Expanding your telecommuter workforce may have a significant effect on network infrastructure, security/compliance, and company processes. Progent has 20 years of background helping small and mid-size businesses to plan, configure, manage, optimize, and troubleshoot IT environments that support a remote workforce. Progent can assist your Durham organization to select the appropriate technologies and adhere to best practices in creating and maintaining a secure virtual office ecosystem for telecommuters that facilitates collaboration and returns top business value. Progent can provide support services that go from on demand guidance for helping you over occasional technical roadblocks to comprehensive project management or co-management to help you carry out business-critical tasks.
Progent's consultants can help Durham, North Carolina companies to succeed with any facet of creating a high-functioning work-from-home ecosystem by delivering network infrastructure configuration services, IP voice expertise, video conferencing support, collaboration platform selection and deployment, public cloud integration, helpdesk augmentation, security and compliance, backup/restore solutions, and unified management.
Security for Remote Workers
At-home employees commonly use their own computers and usually operate in a poorly secured physical environment. This multiplies their vulnerability to cyber attacks and requires careful configuration of firewalls, AV tools, multi-factor authentication, remote monitoring, intensive user training, and the development of policies built on leading practices. Progent's seasoned group of cybersecurity support consultants can assist you to design, implement and manage an effective cybersecurity solution that protects vital IT resources in networks that include remote workers.
Firewalls enable companies to create a network that can be safely accessed by local users as well as by at-home workers, mobile workers, vendors, clients, and other stakeholders. Modern firewall devices permit you to configure and manage different permissions to different classes of users and to scale your network and modify your security as your company evolves and as cyber threats become increasingly complex. Progent supports both new and older security devices from all major manufacturers including Cisco, Palo Alto Networks, WatchGuard, Juniper, SonicWall and Fortinet. To find out more about Progent's firewall support services, go to firewall configuration and support services.
Remote Endpoint Monitoring makes it easy to track the various computers utilized by remote workers and either block or identify and mitigate the latest cyber attacks like ransomware. With ProSight Active Security Monitoring (ASM) services, a small-footprint agent is put on every protected endpoint, watching all activity and using advanced behavioral threat analysis from SentinelOne to detect new attacks on arrival. When an attack is discovered, ProSight Active Security Monitoring immediately disconnects the infected endpoint device from the corporate network to quarantine the malware. Since the ProSight Active Security Monitoring software agent is self-contained, endpoints remain secure even if they are offline. Progent is a SentinelOne Partner, reseller, and integrator. For details about ProSight Active Security Monitoring, visit remote endpoint monitoring for at-home workers.
Progent's Duo authentication services utilize Cisco's Duo cloud technology to protect against password theft through the use of two-factor authentication. Duo enables one-tap identity verification with iOS, Google Android, and other out-of-band devices. With Duo 2FA, when you log into a protected online account and give your password you are requested to verify who you are via a unit that only you possess and that uses a different ("out-of-band") network channel. A wide range of devices can be utilized as this second form of authentication such as a smartphone or watch, a hardware token, a landline telephone, etc. You may designate several validation devices. For details about Duo identity authentication services, see Duo MFA two-factor authentication services for telecommuters.
Security Audits can evaluate the vulnerability of your information system to all classes of outside and local security threats for a network that incorporates an at-home workforce. Progent can run remote, automated security inventory software for quickly and economically uncovering a broad range of security gaps that can be surfaced via the Internet. Progent's security assessment experts, which can be provided by data security professionals with top certifications including CISA, ISSAP, and GIAC, can help your business to evaluate your procedures and governance policies and review your network architecture to allow you to design top-level protection for your at-home workers.
Download White Paper: Securing a Work-From-Home (WFH) Environment
To view or download a white paper about key things to concentrate on for securing a network that supports telecommuters, click:
Protecting a Work-From-Home (WFH) Environment White Paper. (PDF - 2.4 MB)
Contact Progent for At-Home Worker Expertise
To contact Progent about building and managing a productive telecommuter solution for your Durham, North Carolina organization, call 1-800-993-9400 or refer to Contact Progent.