Expanding your telecommuter workforce may have a major impact on network infrastructure, security, and corporate workflows. Progent has 20 years of background helping businesses of all sizes to plan, configure, manage, tune, and troubleshoot IT networks that support work-from-home employees. Progent can assist your Centennial company to select the right technologies and adhere to best practices in building and operating a secure virtual office ecosystem for teleworkers that facilitates teamwork and delivers top business value. Progent can provide support services that go from as-needed guidance for helping you past occasional IT roadblocks to full project management to help you successfully complete business-critical initiatives.

Progent can assist Centennial, Colorado organizations to succeed with any aspect of creating a high-functioning remote work ecosystem by delivering network infrastructure configuration services, VoIP PBX troubleshooting, voice/video conferencing integration, collaboration platform selection and deployment, public cloud integration, Call Desk augmentation, data security, data protection solutions, and centralized management.

Security and Compliance for Remote Workers
Work-from-Home workers commonly utilize their personal computing devices and often operate in a poorly secured physical area. This multiplies their vulnerability to malware threats and requires judicious deployment of corporate firewalls, AV tools, multi-factor authentication, remote monitoring, thorough user education, and the development of policies built on leading practices. Progent's veteran group of cybersecurity support consultants can assist you to design, implement and maintain a compliant cybersecurity solution that guards critical information assets in environments that incorporate an at-home workforce.

Firewall Integration Services for At-Home WorkersFirewalls allow you to build a network that can be safely utilized by local users and by an at-home workforce, mobile employees, vendors, customers, and the public. Next-generation firewall devices allow you to configure and control different permissions to different classes of users and to scale your network and modify your cybersecurity posture as your business evolves and as network attacks become more sophisticated. Progent supports both current and legacy firewall appliances from all major vendors including Cisco, Palo Alto Networks, WatchGuard, Juniper, and Fortinet. To learn more about Progent's firewall integration expertise, refer to firewall integration and support services.

Remote Endpoint Monitoring and Management Services for At-Home WorkersRemote Endpoint Security Monitoring makes it easy to track the disparate devices utilized by telecommuters and either reject or spot and mitigate modern cyber attacks like ransomware. With ProSight Active Security Monitoring services, a small-footprint software agent is installed on every secured endpoint, monitoring all activity and using advanced machine learning and full execution context from SentinelOne to detect zero-day attacks at inception. When an attack is discovered, ProSight Active Security Monitoring immediately disconnects the infected device from the corporate network to contain the threat. Because the ProSight Active Security Monitoring software agent is autonomous, endpoint devices stay secure even if they are not connected to the Internet. Progent is a SentinelOne Partner, dealer, and integrator. To find out more about ProSight ASM, refer to remote endpoint security monitoring for at-home workers.

Two-factor Authentication Services for At-Home WorkersProgent's Duo MFA Service Plans incorporate Cisco's Duo technology to defend against compromised passwords through the use of two-factor authentication. Duo supports one-tap identity verification with iOS, Google Android, and other out-of-band devices. With 2FA, whenever you sign into a protected online account and enter your password you are asked to confirm your identity via a device that only you possess and that is accessed using a different ("out-of-band") network channel. A wide range of out-of-band devices can be utilized as this added form of authentication including an iPhone or Android or wearable, a hardware token, a landline phone, etc. You may register several validation devices. For details about Duo identity validation services, go to Cisco Duo MFA two-factor authentication services for an at-home workforce.

Security Audit Services for At-Home WorkersSecurity Audits can evaluate the exposure of your information system to all classes of external and local security threats for a network that includes an at-home workforce. Progent can deploy remote, automated security inventory software for quickly and affordably uncovering a wide variety of security weaknesses that can be found via the Internet. Progent's security audit consulting services, which can be provided by security experts with top credentials including CISM, ISSAP, and GIAC, can assist you to audit your processes and policies and assess your network infrastructure to enable you to implement the highest level of security for your an at-home workforce.

NodeZero Pen Testing for Work-from-Home EnpointsHorizon3.ai's NodeZero Penetration Testing Platform is a breakthrough penetration test (pentest) product family that supports automated testing of your work-from-home connectivity solution as well as your internal and perimeter networks to help you uncover, rank, remediate, and verify cybersecurity vulnerabilities before threat actors can take advantage of them. Progent can assist you to use NodeZero to carry out thorough pentests of your perimeter and your internal IT infrastructure in order to determine your present security posture. Progent can also help you to harden your existing network security and can assist you to plan and implement a unified cybersecurity strategy that simplifies management and provides maximum protection for on-prem, cloud-based, at-home, and perimeter IT assets. To learn additional information about Progent's threat assessment services powered by on NodeZero's PEN test platform, refer to Consulting Services for NodeZero's PEN Test Products.

Download White Paper: Securing a Work-From-Home (WFH) Environment
To read or download a white paper about key areas to focus on for securing a network that includes work-from-home staff, click:
Protecting a Work-From-Home Environment White Paper. (PDF - 2.4 MB)

Contact Progent for Remote Workforce Expertise
To contact Progent about creating and maintaining a productive work-from-home environment for your Centennial, Colorado business, phone 1-800-993-9400 or visit Contact Progent.