Adding to your home-based or hybrid workforce can have a significant impact on network infrastructure, cybersecurity, and your business culture. Progent has two decades of experience assisting small and medium-size businesses (SMBs) to design, implement, optimize, manage, and debug networks that incorporate offsite workers. Progent can help you to select the appropriate tools and adhere to leading practices in building and maintaining a secure virtualized ecosystem that facilitates collaboration and delivers maximum business value.
Progent can provide remote IT services that range from on-demand consulting for helping you through occasional technical roadblocks to full project management or co-management for successfully completing strategic initiatives.
Cybersecurity for Telecommuters
At-home employees typically use their personal devices and usually operate in a poorly secured physical space. This increases their vulnerability to malware threats and calls for judicious deployment of firewalls, AV tools, MFA-based identity verification, remote monitoring, intensive user education, and the creation of security policies built on best practices. Progent's seasoned group of cybersecurity solutions consultants can help your business to design, configure and maintain an effective security solution that guards vital IT assets in environments that include remote workers.
Firewalls enable companies to create a network that can be securely utilized by local users as well as by teleworkers, mobile workers, vendors, clients, and other stakeholders. Next-generation firewall appliances allow you to configure and control different access rights to different classes of users and to expand your network and modify your cybersecurity posture as your company evolves and as cyber threats become more complex. Progent works with both current and legacy security devices from all leading vendors like Cisco, Palo Alto Networks, Check Point, Juniper, and Fortinet. For more information about Progent's firewall configuration services, refer to firewall configuration and support expertise.
Remote Endpoint Monitoring makes it possible to track the various devices used by remote workers and either reject or identify and mitigate the latest cyber attacks such as ransomware. With ProSight Active Security Monitoring (ASM) services, a small-footprint agent is installed on every secured endpoint device, watching all activity and utilizing state-of-the-art machine learning and full execution context from SentinelOne to identify new threats on arrival. When a cyberattack is discovered, ProSight Active Security Monitoring immediately disconnects the impacted device from the corporate network to quarantine the threat. Because the ProSight ASM software agent is self-contained, endpoint devices stay secure even if they are offline. Progent is a SentinelOne Partner, reseller, and integrator. For more information about ProSight ASM, see remote endpoint monitoring for an at-home workforce.
Progent's Duo authentication Managed Services incorporate Cisco's Duo technology to defend against password theft through the use of two-factor authentication. Duo supports single-tap identity verification with Apple iOS, Android, and other out-of-band devices. Using 2FA, whenever you log into a protected online account and enter your password you are requested to verify your identity via a device that only you have and that is accessed using a separate network channel. A wide range of devices can be used for this added means of ID validation such as a smartphone or watch, a hardware token, a landline phone, etc. You may register several validation devices. For details about ProSight Duo two-factor identity validation services, visit Cisco Duo MFA two-factor authentication (2FA) services for teleworkers.
Security Audits can assess the vulnerability of your network to all types of outside and internal security threats for a network that incorporates telecommuters. Progent can run remote, automated security analysis software for rapidly and economically detecting a wide variety of security holes that can be found via the Internet. Progent's endpoint security assessment experts, which can be managed by network security experts with top credentials including CISM, CISSP, and GIAC, can help your business to audit your workflows and policies and assess your IT architecture to enable you to design top-level security for your telecommuters.
Horizon3.ai's NodeZero PEN Testing Platform is a cutting-edge penetration test (pentest) product family that supports autonomous threat assessment of your at-home environment and your internal and perimeter networks so you can find, prioritize, remediate, and confirm security weaknesses before malicious hackers can exploit them. Progent can help you to use NodeZero to perform comprehensive pentests of your perimeter and your internal IT infrastructure so you can determine your present security posture. Progent's NodeZero experts can also assist you to harden your network security and can help you to plan and deploy a unified cybersecurity ecosystem that streamlines management and provides optimum protection for on-prem, multi-cloud, remote, and perimeter IT resources. To find out additional details about Progent's vulnerability analysis services powered by on NodeZero's penetration test platform, see Consulting Services for NodeZero's PEN Test Products.
Download White Paper: Protecting a Work-From-Home (WFH) Network
To read or download a white paper about critical things to concentrate on for protecting an IT environment that includes telecommuters, click:
Securing a Work-From-Home Environment White Paper. (PDF - 2.4 MB)
Contact Progent for Telecommuter Expertise
To get in touch with Progent about creating and maintaining an efficient work-from-home environment, phone
Ransomware 24x7 Hot Line: Call 800-462-8800
Progent's Ransomware 24x7 Hot Line is designed to assist you to take the crucial first phase in mitigating a ransomware attack by containing the malware. Progent's remote ransomware engineer can assist you to identify and isolate breached devices and protect clean resources from being penetrated. If your network has been breached by any strain of ransomware, act fast. Get immediate help by calling Progent's Ransomware Hot Line at 800-462-8800. For details, see Progent's Ransomware 24x7 Hot Line.