Enlarging your telecommuter workforce can have a major impact on IT architecture, security/compliance, and company workflows. Progent has 20 years of experience assisting SMBs to design, deploy, administer, optimize, and troubleshoot IT networks that incorporate at-home workers. Progent can assist your San Jose organization to pick the appropriate tools and follow best practices in building and operating a secure virtual ecosystem for telecommuters that promotes collaboration and returns maximum value. Progent can provide support services that go from on demand expertise for getting you over occasional technical bottlenecks to comprehensive project management or co-management to help you carry out business-critical initiatives.

Progent's consultants can help San Jose, California organizations to succeed with any aspect of building a high-performing work-from-home ecosystem by providing network infrastructure configuration services, VoIP PBX expertise, voice/video conferencing integration, collaboration platform selection and deployment, cloud connectivity, helpdesk services, endpoint security, backup/restore solutions, and centralized management.

Cybersecurity for Telecommuters
Work-from-Home staff members commonly utilize their personal devices and often work in a poorly secured physical environment. This situation increases their susceptibility to malware attacks and calls for judicious configuration of firewalls, anti-malware tools, MFA-based identity verification, remote endpoint monitoring, extensive end-user training, and the creation of security policies based on leading practices. Progent's veteran group of IT security solutions experts can assist you to design, configure and maintain an effective security solution that protects critical IT assets in networks that include telecommuters.

Firewall Integration Services for At-Home WorkersFirewalls allow you to create a network environment that can be securely accessed by local users and by telecommuters, mobile workers, suppliers, customers, and the public. Next-generation firewall appliances permit you to configure and manage different access rights to different classes of users and to expand your network and modify your security profile as your company evolves and as network attacks become increasingly complex. Progent supports both new and legacy firewall devices from all leading manufacturers including Cisco, Palo Alto Networks, Check Point, Juniper, SonicWall and Fortinet. To find out more about Progent's firewall configuration services, go to firewall configuration and support expertise.

Remote Endpoint Monitoring and Management for TelecommutersRemote Endpoint Security Monitoring makes it possible to track the various computers utilized by an at-home workforce and either reject or identify and mitigate the latest threats such as ransomware. With Progent's ProSight Active Security Monitoring services, a small-footprint software agent is installed on each secured endpoint, watching all activity and utilizing advanced machine learning and full execution context to identify zero-day threats at inception. When a cyberattack is discovered, ProSight Active Security Monitoring instantly disconnects the infected device from the network to quarantine the malware. Because the ProSight Active Security Monitoring agent is autonomous, endpoints remain protected even when they are offline. To find out more about ProSight Active Security Monitoring, visit remote endpoint security monitoring for telecommuters.

Two-factor Authentication Services for Remote WorkersProgent's Duo MFA services utilize Cisco's Duo cloud technology to defend against stolen passwords through the use of two-factor authentication. Duo supports single-tap identity confirmation with iOS, Google Android, and other personal devices. With Duo 2FA, whenever you sign into a secured online account and enter your password you are asked to verify your identity via a unit that only you have and that uses a separate network channel. A broad range of out-of-band devices can be utilized as this second form of ID validation including an iPhone or Android or watch, a hardware/software token, a landline telephone, etc. You may designate several verification devices. For more information about ProSight Duo identity validation services, see Duo MFA two-factor authentication services for at-home workers.

Security Audit Services for At-Home WorkersSecurity Audits can assess the vulnerability of your network to all classes of outside and internal security threats for a network that includes teleworkers. Progent can deploy remote, automated security analysis scanning for rapidly and economically detecting a broad range of security gaps that can be surfaced via the Internet. Progent's security audit experts, which can be managed by network security professionals with advanced credentials including CISM, CISSP, and GIAC, can help your business to audit your processes and governance policies and review your WAN infrastructure to allow you to design the highest level of protection for your teleworkers.

Download White Paper: Protecting a Work-From-Home Network
To read or download a white paper describing key things to concentrate on for securing a network that includes telecommuters, click:
Securing a Work-From-Home Environment White Paper. (PDF - 2.4 MB)

Contact Progent for At-Home Worker Support Services
To contact Progent about creating and managing an efficient telecommuter environment for your San Jose, California business, phone 1-800-993-9400 or go to Contact Progent.