Enlarging your at-home workforce can have a significant effect on network architecture, security, and corporate culture. Progent has 20 years of experience assisting businesses of all sizes to plan, configure, manage, tune, and troubleshoot IT networks that support at-home workers. Progent can help your Centennial company to pick the right technologies and adhere to leading practices in building and operating a safe virtual ecosystem for teleworkers that promotes teamwork and returns maximum value. Progent can provide support services that go from as-needed expertise for getting you over occasional technical roadblocks to full project management to help you carry out business-critical tasks.

Progent's consultants can assist Centennial, Colorado companies to with any facet of building a high-functioning telecommuting environment by providing network infrastructure design and configuration services, VoIP PBX troubleshooting, voice/video conferencing support, collaboration platform customization and training, public cloud integration, Help Desk augmentation, security monitoring, backup/restore solutions, and streamlined management.

Security for Teleworkers
Work-from-Home workers commonly utilize their personal devices and often work in a poorly secured physical space. This situation multiplies their vulnerability to malware threats and calls for judicious deployment of firewalls, AV tools, MFA-based identity verification, remote endpoint monitoring, extensive user training, and the development of security policies built on best practices. Progent's veteran roster of data security support consultants can assist you to plan, implement and maintain an effective cybersecurity solution that guards critical IT resources in environments that incorporate remote workers.

Firewall Integration Services for At-Home WorkersFirewalls allow you to build a network environment that can be securely utilized by local users and by teleworkers, mobile workers, suppliers, customers, and other stakeholders. Modern firewall devices allow you to configure and control different permissions to different groups of users and to scale your network and adjust your cybersecurity posture as your company evolves and as cyber threats grow more sophisticated. Progent works with both new and legacy firewall devices from all leading vendors like Cisco, Palo Alto Networks, WatchGuard, Juniper, and Fortinet. For more information about Progent's firewall integration expertise, go to firewall integration and support expertise.

Remote Security Monitoring and Management for TeleworkersRemote Endpoint Monitoring makes it possible to watch over the various devices utilized by remote workers and either reject or spot and mitigate modern threats such as ransomware. With ProSight Active Security Monitoring (ASM) services, a small-footprint software agent is installed on each secured endpoint, monitoring all activity and using state-of-the-art behavioral threat analysis from SentinelOne to detect zero-day threats on arrival. When an attack is discovered, ProSight Active Security Monitoring immediately disconnects the impacted endpoint from the network to contain the threat. Since the ProSight Active Security Monitoring agent is autonomous, endpoints stay protected even when they are offline. Progent is a SentinelOne Partner, dealer, and integrator. For more information about ProSight Active Security Monitoring, refer to remote endpoint monitoring for remote workers.

Two-factor Authentication (2FA) Services for TelecommutersProgent's Duo authentication Services incorporate Cisco's Duo technology to defend against password theft by using two-factor authentication (2FA). Duo enables one-tap identity confirmation with Apple iOS, Google Android, and other out-of-band devices. With 2FA, whenever you sign into a protected online account and give your password you are asked to verify who you are on a unit that only you possess and that is accessed using a different ("out-of-band") network channel. A broad selection of devices can be used as this second means of authentication such as an iPhone or Android or watch, a hardware/software token, a landline telephone, etc. You can register several verification devices. For more information about Duo two-factor identity validation services, refer to Cisco Duo MFA two-factor authentication (2FA) services for at-home workers.

Security Audit Services for At-Home WorkersSecurity Audits can evaluate the exposure of your information system to all types of outside and local security threats for an environment that includes an at-home workforce. Progent can deploy remote, automated cybersecurity inventory scanning for rapidly and affordably uncovering a broad range of security gaps that can be surfaced over the Internet. Progent's endpoint security assessment consulting services, which can be provided by data security experts with top credentials including CISM, CISSP, and GIAC, can assist your company to evaluate your processes and governance policies and review your WAN architecture to enable you to implement top-level protection for your teleworkers.

NodeZero Pen Testing for Work-from-Home EnpointsHorizon3.ai's NodeZero Penetration Testing Platform is a leading-edge penetration test (pentest) product family that can deliver automated threat assessment of your at-home connectivity solution as well as your internal and perimeter networks to help you expose, prioritize, remediate, and verify security weaknesses before malicious hackers can exploit them. Progent's pentest experts can help you to deploy NodeZero to carry out comprehensive pentests of your perimeter and your internal IT infrastructure so you can determine your current security profile. Progent can also assist you to strengthen your network security and can assist you to plan and implement a unified cybersecurity ecosystem that streamlines management and provides optimum cyber defense for on-prem, cloud-based, remote, and perimeter IT assets. To learn more details about Progent's threat analysis services based on on NodeZero's PEN test products, see Consulting Services for NodeZero's Penetration Test Platform.

Download White Paper: Securing a Work-From-Home Network
To view or download a white paper describing key things to concentrate on for protecting an IT environment that includes telecommuters, click:
Securing a Work-From-Home Environment White Paper. (PDF - 2.4 MB)

Contact Progent for Telecommuter Expertise
To contact Progent about building and maintaining a productive work-from-home solution for your Centennial, Colorado organization, call 1-800-993-9400 or refer to Contact Progent.