitoring services, a small-footprint software agent is put on every secured endpoint, watching all activity and using advanced machine learning from SentinelOne to detect new threats on arrival. When an attack is discovered, ProSight ASM instantly disconnects the targeted device from the corporate network to quarantine the threat. Since the ProSight ASM agent is self-contained, endpoints stay secure even when they are offline. Progent is a SentinelOne Partner, reseller, and integrator. To learn more about ProSight ASM, visit remote endpoint security monitoring for remote workers.
Progent's Duo MFA managed services incorporate Cisco's Duo cloud technology to protect against compromised passwords through the use of two-factor authentication. Duo supports one-tap identity verification on iOS, Android, and other personal devices. Using Duo 2FA, when you sign into a protected application and enter your password you are asked to confirm who you are via a unit that only you have and that is accessed using a separate network channel. A broad range of out-of-band devices can be utilized for this added form of ID validation such as an iPhone or Android or wearable, a hardware token, a landline telephone, etc. You may register several verification devices. To find out more about ProSight Duo two-factor identity validation services, see Duo MFA two-factor authentication services for remote workers.
Security Audits can evaluate the exposure of your information system to all types of external and local security attacks for an environment that incorporates telecommuters. Progent can run online, automated security inventory scanning for quickly and economically detecting a wide variety of security weaknesses that can be surfaced over the Internet. Progent's security audit consulting services, which can be provided by network security experts with top certifications such as CISM, ISSAP, and GIAC, can help your company to audit your operations and policies and review your WAN architecture to enable you to implement the highest level of protection for your telecommuters.
Download White Paper: Securing a Work-From-Home Environment
To read or download a white paper describing critical things to concentrate on for protecting a network that incorporates telecommuters, click:
Securing a Work-From-Home (WFH) Network White Paper. (PDF - 2.4 MB)
Contact Progent for Telecommuter Support Services
To contact Progent about building and managing a productive work-from-home environment for your Boston, Massachusetts business, phone