Expanding your remote workforce may have a major impact on network infrastructure, cybersecurity, and company processes. Progent has two decades of background assisting small and mid-size businesses to plan, configure, administer, tune, and debug IT networks that incorporate work-from-home employees. Progent can help your Charleston company to select the right technologies and adhere to leading practices in creating and maintaining a safe virtual office ecosystem for telecommuters that facilitates teamwork and returns top business value. Progent can provide services ranging from as-needed expertise for helping you past challenging IT bottlenecks to full project management to help you carry out mission-critical tasks.
Progent can help Charleston, South Carolina companies to with any facet of creating a high-performing telecommuting ecosystem by delivering network infrastructure design and configuration services, VoIP PBX troubleshooting, video conferencing support, collaboration platform customization and training, public cloud integration, helpdesk services, security monitoring, data protection solutions, and centralized management.
Security for At-Home Workers
Work-from-Home (WFH) staff members commonly utilize their own devices and usually work in a poorly secured physical area. This multiplies their susceptibility to cyber attacks and requires judicious deployment of corporate firewalls, anti-malware tools, multi-factor authentication, remote endpoint monitoring, thorough end-user education, and the development of security policies based on leading practices. Progent's seasoned team of cybersecurity solutions experts can help you to plan, deploy and maintain an effective security solution that protects vital IT resources in networks that incorporate remote workers.
Firewalls allow you to create a network environment that can be safely utilized by local users as well as by at-home workers, mobile employees, vendors, clients, and the public. Next-generation firewall appliances permit you to assign and control appropriate permissions to various groups of users and to expand your IT network and adjust your security profile as your company evolves and as network attacks become more complex. Progent works with both current and older security appliances from all leading manufacturers like Cisco, Palo Alto Networks, WatchGuard, Juniper, SonicWall and Fortinet. For more information about Progent's firewall configuration services, visit firewall configuration and support services.
Remote Endpoint Monitoring makes it easy to watch over the disparate devices used by remote workers and either block or spot and respond to modern threats such as ransomware. With Progent's ProSight Active Security Monitoring services, a small-footprint software agent is put on every secured endpoint, watching all activity and using state-of-the-art behavioral threat analysis from SentinelOne to identify zero-day threats before they can spread. When an attack is spotted, ProSight ASM immediately isolates the targeted endpoint from the corporate network to contain the threat. Because the ProSight ASM agent is self-contained, endpoint devices stay secure even if they are not connected to the Internet. Progent is a SentinelOne Partner, reseller, and integrator. For more information about ProSight ASM, see remote endpoint security monitoring for telecommuters.
Progent's Duo MFA service plans incorporate Cisco's Duo technology to protect against password theft by using two-factor authentication (2FA). Duo supports single-tap identity verification with iOS, Android, and other out-of-band devices. With 2FA, when you log into a protected online account and give your password you are requested to confirm your identity on a device that only you possess and that uses a different network channel. A wide range of out-of-band devices can be utilized for this added means of ID validation including an iPhone or Android or watch, a hardware/software token, a landline phone, etc. You can register multiple validation devices. For details about Duo identity validation services, visit Duo MFA two-factor authentication (2FA) services for teleworkers.
Security Audits can assess the exposure of your network to all types of external and local security attacks for a network that includes telecommuters. Progent can deploy online, automated cybersecurity inventory scanning for rapidly and economically uncovering a wide variety of security holes that can be surfaced via the Internet. Progent's endpoint security audit consulting services, which can be provided by security experts with advanced credentials such as CISM, ISSAP, and GIAC, can assist your company to evaluate your procedures and policies and assess your IT infrastructure to enable you to implement the highest level of protection for your remote workers.
Download White Paper: Securing a Work-From-Home Environment
To read or download a white paper describing key areas to concentrate on for protecting a network that includes telecommuters, click:
Protecting a Work-From-Home Network White Paper. (PDF - 2.4 MB)
Contact Progent for Telecommuter Expertise
To get in touch with Progent about creating and maintaining a productive telecommuter environment for your Charleston, South Carolina company, phone