Expanding your at-home workforce may have a significant impact on network infrastructure, security/compliance, and company workflows. Progent has two decades of background assisting small and mid-size businesses to design, configure, administer, optimize, and troubleshoot IT environments that support at-home workers. Progent can assist your Durham company to select the appropriate technologies and adhere to leading practices in building and operating a safe virtual office ecosystem for telecommuters that promotes teamwork and returns maximum business value. Progent can provide services that go from as-needed expertise for getting you over occasional technical bottlenecks to comprehensive project management to help you successfully complete mission-critical initiatives.
Progent's consultants can help Durham, North Carolina companies to succeed with any aspect of building a high-functioning remote work ecosystem by providing network infrastructure configuration services, IP voice troubleshooting, voice/video conferencing integration, collaboration platform customization and training, public cloud integration, helpdesk outsourcing, data security, backup/restore solutions, and unified management.
Security for At-Home Workers
At-home staff members typically utilize their personal computing devices and often operate in a poorly secured physical area. This multiplies their susceptibility to malware attacks and requires judicious deployment of firewalls, anti-malware tools, MFA-based identity verification, remote endpoint monitoring, intensive user training, and the creation of security policies based on best practices. Progent's veteran team of IT security support consultants can assist your business to design, implement and manage a compliant security solution that guards critical IT assets in environments that incorporate remote workers.
Firewalls enable you to build a network environment that can be safely accessed by on-premises users and by telecommuters, mobile users, vendors, customers, and other stakeholders. Modern firewall devices allow you to assign and control different access rights to different groups of users and to scale your IT network and adjust your cybersecurity posture as your company evolves and as cyber threats grow more complex. Progent supports both new and older firewall devices from all leading vendors including Cisco, Palo Alto Networks, Check Point, Juniper, and Fortinet. For details about Progent's firewall configuration services, go to firewall support services.
Remote Endpoint Security Monitoring makes it easy to track the various devices used by remote workers and either block or spot and respond to the latest cyber attacks like ransomware. With ProSight Active Security Monitoring (ASM) services, a lightweight software agent is put on every protected endpoint device, watching all activity and utilizing state-of-the-art machine learning and full execution context from SentinelOne to detect zero-day attacks on arrival. When a cyberattack is discovered, ProSight Active Security Monitoring instantly isolates the infected endpoint from the network to quarantine the threat. Since the ProSight ASM software agent is self-contained, endpoints remain secure even when they are disconnected from the Internet. Progent is a SentinelOne Partner, dealer, and integrator. To find out more about ProSight ASM, visit remote endpoint monitoring for an at-home workforce.
Progent's Duo authentication Service Plans incorporate Cisco's Duo cloud technology to defend against compromised passwords through the use of two-factor authentication. Duo supports single-tap identity verification on iOS, Google Android, and other personal devices. Using 2FA, when you sign into a secured online account and give your password you are asked to confirm who you are via a device that only you have and that is accessed using a different network channel. A broad selection of out-of-band devices can be utilized as this second means of authentication such as an iPhone or Android or watch, a hardware token, a landline telephone, etc. You can register multiple verification devices. To learn more about Duo two-factor identity validation services, visit Duo MFA two-factor authentication services for telecommuters.
Security Audits can evaluate the vulnerability of your network to all types of external and internal security attacks for an environment that includes teleworkers. Progent can deploy online, automated cybersecurity analysis scanning for quickly and affordably detecting a broad range of security weaknesses that can be surfaced via the Internet. Progent's endpoint security assessment consulting services, which can be managed by data security experts with advanced certifications such as CISM, CISSP, and GIAC, can help your business to audit your workflows and governance policies and review your IT architecture to enable you to implement the highest level of security for your an at-home workforce.
Horizon3.ai's NodeZero Penetration Testing Platform is a cutting-edge penetration test (pentest) product family that can deliver automated testing of your work-from-home connectivity solution and your internal and perimeter networks so you can identify, prioritize, remediate, and verify security weaknesses before threat actors can exploit them. Progent can assist you to deploy NodeZero to carry out comprehensive pentests of your perimeter and your internal IT infrastructure so you can determine your present security posture. Progent's NodeZero experts can also help you to strengthen your existing network security and can help you to plan and implement a unified cybersecurity ecosystem that simplifies management and delivers optimum protection for on-premises, multi-cloud, remote, and perimeter IT assets. To learn more details about Progent's vulnerability assessment solutions based on on NodeZero's penetration test products, refer to Consulting Services for NodeZero's Pentest Platform.
Download White Paper: Protecting a Work-From-Home Environment
To read or download a white paper describing key things to concentrate on for securing a network that supports telecommuters, click:
Protecting a Work-From-Home Network White Paper. (PDF - 2.4 MB)
Contact Progent for At-Home Worker Expertise
To get in touch with Progent about creating and maintaining an efficient telecommuter environment for your Durham, North Carolina company, call