Enlarging your at-home workforce can have a major impact on IT infrastructure, cybersecurity, and corporate processes. Progent has 20 years of background assisting businesses of all sizes to design, configure, administer, optimize, and troubleshoot IT networks that incorporate at-home workers. Progent can assist your Durham organization to pick the right technologies and follow best practices in building and maintaining a secure virtual office ecosystem for teleworkers that promotes teamwork and returns top business value. Progent offers support services that go from on demand expertise for getting you over occasional IT roadblocks to full project management to help you successfully complete mission-critical initiatives.
Progent's consultants can assist Durham, North Carolina businesses to with any facet of creating a high-functioning telecommuting ecosystem by providing network infrastructure configuration services, VoIP PBX expertise, voice/video conferencing support, collaboration platform selection and deployment, cloud connectivity, Help Desk services, security monitoring, data protection solutions, and centralized management.
Security for Teleworkers
Work-from-Home employees commonly utilize their own computers and usually work in an unsecured physical environment. This situation multiplies their susceptibility to cyber attacks and requires judicious configuration of firewalls, AV tools, MFA-based identity verification, remote endpoint monitoring, extensive end-user education, and the creation of security policies built on leading practices. Progent's seasoned roster of cybersecurity support experts can assist your business to plan, deploy and maintain a compliant security solution that guards vital information resources in environments that include at-home workers.
Firewalls enable companies to build a network that can be safely utilized by on-premises users and by teleworkers, mobile employees, suppliers, clients, and other stakeholders. Next-generation firewall devices allow you to configure and control appropriate access rights to various classes of users and to expand your IT network and adjust your cybersecurity posture as your company evolves and as network attacks become more sophisticated. Progent works with both new and legacy security appliances from all major vendors like Cisco, Palo Alto Networks, WatchGuard, Juniper, and Fortinet. For more information about Progent's firewall configuration services, refer to firewall configuration and support services.
Online Endpoint Monitoring makes it possible to watch over the various devices used by at-home workers and either block or identify and mitigate the latest cyber attacks such as ransomware. With Progent's ProSight Active Security Monitoring services, a small-footprint software agent is put on every secured endpoint device, monitoring all activity and using advanced machine learning from SentinelOne to identify new threats before they can spread. When an attack is discovered, ProSight Active Security Monitoring instantly isolates the infected endpoint from the network to quarantine the threat. Since the ProSight ASM software agent is self-contained, endpoints stay protected even if they are not connected to the Internet. Progent is a SentinelOne Partner, reseller, and integrator. For details about ProSight ASM, see remote endpoint monitoring for remote workers.
Progent's Duo authentication managed services incorporate Cisco's Duo technology to defend against stolen passwords through the use of two-factor authentication (2FA). Duo supports single-tap identity verification with Apple iOS, Android, and other personal devices. With 2FA, when you log into a secured application and enter your password you are asked to confirm your identity via a device that only you possess and that is accessed using a different ("out-of-band") network channel. A broad range of devices can be used for this added form of ID validation such as a smartphone or wearable, a hardware token, a landline phone, etc. You can register multiple validation devices. To find out more about ProSight Duo two-factor identity validation services, go to Cisco Duo MFA two-factor authentication (2FA) services for an at-home workforce.
Security Audits can assess the vulnerability of your information system to all types of external and internal security attacks for a network that includes telecommuters. Progent can run remote, automated security inventory scanning for quickly and affordably uncovering a wide variety of security weaknesses that can be found over the Internet. Progent's security assessment experts, which can be managed by network security experts with advanced certifications such as CISM, CISSP, and GIAC, can assist your business to audit your workflows and governance policies and assess your network architecture to allow you to implement the highest level of protection for your an at-home workforce.
Download White Paper: Protecting a Work-From-Home Environment
To view or download a white paper about critical things to concentrate on for securing a network that supports work-from-home staff, click:
Protecting a Work-From-Home Environment White Paper. (PDF - 2.4 MB)
Contact Progent for Telecommuter Expertise
To contact Progent about creating and managing an efficient work-from-home solution for your Durham, North Carolina company, phone 1-800-993-9400 or refer to Contact Progent.