Expanding your remote workforce may have a major effect on network infrastructure, cybersecurity, and corporate culture. Progent has two decades of experience helping small and mid-size businesses to design, configure, administer, optimize, and debug IT networks that incorporate work-from-home employees. Progent can assist your Raleigh organization to pick the appropriate technologies and adhere to leading practices in building and maintaining a secure virtual solution for telecommuters that promotes collaboration and returns maximum value. Progent offers support services that go from on demand expertise for getting you past occasional technical bottlenecks to full project management or co-management to help you successfully complete business-critical initiatives.
Progent can assist Raleigh, North Caroline organizations to succeed with any aspect of building a high-performing work-from-home environment by providing network infrastructure design and configuration services, IP voice troubleshooting, voice/video conferencing support, collaboration platform selection and deployment, cloud connectivity, Help Desk services, endpoint security, backup/restore solutions, and streamlined management.
Cybersecurity for Telecommuters
At-home employees typically use their own devices and often work in an unsecured physical environment. This increases their vulnerability to cyber threats and requires careful configuration of corporate firewalls, anti-malware tools, MFA-based identity verification, remote monitoring, extensive user training, and the creation of security policies built on leading practices. Progent's veteran group of IT security solutions experts can help you to plan, configure and maintain a compliant cybersecurity solution that guards critical IT resources in networks that include telecommuters.
Firewalls enable companies to build a network that can be safely utilized by local users as well as by telecommuters, mobile employees, vendors, customers, and the public. Modern firewall devices allow you to configure and manage different permissions to different classes of users and to scale your IT network and adjust your security as your company evolves and as cyber threats become more sophisticated. Progent works with both new and older security devices from all major manufacturers including Cisco, Palo Alto Networks, Check Point, Juniper, and Fortinet. To learn more about Progent's firewall integration expertise, refer to firewall support services.
Online Endpoint Security Monitoring makes it possible to watch over the various computers utilized by telecommuters and either reject or spot and mitigate modern threats like ransomware. With ProSight Active Security Monitoring services, a lightweight software agent is put on every secured endpoint device, watching all activity and using state-of-the-art machine learning and full execution context from SentinelOne to identify new attacks on arrival. When an attack is discovered, ProSight ASM instantly isolates the infected device from the network to contain the malware. Since the ProSight Active Security Monitoring software agent is autonomous, endpoints stay protected even if they are offline. To find out more about ProSight ASM, visit remote endpoint monitoring for telecommuters.
Progent's Duo MFA managed services utilize Cisco's Duo cloud technology to protect against stolen passwords by using two-factor authentication. Duo enables one-tap identity confirmation with iOS, Google Android, and other personal devices. With Duo 2FA, whenever you sign into a secured online account and enter your password you are asked to confirm who you are on a device that only you have and that uses a different network channel. A wide selection of out-of-band devices can be used as this second means of ID validation such as an iPhone or Android or watch, a hardware/software token, a landline telephone, etc. You can register multiple verification devices. For details about ProSight Duo identity validation services, refer to Duo MFA two-factor authentication services for telecommuters.
Security Audits can evaluate the exposure of your information system to all classes of outside and local security attacks for an environment that includes at-home workers. Progent can deploy remote, automated cybersecurity inventory software for rapidly and economically detecting a broad range of security holes that can be found over the Internet. Progent's security audit experts, which can be managed by data security professionals with top credentials including CISM, CISSP, and GIAC, can help you to evaluate your procedures and policies and assess your IT architecture to enable you to design top-level protection for your at-home workers.
Download White Paper: Protecting a Work-From-Home (WFH) Network
To read or download a white paper describing key areas to concentrate on for securing an IT environment that incorporates telecommuters, click:
Protecting a Work-From-Home Network White Paper. (PDF - 2.4 MB)
Contact Progent for Telecommuter Expertise
To get in touch with Progent about building and maintaining a productive work-from-home solution for your Raleigh, North Caroline organization, call 1-800-993-9400 or refer to Contact Progent.