Expanding your remote workforce may have a major impact on IT architecture, security/compliance, and company culture. Progent has two decades of experience helping small and mid-size businesses to plan, deploy, administer, tune, and troubleshoot IT environments that incorporate at-home workers. Progent can assist your Detroit company to pick the appropriate tools and adhere to best practices in building and operating a secure virtual office ecosystem for teleworkers that promotes teamwork and delivers maximum business value. Progent can provide services ranging from as-needed expertise for helping you past challenging technical bottlenecks to full project management to help you successfully complete business-critical tasks.

Progent's consultants can help Detroit, Michigan organizations to with any aspect of building a high-performing telecommuting environment by providing infrastructure design and configuration services, VoIP PBX expertise, voice/video conferencing support, collaboration platform customization and training, cloud connectivity, helpdesk services, cybersecurity, backup/restore solutions, and streamlined management.

Security and Compliance for Remote Workers
Work-from-Home (WFH) workers typically use their own computing devices and usually work in a poorly secured physical area. This situation increases their vulnerability to cyber attacks and calls for careful deployment of firewalls, AV tools, multi-factor authentication, remote monitoring, intensive user training, and the creation of security policies based on best practices. Progent's seasoned group of cybersecurity solutions experts can help your business to design, implement and manage a compliant security solution that guards critical information assets in environments that include remote workers.

Firewall Integration Services for At-Home WorkersFirewalls enable you to build a network that can be safely accessed by local users as well as by an at-home workforce, mobile users, suppliers, customers, and the public. Next-generation firewall devices allow you to assign and manage different access rights to various classes of users and to expand your IT network and adjust your cybersecurity posture as your company evolves and as network attacks grow increasingly sophisticated. Progent works with both new and legacy security devices from all leading vendors including Cisco, Palo Alto Networks, Check Point, Juniper, SonicWall and Fortinet. To find out more about Progent's firewall support services, refer to firewall configuration and support expertise.

Remote Security Monitoring and Management for TeleworkersRemote Endpoint Security Monitoring makes it possible to watch over the disparate devices used by at-home workers and either reject or identify and respond to modern cyber attacks like ransomware. With ProSight Active Security Monitoring (ASM) services, a lightweight agent is installed on each secured endpoint, watching all activity and utilizing advanced behavioral threat analysis from SentinelOne to identify zero-day attacks on arrival. When a cyberattack is spotted, ProSight Active Security Monitoring instantly disconnects the impacted device from the network to quarantine the threat. Since the ProSight ASM software agent is autonomous, endpoint devices remain protected even if they are disconnected from the Internet. Progent is a SentinelOne Partner, reseller, and integrator. For details about ProSight ASM, visit remote endpoint security monitoring for telecommuters.

Two-factor Authentication (2FA) Services for TeleworkersProgent's Duo MFA Service Plans utilize Cisco's Duo technology to defend against stolen passwords through the use of two-factor authentication. Duo enables one-tap identity confirmation on iOS, Google Android, and other out-of-band devices. With Duo 2FA, whenever you sign into a protected online account and enter your password you are asked to verify your identity on a unit that only you have and that is accessed using a separate network channel. A broad range of devices can be used as this added form of ID validation including an iPhone or Android or watch, a hardware token, a landline phone, etc. You can designate several verification devices. To learn more about Duo two-factor identity authentication services, visit Cisco Duo MFA two-factor authentication services for at-home workers.

Security Audit Services for At-Home WorkersSecurity Audits can evaluate the vulnerability of your information system to all classes of outside and internal security threats for a network that includes at-home workers. Progent can deploy online, automated cybersecurity inventory software for quickly and affordably uncovering a broad range of security weaknesses that can be surfaced via the Internet. Progent's security audit experts, which can be provided by network security professionals with top certifications such as CISA, ISSAP, and GIAC, can help your company to evaluate your processes and governance policies and review your network architecture to allow you to design top-level protection for your telecommuters.

NodeZero Pen Testing for At-Home WorkersHorizon3.ai's NodeZero PEN Testing Platform is a cutting-edge penetration test (pentest) product family that supports automated testing of your work-from-home connectivity solution and your internal and perimeter networks so you can identify, rank, remediate, and verify security vulnerabilities before threat actors can take advantage of them. Progent's pentest experts can help you to deploy NodeZero to carry out comprehensive pentests of your network perimeter and your internal network in order to determine your current security posture. Progent's NodeZero experts can also help you to harden your network security and can help you to design and deploy a cohesive cybersecurity strategy that simplifies management and provides optimum cyber defense for on-premises, cloud-based, at-home, and perimeter IT assets. To learn more details about Progent's vulnerability analysis services based on on NodeZero's pentest products, visit Consulting Services for NodeZero's PEN Test Platform.

Download White Paper: Protecting a Work-From-Home (WFH) Network
To view or download a white paper describing key things to concentrate on for protecting a network that supports work-from-home staff, click:
Protecting a Work-From-Home (WFH) Environment White Paper. (PDF - 2.4 MB)

Contact Progent for Remote Workforce Expertise
To contact Progent about creating and managing a productive telecommuter environment for your Detroit, Michigan organization, call 1-800-993-9400 or go to Contact Progent.