Expanding your home-based pool of workers can have a major effect on IT infrastructure, cybersecurity, and corporate culture. Progent has 20 years of experience assisting small and mid-size businesses to design, implement, tune, administer, and debug network environments that support remote workers. Progent can assist your business to select the right technologies and follow best practices in building and supporting a secure virtualized environment that promotes collaboration and delivers maximum business value.
Progent can provide remote services ranging from on-demand support for guiding you past sporadic technical roadblocks to full project management or co-management for implementing business-critical initiatives.
Security and Compliance for Telecommuters
Work-from-Home staff members typically utilize their own devices and usually work in a poorly secured physical space. This increases their susceptibility to cyber threats and calls for judicious deployment of corporate firewalls, AV tools, MFA-based identity verification, remote monitoring, thorough user education, and the development of policies based on best practices. Progent's seasoned group of IT security solutions experts can assist your business to plan, configure and manage a compliant security solution that protects vital information resources in networks that include an at-home workforce.
Firewalls allow you to build a network that can be safely utilized by local users as well as by teleworkers, mobile workers, vendors, customers, and the public. Modern firewall devices allow you to assign and control appropriate access rights to different groups of users and to scale your IT network and adjust your security as your company evolves and as cyber threats become increasingly sophisticated. Progent supports both current and legacy security appliances from all leading manufacturers like Cisco, Palo Alto Networks, WatchGuard, Juniper, SonicWall and Fortinet. To find out more about Progent's firewall configuration expertise, go to firewall support expertise.
Remote Endpoint Security Monitoring makes it possible to track the various devices used by telecommuters and either block or spot and respond to modern cyber attacks like ransomware. With Progent's ProSight Active Security Monitoring (ASM) services, a lightweight agent is put on each protected endpoint, watching all activity and utilizing state-of-the-art machine learning and full execution context from SentinelOne to identify zero-day attacks on arrival. When an attack is spotted, ProSight ASM immediately disconnects the impacted device from the corporate network to quarantine the malware. Since the ProSight Active Security Monitoring agent is self-contained, endpoints remain secure even if they are disconnected from the Internet. To find out more about ProSight Active Security Monitoring, refer to remote endpoint monitoring for at-home workers.
Progent's Duo authentication service plans utilize Cisco's Duo cloud technology to defend against password theft through the use of two-factor authentication (2FA). Duo supports single-tap identity verification with iOS, Google Android, and other out-of-band devices. Using 2FA, when you log into a protected application and give your password you are asked to confirm who you are on a device that only you have and that uses a different network channel. A broad range of devices can be used as this added means of ID validation including a smartphone or watch, a hardware token, a landline phone, etc. You may designate several validation devices. To find out more about ProSight Duo two-factor identity authentication services, go to Cisco Duo MFA two-factor authentication (2FA) services for an at-home workforce.
Security Audits can assess the exposure of your network to all classes of outside and internal security threats for an environment that includes at-home workers. Progent can run online, automated cybersecurity inventory software for quickly and economically detecting a wide variety of security gaps that can be found via the Internet. Progent's endpoint security assessment consulting services, which can be managed by network security experts with advanced credentials such as CISM, ISSAP, and GIAC, can help you to audit your operations and governance policies and assess your network architecture to enable you to implement the highest level of protection for your teleworkers.
Download White Paper: Securing a Work-From-Home Environment
To read or download a white paper describing key areas to concentrate on for securing an IT environment that supports telecommuters, click:
Securing a Work-From-Home Network White Paper. (PDF - 2.4 MB)
Contact Progent for Telecommuter Support Services
To contact Progent about creating and maintaining a productive work-from-home environment, call