Enlarging your telecommuter workforce may have a major impact on network architecture, cybersecurity, and company culture. Progent has two decades of background assisting small and mid-size businesses to design, configure, manage, tune, and troubleshoot IT environments that incorporate at-home workers. Progent can help your Augusta-Richmond County company to pick the right technologies and follow best practices in building and operating a safe virtual ecosystem for teleworkers that promotes teamwork and delivers maximum business value. Progent can provide support services ranging from as-needed expertise for getting you over occasional IT bottlenecks to comprehensive project management or co-management to help you successfully complete business-critical initiatives.

Progent can assist Augusta-Richmond County, Georgia companies to succeed with any aspect of creating a high-functioning telecommuting ecosystem by providing network infrastructure configuration services, VoIP PBX troubleshooting, voice/video conferencing support, collaboration platform selection and deployment, cloud integration, Call Desk services, endpoint security, data protection solutions, and streamlined management.

Cybersecurity for Telecommuters
Work-from-Home workers typically utilize their personal devices and usually work in a poorly secured physical area. This multiplies their vulnerability to cyber attacks and requires careful deployment of corporate firewalls, anti-malware tools, MFA-based identity verification, remote monitoring, intensive end-user education, and the creation of security policies based on leading practices. Progent's seasoned roster of IT security support experts can assist you to plan, configure and manage an effective cybersecurity solution that guards critical information assets in networks that include remote workers.

Firewall Integration Services for At-Home WorkersFirewalls enable companies to create a network environment that can be securely accessed by on-premises users and by teleworkers, mobile employees, suppliers, clients, and the public. Modern firewall devices permit you to assign and control different permissions to different classes of users and to expand your IT network and adjust your security profile as your business evolves and as network attacks become more sophisticated. Progent works with both current and older firewall appliances from all leading manufacturers including Cisco, Palo Alto Networks, Check Point, Juniper, and Fortinet. To learn more about Progent's firewall configuration services, see firewall support services.

Remote Security Monitoring and Management for TelecommutersOnline Endpoint Monitoring makes it easy to watch over the disparate computers utilized by telecommuters and either block or identify and mitigate modern threats like ransomware. With ProSight Active Security Monitoring (ASM) services, a small-footprint software agent is put on every protected endpoint device, monitoring all activity and utilizing advanced machine learning from SentinelOne to detect new attacks before they can spread. When a cyberattack is spotted, ProSight Active Security Monitoring immediately disconnects the infected endpoint device from the network to quarantine the threat. Since the ProSight Active Security Monitoring software agent is autonomous, endpoints stay protected even if they are not connected to the Internet. Progent is a SentinelOne Partner, reseller, and integrator. For more information about ProSight Active Security Monitoring, go to remote endpoint security monitoring for at-home workers.

Two-factor Authentication (2FA) Services for TeleworkersProgent's Duo authentication Managed Services incorporate Cisco's Duo cloud technology to defend against password theft through the use of two-factor authentication. Duo enables single-tap identity verification on iOS, Android, and other out-of-band devices. Using Duo 2FA, whenever you sign into a protected application and enter your password you are asked to verify your identity via a unit that only you possess and that is accessed using a different network channel. A wide selection of out-of-band devices can be used as this added means of ID validation such as a smartphone or watch, a hardware token, a landline telephone, etc. You can designate multiple validation devices. For more information about Duo two-factor identity validation services, visit Duo MFA two-factor authentication (2FA) services for teleworkers.

Security Audit Services for At-Home WorkersSecurity Audits can assess the exposure of your information system to all types of outside and internal security attacks for an environment that includes telecommuters. Progent can deploy remote, automated cybersecurity analysis software for quickly and affordably uncovering a wide variety of security holes that can be surfaced via the Internet. Progent's endpoint security assessment consulting services, which can be managed by security experts with top credentials such as CISM, ISSAP, and GIAC, can assist your company to evaluate your workflows and policies and review your network architecture to allow you to design the highest level of protection for your an at-home workforce.

NodeZero Pentetration Testing for Work-from-Home EnpointsHorizon3.ai's NodeZero Penetration Testing Platform is a cutting-edge penetration test (pentest) product family that supports autonomous threat assessment of your at-home environment as well as your internal and perimeter networks to help you expose, rank, remediate, and confirm security weaknesses before threat actors can take advantage of them. Progent can assist you to deploy NodeZero to carry out comprehensive pentests of your network perimeter and your internal network in order to determine your current security profile. Progent's NodeZero experts can also assist you to harden your existing network security and can assist you to plan and implement a unified cybersecurity strategy that streamlines management and delivers optimum cyber defense for on-prem, multi-cloud, at-home, and perimeter IT assets. To learn more information about Progent's vulnerability assessment solutions based on on NodeZero's PEN test products, see Consulting Services for NodeZero's Penetration Test Products.

Download White Paper: Securing a Work-From-Home Network
To read or download a white paper describing key areas to concentrate on for protecting an IT environment that supports telecommuters, click:
Protecting a Work-From-Home (WFH) Network White Paper. (PDF - 2.4 MB)

Contact Progent for Remote Workforce Support Services
To get in touch with Progent about creating and managing a productive work-from-home solution for your Augusta-Richmond County, Georgia organization, phone 1-800-993-9400 or visit Contact Progent.