Enlarging your remote workforce may have a significant impact on network architecture, security/compliance, and corporate culture. Progent has two decades of background assisting SMBs to design, deploy, administer, tune, and troubleshoot IT networks that support at-home workers. Progent can help your Colorado Springs organization to select the right technologies and follow best practices in creating and operating a safe virtual ecosystem for teleworkers that facilitates collaboration and delivers top value. Progent can provide services ranging from on demand expertise for getting you over occasional technical roadblocks to full project management to help you successfully complete mission-critical tasks.
Progent can assist Colorado Springs, Colorado companies to with any aspect of creating a high-performing telecommuting environment by providing infrastructure design and configuration services, VoIP PBX expertise, video conferencing support, collaboration platform customization and training, cloud integration, helpdesk outsourcing, data security, data protection solutions, and centralized management.
Security for Teleworkers
At-home employees commonly use their own devices and often operate in an unsecured physical space. This increases their vulnerability to cyber attacks and requires judicious configuration of corporate firewalls, AV tools, multi-factor authentication, remote endpoint monitoring, intensive end-user education, and the creation of policies built on leading practices. Progent's veteran roster of data security solutions experts can assist your business to plan, implement and manage an effective security solution that guards vital information resources in environments that incorporate an at-home workforce.
Firewalls enable companies to build a network that can be safely accessed by on-premises users as well as by teleworkers, mobile workers, suppliers, clients, and other stakeholders. Modern firewall devices permit you to configure and control different permissions to various groups of users and to expand your network and adjust your security as your business evolves and as network attacks grow more complex. Progent works with both new and older firewall appliances from all leading manufacturers like Cisco, Palo Alto Networks, WatchGuard, Juniper, and Fortinet. For more information about Progent's firewall integration expertise, see firewall configuration and support expertise.
Remote Endpoint Security Monitoring makes it possible to track the various devices utilized by at-home workers and either block or identify and mitigate the latest threats like ransomware. With Progent's ProSight Active Security Monitoring (ASM) services, a small-footprint agent is put on each protected endpoint, monitoring all activity and using state-of-the-art machine learning from SentinelOne to identify new attacks before they can spread. When an attack is spotted, ProSight ASM instantly disconnects the targeted device from the corporate network to quarantine the threat. Because the ProSight Active Security Monitoring software agent is autonomous, endpoints stay secure even if they are disconnected from the Internet. Progent is a SentinelOne Partner, reseller, and integrator. To find out more about ProSight ASM, visit remote endpoint security monitoring for telecommuters.
Progent's Duo MFA service plans incorporate Cisco's Duo technology to defend against password theft by using two-factor authentication. Duo supports one-tap identity verification with iOS, Android, and other personal devices. With Duo 2FA, whenever you log into a protected application and give your password you are requested to verify who you are on a device that only you have and that is accessed using a different ("out-of-band") network channel. A wide selection of out-of-band devices can be used as this added means of ID validation including an iPhone or Android or wearable, a hardware/software token, a landline phone, etc. You can register several validation devices. To find out more about Duo two-factor identity authentication services, refer to Duo MFA two-factor authentication services for remote workers.
Security Audits can evaluate the exposure of your information system to all classes of outside and local security threats for an environment that incorporates an at-home workforce. Progent can run online, automated cybersecurity analysis software for quickly and economically detecting a broad range of security holes that can be surfaced over the Internet. Progent's endpoint security audit experts, which can be provided by security professionals with top certifications including CISM, ISSAP, and GIAC, can help your business to evaluate your workflows and governance policies and assess your WAN architecture to allow you to implement the highest level of security for your remote workers.
Download White Paper: Protecting a Work-From-Home (WFH) Environment
To read or download a white paper about key areas to focus on for protecting a network that supports work-from-home staff, click:
Securing a Work-From-Home (WFH) Environment White Paper. (PDF - 2.4 MB)
Contact Progent for Remote Workforce Expertise
To get in touch with Progent about building and maintaining an efficient work-from-home environment for your Colorado Springs, Colorado organization, call