Enlarging your telecommuter workforce may have a major effect on IT infrastructure, cybersecurity, and corporate culture. Progent has two decades of experience assisting SMBs to design, configure, administer, optimize, and debug IT networks that support work-from-home employees. Progent can help your Boston organization to pick the appropriate tools and follow leading practices in building and maintaining a safe virtual office ecosystem for teleworkers that facilitates collaboration and delivers maximum business value. Progent offers services that go from on demand expertise for getting you past occasional technical roadblocks to comprehensive project management to help you carry out business-critical tasks.

Progent's consultants can assist Boston, Massachusetts businesses to succeed with any facet of creating a high-performing work-from-home environment by providing infrastructure design and configuration services, IP voice troubleshooting, voice/video conferencing integration, collaboration platform selection and deployment, cloud connectivity, Help Desk outsourcing, security monitoring, data protection solutions, and streamlined management.

Security and Compliance for At-Home Workers
Work-from-Home (WFH) employees typically utilize their personal computers and often operate in an unsecured physical area. This increases their vulnerability to malware attacks and calls for judicious deployment of corporate firewalls, AV tools, multi-factor authentication, remote monitoring, extensive end-user education, and the development of policies built on best practices. Progent's seasoned team of IT security support consultants can help your business to plan, configure and manage a compliant cybersecurity solution that protects critical IT resources in networks that incorporate remote workers.

Firewall Integration Services for At-Home WorkersFirewalls enable companies to create a network that can be securely utilized by local users and by telecommuters, mobile workers, suppliers, customers, and other stakeholders. Modern firewall devices allow you to configure and control appropriate access rights to various classes of users and to scale your IT network and adjust your security as your company evolves and as cyber threats grow increasingly sophisticated. Progent works with both new and legacy security appliances from all leading manufacturers including Cisco, Palo Alto Networks, Check Point, Juniper, SonicWall and Fortinet. To find out more about Progent's firewall integration services, refer to firewall support expertise.

Remote Security Monitoring and Management for TelecommutersRemote Endpoint Monitoring makes it easy to watch over the various devices used by remote workers and either reject or spot and respond to modern threats such as ransomware. With Progent's ProSight Active Security Monitoring (ASM) services, a lightweight software agent is installed on each secured endpoint device, watching all activity and using state-of-the-art behavioral threat analysis from SentinelOne to detect new attacks at inception. When a cyberattack is discovered, ProSight ASM instantly disconnects the targeted endpoint device from the corporate network to contain the threat. Because the ProSight Active Security Monitoring software agent is self-contained, endpoints stay secure even if they are disconnected from the Internet. For details about ProSight ASM, go to remote endpoint monitoring for at-home workers.

Two-factor Authentication Services for Remote WorkersProgent's Duo MFA managed services incorporate Cisco's Duo cloud technology to defend against password theft by using two-factor authentication (2FA). Duo supports one-tap identity verification on iOS, Android, and other out-of-band devices. Using Duo 2FA, when you log into a secured application and enter your password you are requested to confirm who you are via a device that only you possess and that is accessed using a different ("out-of-band") network channel. A broad selection of out-of-band devices can be utilized as this second form of ID validation including an iPhone or Android or wearable, a hardware/software token, a landline telephone, etc. You may designate multiple validation devices. To find out more about ProSight Duo identity authentication services, visit Duo MFA two-factor authentication (2FA) services for telecommuters.

Security Audit Services for At-Home WorkersSecurity Audits can assess the exposure of your information system to all types of outside and internal security attacks for a network that incorporates at-home workers. Progent can run online, automated cybersecurity inventory scanning for rapidly and affordably uncovering a wide variety of security gaps that can be surfaced over the Internet. Progent's security audit experts, which can be managed by data security experts with top certifications such as CISM, CISSP, and GIAC, can help your business to evaluate your operations and governance policies and assess your IT infrastructure to allow you to implement the highest level of security for your telecommuters.

Download White Paper: Securing a Work-From-Home Environment
To view or download a white paper about critical areas to concentrate on for securing an IT environment that supports telecommuters, click:
Securing a Work-From-Home (WFH) Environment White Paper. (PDF - 2.4 MB)

Contact Progent for At-Home Worker Support Services
To get in touch with Progent about building and maintaining an efficient telecommuter solution for your Boston, Massachusetts business, call 1-800-993-9400 or refer to Contact Progent.