Enlarging your telecommuter workforce can have a significant effect on network infrastructure, security/compliance, and corporate workflows. Progent has two decades of experience assisting SMBs to plan, configure, manage, optimize, and debug IT networks that incorporate a remote workforce. Progent can assist your Webster organization to select the right technologies and follow leading practices in building and maintaining a secure virtual office ecosystem for teleworkers that promotes collaboration and delivers maximum business value. Progent can provide support services ranging from on demand guidance for helping you past occasional IT bottlenecks to full project management or co-management to help you carry out mission-critical initiatives.
Progent's consultants can assist Webster, Texas organizations to succeed with any aspect of creating a high-performing telecommuting environment by delivering infrastructure configuration services, IP voice troubleshooting, video conferencing support, collaboration platform customization and training, public cloud integration, helpdesk outsourcing, cybersecurity, data protection solutions, and streamlined management.
Security for At-Home Workers
At-home workers commonly utilize their personal computers and usually operate in an unsecured physical area. This situation multiplies their susceptibility to cyber attacks and requires judicious configuration of firewalls, AV tools, MFA-based identity verification, remote endpoint monitoring, intensive user education, and the development of security policies built on best practices. Progent's seasoned group of cybersecurity solutions experts can help your business to design, deploy and maintain an effective security solution that guards vital IT assets in environments that include an at-home workforce.
Firewalls allow you to build a network that can be safely accessed by on-premises users as well as by teleworkers, mobile users, suppliers, clients, and the public. Next-generation firewall appliances permit you to configure and manage appropriate permissions to various groups of users and to expand your IT network and adjust your security profile as your company evolves and as cyber threats become more sophisticated. Progent supports both current and legacy security appliances from all major vendors like Cisco, Palo Alto Networks, Check Point, Juniper, SonicWall and Fortinet. For more information about Progent's firewall configuration expertise, see firewall configuration and support services.
Remote Endpoint Monitoring makes it easy to track the various devices used by an at-home workforce and either block or identify and mitigate the latest threats such as ransomware. With Progent's ProSight Active Security Monitoring services, a small-footprint agent is put on each secured endpoint device, watching all activity and using advanced machine learning and full execution context from SentinelOne to identify zero-day threats on arrival. When a cyberattack is spotted, ProSight ASM immediately isolates the targeted endpoint device from the network to contain the malware. Since the ProSight Active Security Monitoring agent is self-contained, endpoint devices stay protected even if they are not connected to the Internet. Progent is a SentinelOne Partner, dealer, and integrator. To learn more about ProSight ASM, see remote endpoint security monitoring for teleworkers.
Progent's Duo MFA services incorporate Cisco's Duo technology to defend against stolen passwords by using two-factor authentication (2FA). Duo supports single-tap identity verification with iOS, Google Android, and other out-of-band devices. With Duo 2FA, when you log into a secured application and enter your password you are requested to verify your identity via a device that only you have and that is accessed using a different ("out-of-band") network channel. A wide selection of out-of-band devices can be used as this added means of authentication such as a smartphone or watch, a hardware token, a landline telephone, etc. You may designate several verification devices. For more information about ProSight Duo two-factor identity authentication services, go to Duo MFA two-factor authentication services for at-home workers.
Security Audits can assess the vulnerability of your network to all types of external and internal security threats for an environment that incorporates an at-home workforce. Progent can deploy online, automated security analysis scanning for rapidly and economically uncovering a broad range of security holes that can be surfaced via the Internet. Progent's endpoint security assessment experts, which can be provided by security experts with top credentials such as CISA, ISSAP, and GIAC, can assist your company to audit your workflows and policies and assess your IT architecture to enable you to design the highest level of protection for your teleworkers.
Download White Paper: Protecting a Work-From-Home (WFH) Environment
To read or download a white paper describing key areas to focus on for securing a network that supports telecommuters, click:
Protecting a Work-From-Home (WFH) Network White Paper. (PDF - 2.4 MB)
Contact Progent for Remote Workforce Expertise
To contact Progent about creating and maintaining an efficient telecommuter solution for your Webster, Texas company, call 1-800-993-9400 or refer to Contact Progent.