Enlarging your telecommuter workforce can have a significant effect on IT infrastructure, security, and corporate processes. Progent has two decades of experience helping SMBs to design, configure, administer, tune, and troubleshoot IT networks that incorporate work-from-home employees. Progent can help your Ribeirão Preto company to pick the right technologies and follow leading practices in creating and operating a secure virtual solution for teleworkers that promotes teamwork and returns maximum business value. Progent can provide services ranging from as-needed expertise for helping you over occasional technical roadblocks to comprehensive project management or co-management to help you carry out business-critical tasks.
Progent can help Ribeirão Preto, São Paulo companies to with any facet of creating a high-functioning work-at-home ecosystem by providing infrastructure design and configuration services, IP voice troubleshooting, voice/video conferencing integration, collaboration platform customization and training, public cloud integration, helpdesk augmentation, cybersecurity, data protection solutions, and streamlined management.
Security for At-Home Workers
At-home employees typically utilize their own computers and often work in an unsecured physical environment. This multiplies their susceptibility to cyber threats and calls for careful configuration of firewalls, AV tools, MFA-based identity verification, remote monitoring, thorough end-user training, and the creation of security policies built on best practices. Progent's seasoned team of IT security solutions consultants can help you to plan, deploy and maintain an effective cybersecurity solution that protects critical information assets in networks that include an at-home workforce.
Firewalls enable you to create a network environment that can be securely utilized by on-premises users as well as by an at-home workforce, mobile employees, vendors, customers, and the public. Modern firewall devices permit you to configure and control different access rights to various groups of users and to expand your IT network and modify your security profile as your company evolves and as network attacks become increasingly complex. Progent supports both new and older firewall devices from all leading vendors like Cisco, Palo Alto Networks, Check Point, Juniper, SonicWall and Fortinet. To learn more about Progent's firewall configuration services, refer to firewall integration and support expertise.
Online Endpoint Security Monitoring makes it easy to watch over the disparate devices used by at-home workers and either reject or spot and respond to modern threats such as ransomware. With ProSight Active Security Monitoring services, a small-footprint software agent is installed on each protected endpoint device, monitoring all activity and using state-of-the-art machine learning and full execution context from SentinelOne to detect zero-day attacks on arrival. When a cyberattack is discovered, ProSight ASM instantly isolates the impacted endpoint device from the corporate network to contain the malware. Since the ProSight ASM agent is autonomous, endpoints stay secure even when they are disconnected from the Internet. For details about ProSight ASM, see remote endpoint monitoring for an at-home workforce.
Progent's Duo authentication service plans utilize Cisco's Duo technology to protect against password theft by using two-factor authentication. Duo enables one-tap identity verification on Apple iOS, Google Android, and other personal devices. With Duo 2FA, whenever you log into a secured online account and enter your password you are asked to verify your identity via a device that only you possess and that is accessed using a separate network channel. A wide range of out-of-band devices can be utilized as this second means of ID validation including a smartphone or watch, a hardware token, a landline phone, etc. You can designate several verification devices. To find out more about Duo two-factor identity authentication services, see Cisco Duo MFA two-factor authentication (2FA) services for teleworkers.
Security Audits can assess the vulnerability of your network to all classes of external and internal security attacks for an environment that incorporates at-home workers. Progent can deploy online, automated security inventory software for quickly and economically uncovering a broad range of security weaknesses that can be found via the Internet. Progent's endpoint security audit consulting services, which can be managed by network security experts with advanced credentials including CISM, ISSAP, and GIAC, can help you to evaluate your workflows and governance policies and review your IT infrastructure to enable you to implement top-level protection for your remote workers.
Download White Paper: Protecting a Work-From-Home (WFH) Environment
To read or download a white paper about critical areas to concentrate on for securing an IT environment that includes work-from-home staff, click:
Protecting a Work-From-Home (WFH) Environment White Paper. (PDF - 2.4 MB)
Contact Progent for Telecommuter Expertise
To get in touch with Progent about building and maintaining a productive telecommuter environment for your Ribeirão Preto, São Paulo business, phone 1-800-993-9400 or refer to Contact Progent.