Expanding your telecommuter workforce can have a major effect on network architecture, cybersecurity, and corporate culture. Progent has 20 years of experience helping businesses of all sizes to plan, configure, administer, optimize, and debug IT networks that incorporate a remote workforce. Progent can assist your Charleston organization to pick the appropriate tools and adhere to leading practices in creating and operating a secure virtual ecosystem for teleworkers that promotes collaboration and delivers maximum business value. Progent can provide support services that go from on demand expertise for getting you past challenging technical roadblocks to full project management or co-management to help you carry out mission-critical tasks.

Progent can assist Charleston, South Carolina companies to succeed with any facet of building a high-performing work-from-home environment by providing network infrastructure configuration services, VoIP PBX troubleshooting, voice/video conferencing support, collaboration platform selection and deployment, public cloud integration, helpdesk augmentation, security monitoring, backup/restore solutions, and unified management.

Security for Telecommuters
At-home employees commonly use their own computing devices and often operate in an unsecured physical space. This increases their vulnerability to malware threats and requires careful deployment of corporate firewalls, AV tools, multi-factor authentication, remote monitoring, thorough end-user training, and the development of security policies based on best practices. Progent's seasoned team of cybersecurity support experts can assist your business to plan, deploy and maintain a compliant security solution that guards vital IT resources in environments that include remote workers.

Firewall Integration Services for At-Home WorkersFirewalls allow companies to create a network environment that can be securely utilized by local users and by telecommuters, mobile employees, suppliers, customers, and the public. Next-generation firewall appliances permit you to assign and control different permissions to different classes of users and to scale your IT network and modify your security as your business evolves and as network attacks become more complex. Progent supports both current and older security devices from all major manufacturers including Cisco, Palo Alto Networks, Check Point, Juniper, and Fortinet. To find out more about Progent's firewall support expertise, refer to firewall integration and support services.

Remote Security Monitoring and Management for TelecommutersRemote Endpoint Security Monitoring makes it easy to watch over the disparate computers used by teleworkers and either block or identify and mitigate the latest cyber attacks like ransomware. With ProSight Active Security Monitoring services, a lightweight agent is put on every secured endpoint device, watching all activity and using advanced machine learning from SentinelOne to detect zero-day threats on arrival. When an attack is spotted, ProSight ASM instantly disconnects the infected device from the corporate network to contain the threat. Because the ProSight Active Security Monitoring software agent is autonomous, endpoints stay secure even if they are not connected to the Internet. To learn more about ProSight ASM, see remote endpoint monitoring for at-home workers.

Two-factor Authentication (2FA) Services for TeleworkersProgent's Duo authentication services incorporate Cisco's Duo technology to protect against password theft through the use of two-factor authentication (2FA). Duo supports single-tap identity confirmation with iOS, Android, and other personal devices. With Duo 2FA, whenever you log into a secured online account and enter your password you are requested to confirm who you are on a unit that only you have and that is accessed using a separate network channel. A wide range of devices can be utilized as this second form of ID validation such as an iPhone or Android or watch, a hardware token, a landline telephone, etc. You may register several validation devices. For more information about ProSight Duo identity validation services, go to Duo MFA two-factor authentication (2FA) services for at-home workers.

Security Audit Services for At-Home WorkersSecurity Audits can evaluate the vulnerability of your information system to all classes of external and internal security attacks for a network that incorporates telecommuters. Progent can deploy remote, automated security inventory software for rapidly and economically detecting a broad range of security holes that can be surfaced over the Internet. Progent's endpoint security audit consulting services, which can be managed by network security experts with top credentials such as CISM, CISSP, and GIAC, can assist you to audit your operations and governance policies and review your WAN infrastructure to enable you to implement top-level security for your remote workers.

Download White Paper: Securing a Work-From-Home Network
To view or download a white paper about key things to focus on for securing a network that supports telecommuters, click:
Securing a Work-From-Home Environment White Paper. (PDF - 2.4 MB)

Contact Progent for Remote Workforce Support Services
To get in touch with Progent about building and managing an efficient work-from-home environment for your Charleston, South Carolina organization, phone 1-800-993-9400 or go to Contact Progent.