Enlarging your remote workforce may have a significant impact on IT architecture, cybersecurity, and corporate processes. Progent has 20 years of experience helping businesses of all sizes to plan, deploy, manage, optimize, and debug IT networks that support work-from-home employees. Progent can help your Centennial company to pick the appropriate technologies and adhere to leading practices in creating and operating a secure virtual solution for teleworkers that promotes teamwork and returns maximum value. Progent offers support services that go from on demand expertise for helping you over occasional IT roadblocks to full project management or co-management to help you carry out mission-critical initiatives.
Progent can help Centennial, Colorado businesses to with any aspect of building a high-functioning remote work environment by providing network infrastructure configuration services, IP voice troubleshooting, video conferencing support, collaboration platform selection and deployment, public cloud connectivity, Call Desk services, endpoint security, data protection solutions, and unified management.
Security for Telecommuters
Work-from-Home employees typically use their own devices and often operate in a poorly secured physical space. This multiplies their susceptibility to malware threats and calls for careful configuration of corporate firewalls, anti-malware tools, MFA-based identity verification, remote endpoint monitoring, extensive end-user training, and the creation of security policies based on best practices. Progent's seasoned group of data security support experts can assist your business to design, deploy and manage an effective cybersecurity solution that guards vital IT assets in networks that include an at-home workforce.
Firewalls enable you to build a network environment that can be securely accessed by local users and by an at-home workforce, mobile users, suppliers, customers, and the public. Modern firewall appliances allow you to configure and control different access rights to different classes of users and to scale your IT network and modify your security as your company evolves and as cyber threats grow more complex. Progent supports both new and older security devices from all major manufacturers like Cisco, Palo Alto Networks, WatchGuard, Juniper, and Fortinet. To find out more about Progent's firewall support expertise, see firewall integration and support services.
Online Endpoint Monitoring makes it possible to track the various devices utilized by teleworkers and either block or spot and mitigate the latest threats like ransomware. With ProSight Active Security Monitoring (ASM) services, a lightweight software agent is installed on each secured endpoint, monitoring all activity and utilizing state-of-the-art machine learning from SentinelOne to identify new threats at inception. When an attack is discovered, ProSight Active Security Monitoring immediately disconnects the infected endpoint from the corporate network to contain the malware. Since the ProSight Active Security Monitoring software agent is self-contained, endpoint devices remain protected even if they are offline. Progent is a SentinelOne Partner, dealer, and integrator. To learn more about ProSight ASM, go to remote endpoint monitoring for an at-home workforce.
Progent's Duo MFA services incorporate Cisco's Duo technology to defend against compromised passwords by using two-factor authentication. Duo supports single-tap identity confirmation on iOS, Google Android, and other out-of-band devices. With Duo 2FA, when you sign into a secured online account and give your password you are asked to verify your identity on a unit that only you have and that is accessed using a separate network channel. A wide range of out-of-band devices can be utilized as this second means of ID validation including an iPhone or Android or wearable, a hardware/software token, a landline telephone, etc. You may register several validation devices. To learn more about ProSight Duo two-factor identity validation services, visit Cisco Duo MFA two-factor authentication services for remote workers.
Security Audits can evaluate the vulnerability of your network to all classes of outside and local security threats for a network that incorporates at-home workers. Progent can run online, automated cybersecurity inventory software for rapidly and affordably detecting a broad range of security weaknesses that can be found via the Internet. Progent's endpoint security assessment consulting services, which can be provided by data security experts with top credentials including CISM, ISSAP, and GIAC, can assist your business to audit your workflows and governance policies and review your network infrastructure to allow you to design top-level protection for your at-home workers.
Download White Paper: Protecting a Work-From-Home Environment
To view or download a white paper about key things to focus on for securing a network that supports work-from-home staff, click:
Protecting a Work-From-Home (WFH) Network White Paper. (PDF - 2.4 MB)
Contact Progent for Telecommuter Support Services
To contact Progent about creating and managing an efficient work-from-home environment for your Centennial, Colorado business, call