Enlarging your telecommuter workforce can have a significant impact on IT infrastructure, security, and corporate processes. Progent has 20 years of experience assisting businesses of all sizes to design, deploy, manage, tune, and debug IT environments that support a remote workforce. Progent can help your Charleston organization to pick the right technologies and adhere to leading practices in building and operating a safe virtual solution for telecommuters that promotes collaboration and delivers maximum value. Progent offers support services ranging from on demand guidance for helping you past challenging technical bottlenecks to comprehensive project management or co-management to help you successfully complete business-critical tasks.

Progent's consultants can help Charleston, South Carolina organizations to succeed with any aspect of creating a high-performing telecommuting ecosystem by delivering network infrastructure design and configuration services, VoIP PBX expertise, voice/video conferencing integration, collaboration platform customization and training, public cloud connectivity, Call Desk augmentation, data security, data protection solutions, and centralized management.

Cybersecurity for At-Home Workers
At-home workers typically use their own computers and often work in an unsecured physical space. This situation multiplies their vulnerability to cyber attacks and calls for careful configuration of firewalls, AV tools, MFA-based identity verification, remote monitoring, thorough user training, and the creation of security policies based on leading practices. Progent's seasoned group of data security support experts can assist you to plan, configure and manage an effective cybersecurity solution that guards vital IT resources in environments that incorporate telecommuters.

Firewall Integration Services for At-Home WorkersFirewalls enable companies to create a network environment that can be safely utilized by on-premises users as well as by an at-home workforce, mobile users, suppliers, clients, and other stakeholders. Modern firewall appliances permit you to configure and control appropriate access rights to various groups of users and to scale your IT network and modify your security as your company evolves and as network attacks grow more sophisticated. Progent works with both current and older firewall appliances from all leading vendors including Cisco, Palo Alto Networks, Check Point, Juniper, SonicWall and Fortinet. To learn more about Progent's firewall integration services, visit firewall configuration and support expertise.

Remote Endpoint Monitoring Services for TeleworkersRemote Endpoint Monitoring makes it easy to watch over the disparate devices used by teleworkers and either reject or spot and respond to the latest cyber attacks like ransomware. With Progent's ProSight Active Security Monitoring services, a small-footprint software agent is put on each secured endpoint device, monitoring all activity and using state-of-the-art machine learning from SentinelOne to identify zero-day threats before they can spread. When an attack is spotted, ProSight ASM instantly disconnects the targeted endpoint device from the corporate network to quarantine the malware. Since the ProSight ASM agent is autonomous, endpoint devices stay protected even when they are offline. Progent is a SentinelOne Partner, reseller, and integrator. To learn more about ProSight ASM, go to remote endpoint monitoring for at-home workers.

Two-factor Authentication (2FA) Services for TeleworkersProgent's Duo authentication managed services incorporate Cisco's Duo technology to defend against compromised passwords through the use of two-factor authentication. Duo supports one-tap identity confirmation on iOS, Google Android, and other personal devices. Using Duo 2FA, whenever you log into a protected application and enter your password you are requested to confirm who you are on a device that only you possess and that is accessed using a different ("out-of-band") network channel. A wide selection of out-of-band devices can be used as this second means of ID validation including a smartphone or wearable, a hardware token, a landline telephone, etc. You can register several verification devices. For more information about Duo identity authentication services, visit Cisco Duo MFA two-factor authentication (2FA) services for an at-home workforce.

Security Audit Services for At-Home WorkersSecurity Audits can assess the vulnerability of your information system to all classes of external and local security attacks for an environment that incorporates telecommuters. Progent can deploy online, automated security analysis software for quickly and economically detecting a wide variety of security weaknesses that can be surfaced over the Internet. Progent's endpoint security assessment consulting services, which can be provided by security professionals with top certifications including CISA, ISSAP, and GIAC, can help you to audit your procedures and governance policies and review your IT architecture to enable you to implement top-level protection for your remote workers.

Download White Paper: Protecting a Work-From-Home (WFH) Network
To read or download a white paper describing critical areas to focus on for securing a network that supports work-from-home staff, click:
Protecting a Work-From-Home Network White Paper. (PDF - 2.4 MB)

Contact Progent for Remote Workforce Support Services
To contact Progent about building and managing an efficient telecommuter solution for your Charleston, South Carolina business, call 1-800-993-9400 or go to Contact Progent.