Enlarging your at-home workforce may have a significant impact on network architecture, cybersecurity, and company workflows. Progent has two decades of background assisting small and mid-size businesses to plan, deploy, administer, tune, and troubleshoot IT networks that incorporate at-home workers. Progent can help your Durham organization to pick the right tools and follow best practices in building and operating a secure virtual ecosystem for telecommuters that facilitates collaboration and delivers maximum business value. Progent offers services ranging from on demand expertise for getting you over challenging technical bottlenecks to full project management or co-management to help you successfully complete mission-critical initiatives.

Progent can assist Durham, North Carolina businesses to with any facet of building a high-functioning work-from-home environment by providing network infrastructure design and configuration services, IP voice troubleshooting, voice/video conferencing integration, collaboration platform selection and deployment, public cloud integration, helpdesk augmentation, endpoint security, data protection solutions, and unified management.

Security and Compliance for Telecommuters
Work-from-Home staff members commonly utilize their own devices and often operate in an unsecured physical environment. This situation multiplies their vulnerability to cyber threats and requires careful configuration of firewalls, AV tools, MFA-based identity verification, remote monitoring, extensive end-user education, and the development of policies built on leading practices. Progent's seasoned roster of data security solutions consultants can assist your business to design, configure and maintain a compliant cybersecurity solution that guards critical IT assets in networks that incorporate an at-home workforce.

Firewall Integration Services for At-Home WorkersFirewalls allow companies to build a network environment that can be safely utilized by on-premises users and by teleworkers, mobile users, vendors, clients, and the public. Next-generation firewall appliances allow you to configure and control different access rights to various groups of users and to scale your IT network and adjust your security as your company evolves and as cyber threats grow more sophisticated. Progent supports both current and older firewall devices from all leading manufacturers like Cisco, Palo Alto Networks, WatchGuard, Juniper, SonicWall and Fortinet. To find out more about Progent's firewall integration expertise, see firewall support expertise.

Remote Endpoint Monitoring and Management Services for TelecommutersRemote Endpoint Security Monitoring makes it possible to watch over the various devices utilized by teleworkers and either reject or spot and mitigate the latest threats such as ransomware. With ProSight Active Security Monitoring services, a lightweight agent is put on each secured endpoint device, monitoring all activity and using state-of-the-art AI technology from SentinelOne to detect zero-day attacks before they can spread. When an attack is discovered, ProSight Active Security Monitoring instantly disconnects the targeted endpoint device from the corporate network to contain the malware. Because the ProSight Active Security Monitoring agent is autonomous, endpoint devices stay protected even when they are disconnected from the Internet. To learn more about ProSight Active Security Monitoring, refer to remote endpoint monitoring for remote workers.

Two-factor Authentication (2FA) Services for TelecommutersProgent's Duo authentication managed services utilize Cisco's Duo technology to defend against compromised passwords through the use of two-factor authentication (2FA). Duo supports single-tap identity confirmation on Apple iOS, Android, and other personal devices. Using Duo 2FA, when you sign into a secured application and give your password you are requested to confirm your identity via a unit that only you have and that is accessed using a different ("out-of-band") network channel. A broad selection of devices can be used for this added form of authentication including an iPhone or Android or wearable, a hardware token, a landline telephone, etc. You can register several validation devices. To learn more about ProSight Duo identity authentication services, go to Duo MFA two-factor authentication services for an at-home workforce.

Security Audit Services for At-Home WorkersSecurity Audits can evaluate the exposure of your network to all classes of outside and local security attacks for a network that incorporates at-home workers. Progent can run online, automated security inventory scanning for quickly and affordably uncovering a wide variety of security gaps that can be surfaced over the Internet. Progent's endpoint security assessment experts, which can be managed by network security experts with advanced certifications including CISA, CISSP, and GIAC, can help you to evaluate your procedures and policies and review your WAN architecture to enable you to design top-level protection for your an at-home workforce.

Download White Paper: Protecting a Work-From-Home Network
To view or download a white paper about critical things to focus on for protecting a network that incorporates telecommuters, click:
Protecting a Work-From-Home (WFH) Network White Paper. (PDF - 2.4 MB)

Contact Progent for Remote Workforce Support Services
To contact Progent about creating and maintaining a productive work-from-home solution for your Durham, North Carolina business, phone 1-800-993-9400 or go to Contact Progent.