Adding to your at-home or hybrid pool of workers can have a significant impact on network infrastructure, security, and your corporate culture. Progent has two decades of experience helping small and medium-size businesses (SMBs) to design, deploy, optimize, administer, and debug networks that incorporate an offsite workforce. Progent can assist you to select the right tools and follow leading practices in building and supporting a safe virtual ecosystem that promotes collaboration and delivers maximum value.
Progent offers remote IT services ranging from as-needed support for helping you over sporadic IT roadblocks to full project management or co-management for successfully completing business-critical initiatives.
Security and Compliance for At-Home Workers
At-home workers commonly utilize their personal computing devices and usually work in a poorly secured physical space. This multiplies their susceptibility to malware threats and requires careful deployment of corporate firewalls, anti-malware tools, MFA-based identity verification, remote monitoring, thorough user education, and the development of security policies based on best practices. Progent's seasoned roster of data security solutions consultants can help your business to design, deploy and maintain an effective cybersecurity solution that guards vital IT assets in environments that incorporate remote workers.
Firewalls enable companies to build a network that can be securely accessed by on-premises users and by telecommuters, mobile workers, suppliers, clients, and other stakeholders. Modern firewall appliances allow you to assign and control appropriate permissions to various groups of users and to scale your network and modify your security as your business evolves and as network attacks become increasingly sophisticated. Progent supports both current and legacy firewall appliances from all leading vendors including Cisco, Palo Alto Networks, WatchGuard, Juniper, SonicWall and Fortinet. To learn more about Progent's firewall configuration services, refer to firewall configuration and support services.
Online Endpoint Monitoring makes it possible to track the disparate computers used by telecommuters and either block or identify and mitigate the latest threats like ransomware. With Progent's ProSight Active Security Monitoring (ASM) services, a small-footprint agent is installed on every protected endpoint device, monitoring all activity and using state-of-the-art AI technology from SentinelOne to identify new attacks on arrival. When a cyberattack is spotted, ProSight ASM instantly isolates the infected endpoint from the network to contain the malware. Because the ProSight ASM agent is self-contained, endpoint devices stay protected even when they are offline. Progent is a SentinelOne Partner, reseller, and integrator. For details about ProSight ASM, visit remote endpoint monitoring for an at-home workforce.
Progent's Duo authentication Services incorporate Cisco's Duo technology to defend against stolen passwords by using two-factor authentication (2FA). Duo enables one-tap identity confirmation with Apple iOS, Google Android, and other personal devices. Using Duo 2FA, when you log into a protected application and give your password you are requested to confirm your identity on a device that only you possess and that is accessed using a different network channel. A broad range of devices can be used as this added means of authentication including a smartphone or wearable, a hardware token, a landline telephone, etc. You may designate several verification devices. To find out more about ProSight Duo identity validation services, visit Duo MFA two-factor authentication services for telecommuters.
Security Audits can assess the vulnerability of your information system to all classes of external and local security attacks for an environment that includes telecommuters. Progent can deploy online, automated security analysis software for rapidly and affordably uncovering a broad range of security weaknesses that can be found over the Internet. Progent's security audit consulting services, which can be managed by data security professionals with advanced credentials including CISM, CISSP, and GIAC, can assist your business to evaluate your processes and policies and assess your WAN architecture to enable you to design the highest level of security for your teleworkers.
Horizon3.ai's NodeZero Penetration Testing Platform is a breakthrough penetration test (pentest) product family that can deliver autonomous testing of your work-from-home connectivity solution as well as your internal and perimeter networks to help you expose, rank, fix, and verify cybersecurity weaknesses before threat actors can take advantage of them. Progent's pentest experts can help you to deploy NodeZero to perform comprehensive penetration tests of your perimeter and your internal network so you can determine your current security posture. Progent's NodeZero experts can also assist you to strengthen your existing network security and can help you to design and deploy a unified cybersecurity ecosystem that streamlines management and provides optimum cyber defense for on-prem, multi-cloud, remote, and perimeter IT assets. To find out more details about Progent's vulnerability assessment services based on on NodeZero's penetration test platform, visit Consulting Services for NodeZero's PEN Test Products.
Download White Paper: Protecting a Work-From-Home (WFH) Network
To read or download a white paper describing critical things to concentrate on for securing an IT environment that supports work-from-home staff, click:
Protecting a Work-From-Home Environment White Paper. (PDF - 2.4 MB)
Contact Progent for At-Home Worker Expertise
To get in touch with Progent about creating and maintaining an efficient telecommuter environment, phone
Ransomware 24x7 Hot Line: Call 800-462-8800
Progent's Ransomware 24x7 Hot Line is designed to guide organizations to complete the urgent first steps in responding to a ransomware attack by containing the malware. Progent's remote ransomware engineer can assist you to identify and isolate breached servers and endpoints and guard undamaged assets from being penetrated. If your system has been penetrated by any version of ransomware, act fast. Get help quickly by calling Progent's Ransomware Hot Line at 800-462-8800. For more information, visit Progent's Ransomware 24x7 Hot Line.