Enlarging your at-home workforce can have a significant effect on network architecture, security/compliance, and corporate workflows. Progent has two decades of experience helping SMBs to design, deploy, manage, optimize, and troubleshoot IT environments that incorporate a remote workforce. Progent can help your Durham organization to pick the right tools and follow best practices in building and maintaining a safe virtual solution for telecommuters that facilitates collaboration and delivers top value. Progent offers support services that go from as-needed guidance for helping you past challenging technical bottlenecks to comprehensive project management or co-management to help you carry out mission-critical tasks.

Progent can assist Durham, North Carolina businesses to with any facet of building a high-functioning work-at-home ecosystem by delivering network infrastructure configuration services, IP voice troubleshooting, voice/video conferencing support, collaboration platform customization and training, cloud connectivity, helpdesk services, security monitoring, backup/restore solutions, and streamlined management.

Security and Compliance for At-Home Workers
Work-from-Home workers typically use their own computing devices and often operate in an unsecured physical environment. This situation increases their susceptibility to cyber threats and calls for careful deployment of corporate firewalls, AV tools, MFA-based identity verification, remote endpoint monitoring, thorough user education, and the development of policies based on leading practices. Progent's seasoned group of IT security support consultants can help you to plan, implement and maintain an effective cybersecurity solution that guards vital information assets in environments that incorporate telecommuters.

Firewall Integration Services for At-Home WorkersFirewalls allow you to create a network environment that can be safely accessed by on-premises users as well as by teleworkers, mobile workers, suppliers, customers, and other stakeholders. Modern firewall devices allow you to assign and control appropriate access rights to different groups of users and to expand your network and adjust your cybersecurity posture as your business evolves and as network attacks grow increasingly complex. Progent works with both current and legacy security devices from all major manufacturers like Cisco, Palo Alto Networks, Check Point, Juniper, and Fortinet. To find out more about Progent's firewall configuration expertise, see firewall support services.

Remote Security Monitoring Services for TelecommutersOnline Endpoint Security Monitoring makes it possible to track the disparate computers utilized by an at-home workforce and either block or identify and respond to the latest cyber attacks such as ransomware. With ProSight Active Security Monitoring services, a lightweight software agent is installed on each protected endpoint device, monitoring all activity and using advanced machine learning from SentinelOne to identify new attacks on arrival. When an attack is spotted, ProSight Active Security Monitoring immediately disconnects the impacted device from the corporate network to contain the threat. Since the ProSight ASM software agent is self-contained, endpoints remain protected even when they are disconnected from the Internet. Progent is a SentinelOne Partner, reseller, and integrator. To learn more about ProSight ASM, visit remote endpoint security monitoring for teleworkers.

Two-factor Authentication (2FA) Services for TeleworkersProgent's Duo authentication Services incorporate Cisco's Duo cloud technology to protect against stolen passwords by using two-factor authentication (2FA). Duo supports single-tap identity verification on iOS, Android, and other out-of-band devices. Using 2FA, whenever you sign into a protected online account and give your password you are asked to confirm your identity via a unit that only you have and that is accessed using a different network channel. A broad range of devices can be used for this added form of authentication such as an iPhone or Android or wearable, a hardware/software token, a landline telephone, etc. You can designate several validation devices. To learn more about Duo identity authentication services, refer to Duo MFA two-factor authentication services for remote workers.

Security Audit Services for At-Home WorkersSecurity Audits can evaluate the vulnerability of your information system to all classes of outside and local security attacks for an environment that incorporates remote workers. Progent can deploy remote, automated cybersecurity inventory software for rapidly and affordably detecting a broad range of security weaknesses that can be found over the Internet. Progent's security assessment consulting services, which can be managed by data security professionals with advanced certifications such as CISM, ISSAP, and GIAC, can assist your business to audit your processes and governance policies and assess your WAN infrastructure to allow you to design the highest level of protection for your at-home workers.

NodeZero Pentetration Testing for At-Home WorkersHorizon3.ai's NodeZero PEN Testing Platform is a leading-edge penetration test (pentest) product family that supports autonomous testing of your at-home connectivity solution and your internal and perimeter networks so you can expose, prioritize, fix, and verify security weaknesses before malicious hackers can exploit them. Progent's pentest experts can help you to deploy NodeZero to carry out comprehensive pentests of your perimeter and your internal network so you can evaluate your present security profile. Progent's NodeZero experts can also assist you to strengthen your network security and can assist you to design and implement a cohesive cybersecurity ecosystem that streamlines management and provides maximum protection for on-premises, multi-cloud, at-home, and perimeter IT assets. To find out more information about Progent's threat assessment services powered by on NodeZero's penetration test platform, visit Consulting Services for NodeZero's Pentest Products.

Download White Paper: Protecting a Work-From-Home (WFH) Network
To view or download a white paper describing key areas to focus on for protecting a network that supports telecommuters, click:
Securing a Work-From-Home Network White Paper. (PDF - 2.4 MB)

Contact Progent for Telecommuter Expertise
To get in touch with Progent about creating and maintaining a productive telecommuter solution for your Durham, North Carolina company, phone 1-800-993-9400 or go to Contact Progent.