Enlarging your at-home workforce may have a significant impact on IT infrastructure, security/compliance, and corporate processes. Progent has 20 years of experience assisting small and mid-size businesses to plan, configure, administer, optimize, and troubleshoot IT environments that support at-home workers. Progent can help your Anchorage company to pick the right technologies and adhere to leading practices in creating and maintaining a safe virtual office ecosystem for teleworkers that facilitates teamwork and returns maximum value. Progent offers support services ranging from as-needed expertise for helping you past occasional IT roadblocks to comprehensive project management or co-management to help you carry out business-critical initiatives.
Progent's consultants can help Anchorage, Alaska companies to succeed with any aspect of building a high-performing work-from-home environment by providing network infrastructure configuration services, VoIP PBX troubleshooting, voice/video conferencing integration, collaboration platform customization and training, public cloud integration, Call Desk outsourcing, security monitoring, backup/restore solutions, and centralized management.
Security for Teleworkers
Work-from-Home (WFH) workers commonly utilize their own devices and often work in an unsecured physical space. This multiplies their vulnerability to cyber attacks and calls for judicious deployment of firewalls, AV tools, multi-factor authentication, remote monitoring, extensive user training, and the development of security policies based on best practices. Progent's veteran roster of data security solutions consultants can help you to design, implement and manage an effective cybersecurity solution that protects critical IT assets in environments that incorporate telecommuters.
Firewalls allow you to create a network environment that can be safely utilized by local users as well as by at-home workers, mobile workers, suppliers, customers, and the public. Next-generation firewall devices permit you to configure and control different access rights to different classes of users and to scale your network and modify your cybersecurity posture as your business evolves and as cyber threats grow increasingly complex. Progent supports both current and legacy firewall devices from all major vendors like Cisco, Palo Alto Networks, WatchGuard, Juniper, and Fortinet. For details about Progent's firewall integration services, go to firewall configuration and support expertise.
Remote Endpoint Security Monitoring makes it possible to track the disparate devices used by teleworkers and either block or spot and mitigate the latest cyber attacks like ransomware. With Progent's ProSight Active Security Monitoring services, a lightweight agent is installed on every protected endpoint device, watching all activity and utilizing advanced machine learning and full execution context from SentinelOne to detect new threats on arrival. When an attack is spotted, ProSight ASM instantly isolates the infected device from the network to contain the malware. Because the ProSight ASM agent is self-contained, endpoint devices remain protected even when they are offline. For details about ProSight Active Security Monitoring, refer to remote endpoint security monitoring for remote workers.
Progent's Duo MFA service plans utilize Cisco's Duo cloud technology to defend against compromised passwords by using two-factor authentication. Duo supports one-tap identity verification on Apple iOS, Google Android, and other out-of-band devices. Using 2FA, whenever you sign into a protected application and enter your password you are requested to verify who you are on a device that only you possess and that is accessed using a different network channel. A wide selection of devices can be utilized for this second form of authentication such as an iPhone or Android or watch, a hardware token, a landline phone, etc. You can register multiple validation devices. For details about Duo two-factor identity authentication services, go to Cisco Duo MFA two-factor authentication services for at-home workers.
Security Audits can evaluate the vulnerability of your information system to all types of outside and local security attacks for a network that includes telecommuters. Progent can deploy online, automated cybersecurity inventory software for rapidly and economically uncovering a wide variety of security gaps that can be found via the Internet. Progent's endpoint security assessment experts, which can be managed by data security experts with top credentials including CISM, CISSP, and GIAC, can help your business to evaluate your processes and governance policies and review your IT infrastructure to allow you to implement the highest level of security for your teleworkers.
Download White Paper: Securing a Work-From-Home (WFH) Environment
To read or download a white paper describing critical areas to concentrate on for protecting a network that supports work-from-home staff, click:
Securing a Work-From-Home Environment White Paper. (PDF - 2.4 MB)
Contact Progent for Telecommuter Expertise
To contact Progent about creating and managing a productive telecommuter solution for your Anchorage, Alaska company, phone 1-800-993-9400 or go to Contact Progent.