Adding to your home-based workforce can have a significant effect on network infrastructure, cybersecurity, and business culture. Progent has 20 years of background helping small and medium-size organizations to design, implement, optimize, administer, and troubleshoot networks that support a remote workforce. offsite workers. Progent can help your business to select the appropriate tools and adhere to best practices in building and maintaining a safe virtualized ecosystem that promotes collaboration and delivers top business value.
Progent can provide online IT services ranging from as-needed support for helping you past occasional technical roadblocks to comprehensive project management for successfully completing business-critical initiatives.
Security for Telecommuters
Work-from-Home employees commonly utilize their personal computing devices and usually operate in an unsecured physical space. This multiplies their susceptibility to cyber threats and calls for judicious configuration of firewalls, AV tools, multi-factor authentication, remote endpoint monitoring, extensive end-user training, and the creation of policies based on leading practices. Progent's veteran team of cybersecurity support consultants can assist you to plan, implement and manage an effective security solution that protects vital IT resources in networks that include remote workers.
Firewalls allow companies to build a network environment that can be safely utilized by on-premises users as well as by at-home workers, mobile users, vendors, clients, and the public. Next-generation firewall appliances permit you to assign and control different permissions to different classes of users and to expand your IT network and adjust your cybersecurity posture as your business evolves and as network attacks become increasingly complex. Progent works with both current and legacy firewall appliances from all major vendors like Cisco, Palo Alto Networks, WatchGuard, Juniper, SonicWall and Fortinet. For more information about Progent's firewall configuration expertise, refer to firewall integration and support services.
Remote Endpoint Security Monitoring makes it easy to watch over the various devices utilized by an at-home workforce and either reject or identify and respond to modern threats such as ransomware. With Progent's ProSight Active Security Monitoring (ASM) services, a lightweight agent is put on every protected endpoint device, watching all activity and utilizing advanced AI technology from SentinelOne to identify new threats on arrival. When an attack is spotted, ProSight ASM immediately disconnects the targeted endpoint device from the corporate network to contain the threat. Because the ProSight ASM software agent is self-contained, endpoints remain protected even if they are disconnected from the Internet. Progent is a SentinelOne Partner, dealer, and integrator. To learn more about ProSight ASM, visit remote endpoint security monitoring for teleworkers.
Progent's Duo authentication service plans incorporate Cisco's Duo technology to defend against compromised passwords by using two-factor authentication (2FA). Duo enables single-tap identity confirmation on Apple iOS, Android, and other personal devices. Using Duo 2FA, whenever you sign into a protected application and give your password you are asked to verify who you are on a device that only you possess and that uses a different ("out-of-band") network channel. A broad range of out-of-band devices can be utilized as this second form of authentication including a smartphone or watch, a hardware/software token, a landline telephone, etc. You may designate several verification devices. For more information about ProSight Duo two-factor identity authentication services, go to Cisco Duo MFA two-factor authentication services for at-home workers.
Security Audits can evaluate the exposure of your information system to all types of external and internal security attacks for a network that includes an at-home workforce. Progent can deploy remote, automated security inventory software for quickly and economically detecting a wide variety of security gaps that can be found over the Internet. Progent's endpoint security assessment consulting services, which can be managed by data security experts with advanced credentials including CISA, CISSP, and GIAC, can help your business to evaluate your operations and governance policies and assess your WAN infrastructure to enable you to implement top-level protection for your telecommuters.
Download White Paper: Protecting a Work-From-Home Network
To view or download a white paper describing critical things to concentrate on for securing an IT environment that incorporates work-from-home staff, click:
Protecting a Work-From-Home Network White Paper. (PDF - 2.4 MB)
Contact Progent for Telecommuter Support Services
To get in touch with Progent about building and managing a productive telecommuter environment, phone
Ransomware 24x7 Hot Line: Call 800-462-8800
Progent's Ransomware 24x7 Hot Line is intended to assist you to take the time-critical first phase in responding to a ransomware attack by containing the malware. Progent's online ransomware engineer can assist businesses to locate and isolate infected devices and guard undamaged resources from being penetrated. If your network has been breached by any version of ransomware, don't panic. Get help quickly by calling Progent's Ransomware Hot Line at 800-462-8800. For more information, see Progent's Ransomware 24x7 Hot Line.