Enlarging your remote workforce may have a significant effect on network architecture, security, and corporate workflows. Progent has two decades of background assisting small and mid-size businesses to plan, deploy, manage, tune, and debug IT environments that incorporate at-home workers. Progent can assist your Houston organization to select the appropriate technologies and follow best practices in creating and maintaining a secure virtual office ecosystem for telecommuters that promotes collaboration and delivers maximum value. Progent can provide services ranging from as-needed expertise for getting you over occasional technical bottlenecks to comprehensive project management or co-management to help you successfully complete business-critical initiatives.

Progent's consultants can help Houston, Texas businesses to succeed with any aspect of building a high-functioning remote work environment by providing infrastructure design and configuration services, VoIP PBX expertise, voice/video conferencing support, collaboration platform selection and deployment, public cloud connectivity, Call Desk augmentation, security monitoring, data protection solutions, and streamlined management.

Cybersecurity for Remote Workers
Work-from-Home staff members typically use their personal computers and usually work in a poorly secured physical area. This multiplies their susceptibility to cyber threats and requires careful configuration of corporate firewalls, anti-malware tools, multi-factor authentication, remote endpoint monitoring, thorough user education, and the development of policies based on leading practices. Progent's seasoned group of data security solutions experts can assist your business to plan, configure and manage a compliant cybersecurity solution that protects critical IT resources in networks that include telecommuters.

Firewall Integration Services for At-Home WorkersFirewalls enable companies to build a network environment that can be safely accessed by local users and by teleworkers, mobile users, vendors, customers, and the public. Modern firewall appliances allow you to assign and manage different permissions to different classes of users and to scale your IT network and modify your security as your business evolves and as network attacks grow more complex. Progent supports both current and older security devices from all major vendors like Cisco, Palo Alto Networks, WatchGuard, Juniper, and Fortinet. To learn more about Progent's firewall support expertise, see firewall support expertise.

Remote Endpoint Monitoring and Management for TelecommutersOnline Endpoint Monitoring makes it easy to track the disparate computers used by remote workers and either block or spot and respond to the latest threats like ransomware. With Progent's ProSight Active Security Monitoring (ASM) services, a small-footprint software agent is put on every secured endpoint, monitoring all activity and utilizing advanced machine learning from SentinelOne to identify new attacks before they can spread. When an attack is spotted, ProSight ASM immediately isolates the targeted endpoint device from the corporate network to quarantine the threat. Because the ProSight ASM agent is self-contained, endpoints remain secure even if they are not connected to the Internet. Progent is a SentinelOne Partner, dealer, and integrator. To learn more about ProSight ASM, go to remote endpoint security monitoring for an at-home workforce.

Two-factor Authentication Services for Remote WorkersProgent's Duo authentication Services incorporate Cisco's Duo cloud technology to protect against password theft through the use of two-factor authentication. Duo supports one-tap identity confirmation with Apple iOS, Android, and other out-of-band devices. With Duo 2FA, when you log into a secured application and give your password you are requested to confirm who you are on a unit that only you have and that is accessed using a different ("out-of-band") network channel. A wide range of devices can be utilized for this added means of authentication such as an iPhone or Android or watch, a hardware/software token, a landline telephone, etc. You may designate several verification devices. To learn more about Duo two-factor identity authentication services, visit Cisco Duo MFA two-factor authentication (2FA) services for at-home workers.

Security Audit Services for At-Home WorkersSecurity Audits can evaluate the vulnerability of your network to all types of external and internal security threats for an environment that includes teleworkers. Progent can run remote, automated security inventory software for rapidly and economically detecting a wide variety of security holes that can be surfaced via the Internet. Progent's security assessment consulting services, which can be provided by network security professionals with advanced credentials such as CISM, ISSAP, and GIAC, can help your company to audit your procedures and policies and review your WAN architecture to enable you to implement the highest level of protection for your telecommuters.

NodeZero Pentetration Testing for Work-from-Home EnpointsHorizon3.ai's NodeZero Pentest Platform is a cutting-edge penetration test (pentest) product family that supports autonomous threat assessment of your work-from-home environment and your internal and perimeter networks so you can expose, rank, fix, and verify cybersecurity vulnerabilities before malicious hackers can exploit them. Progent's pentest experts can assist you to deploy NodeZero to carry out comprehensive pentests of your perimeter and your internal network in order to evaluate your present security posture. Progent's NodeZero experts can also help you to harden your existing network security and can assist you to plan and implement a cohesive cybersecurity strategy that simplifies management and provides maximum cyber defense for on-premises, cloud-based, at-home, and perimeter IT assets. To learn additional details about Progent's threat analysis services based on on NodeZero's penetration test products, see Consulting Services for NodeZero's Pentest Platform.

Download White Paper: Securing a Work-From-Home Environment
To view or download a white paper about critical areas to concentrate on for protecting an IT environment that supports work-from-home staff, click:
Protecting a Work-From-Home (WFH) Network White Paper. (PDF - 2.4 MB)

Contact Progent for At-Home Worker Expertise
To get in touch with Progent about building and maintaining an efficient telecommuter environment for your Houston, Texas business, phone 1-800-993-9400 or go to Contact Progent.