Expanding your telecommuter workforce may have a major impact on network architecture, security, and corporate culture. Progent has two decades of background helping SMBs to design, configure, administer, optimize, and troubleshoot IT environments that support at-home workers. Progent can help your Durham company to select the appropriate tools and adhere to leading practices in building and operating a safe virtual office solution for teleworkers that promotes teamwork and returns top value. Progent can provide services ranging from as-needed guidance for helping you over challenging IT roadblocks to full project management to help you carry out mission-critical initiatives.
Progent's consultants can help Durham, North Carolina businesses to with any facet of building a high-functioning work-from-home ecosystem by providing infrastructure design and configuration services, VoIP PBX expertise, voice/video conferencing integration, collaboration platform customization and training, cloud integration, Call Desk outsourcing, cybersecurity, backup/restore solutions, and unified management.
Security and Compliance for At-Home Workers
Work-from-Home staff members typically utilize their personal devices and usually operate in a poorly secured physical environment. This situation multiplies their susceptibility to malware threats and requires careful deployment of firewalls, AV tools, multi-factor authentication, remote monitoring, intensive user education, and the creation of policies based on best practices. Progent's seasoned group of cybersecurity solutions experts can help you to design, implement and maintain an effective security solution that guards critical information assets in environments that include telecommuters.
Firewalls allow companies to create a network that can be safely utilized by local users as well as by telecommuters, mobile workers, vendors, customers, and the public. Modern firewall devices permit you to configure and control appropriate permissions to various groups of users and to expand your IT network and modify your cybersecurity posture as your business evolves and as network attacks become more complex. Progent works with both new and older firewall appliances from all major manufacturers like Cisco, Palo Alto Networks, Check Point, Juniper, and Fortinet. For details about Progent's firewall support services, visit firewall integration and support services.
Online Endpoint Security Monitoring makes it easy to watch over the disparate devices used by remote workers and either reject or spot and mitigate modern threats like ransomware. With Progent's ProSight Active Security Monitoring (ASM) services, a small-footprint agent is installed on every protected endpoint, monitoring all activity and utilizing advanced AI technology from SentinelOne to identify new threats on arrival. When a cyberattack is spotted, ProSight ASM instantly disconnects the targeted endpoint from the corporate network to contain the threat. Because the ProSight ASM software agent is autonomous, endpoints stay protected even if they are disconnected from the Internet. Progent is a SentinelOne Partner, reseller, and integrator. To find out more about ProSight Active Security Monitoring, visit remote endpoint monitoring for an at-home workforce.
Progent's Duo authentication managed services utilize Cisco's Duo cloud technology to protect against stolen passwords by using two-factor authentication (2FA). Duo enables single-tap identity verification with iOS, Android, and other out-of-band devices. Using Duo 2FA, when you log into a protected application and enter your password you are asked to confirm your identity via a device that only you possess and that is accessed using a different ("out-of-band") network channel. A wide range of devices can be used as this second form of ID validation such as a smartphone or wearable, a hardware/software token, a landline phone, etc. You may register several verification devices. For more information about Duo two-factor identity validation services, visit Cisco Duo MFA two-factor authentication (2FA) services for telecommuters.
Security Audits can evaluate the vulnerability of your network to all types of external and local security threats for a network that includes at-home workers. Progent can deploy online, automated security inventory scanning for rapidly and affordably detecting a broad range of security weaknesses that can be found over the Internet. Progent's endpoint security audit consulting services, which can be provided by network security experts with top certifications including CISA, ISSAP, and GIAC, can help you to audit your processes and policies and assess your IT architecture to enable you to design the highest level of protection for your telecommuters.
Download White Paper: Protecting a Work-From-Home Environment
To read or download a white paper about key things to focus on for securing a network that includes work-from-home staff, click:
Securing a Work-From-Home Network White Paper. (PDF - 2.4 MB)
Contact Progent for Telecommuter Expertise
To get in touch with Progent about building and managing a productive telecommuter solution for your Durham, North Carolina company, call