Enlarging your telecommuter workforce may have a significant impact on network architecture, security/compliance, and corporate culture. Progent has two decades of experience assisting SMBs to plan, configure, administer, tune, and debug IT environments that incorporate a remote workforce. Progent can assist your Sydney organization to select the appropriate tools and adhere to leading practices in creating and operating a secure virtual ecosystem for telecommuters that promotes collaboration and returns maximum value. Progent can provide services ranging from as-needed guidance for getting you past challenging technical bottlenecks to full project management to help you carry out mission-critical initiatives.
Progent's consultants can help Sydney, New South Wales businesses to succeed with any aspect of building a high-performing work-from-home environment by delivering network infrastructure configuration services, VoIP PBX expertise, voice/video conferencing support, collaboration platform customization and training, cloud connectivity, Call Desk services, security monitoring, backup/restore solutions, and streamlined management.
Security and Compliance for Telecommuters
Work-from-Home (WFH) employees typically utilize their personal computing devices and often operate in an unsecured physical space. This situation multiplies their vulnerability to cyber attacks and calls for judicious deployment of corporate firewalls, anti-malware tools, multi-factor authentication, remote monitoring, thorough user education, and the development of security policies built on leading practices. Progent's seasoned roster of IT security solutions consultants can assist you to plan, configure and maintain an effective security solution that guards critical information resources in networks that include at-home workers.
Firewalls allow you to create a network environment that can be securely accessed by on-premises users and by teleworkers, mobile users, vendors, customers, and other stakeholders. Next-generation firewall appliances permit you to configure and manage appropriate access rights to various classes of users and to scale your IT network and modify your cybersecurity posture as your company evolves and as cyber threats grow increasingly complex. Progent supports both current and legacy firewall appliances from all leading vendors including Cisco, Palo Alto Networks, WatchGuard, Juniper, and Fortinet. For more information about Progent's firewall integration expertise, visit firewall integration and support expertise.
Online Endpoint Monitoring makes it possible to watch over the disparate computers used by an at-home workforce and either reject or spot and mitigate the latest threats such as ransomware. With ProSight Active Security Monitoring services, a lightweight agent is installed on every secured endpoint, watching all activity and using advanced machine learning from SentinelOne to detect new attacks on arrival. When a cyberattack is spotted, ProSight Active Security Monitoring immediately disconnects the targeted device from the corporate network to quarantine the malware. Since the ProSight ASM software agent is autonomous, endpoint devices stay secure even if they are offline. Progent is a SentinelOne Partner, dealer, and integrator. For details about ProSight ASM, see remote endpoint monitoring for teleworkers.
Progent's Duo authentication service plans incorporate Cisco's Duo cloud technology to protect against compromised passwords through the use of two-factor authentication (2FA). Duo supports single-tap identity confirmation with iOS, Google Android, and other out-of-band devices. Using 2FA, whenever you log into a secured application and give your password you are requested to confirm your identity via a unit that only you have and that is accessed using a different ("out-of-band") network channel. A broad range of out-of-band devices can be utilized as this added means of authentication such as an iPhone or Android or wearable, a hardware token, a landline phone, etc. You can register multiple verification devices. To find out more about Duo identity validation services, visit Duo MFA two-factor authentication services for at-home workers.
Security Audits can evaluate the vulnerability of your network to all classes of external and internal security attacks for a network that incorporates teleworkers. Progent can run remote, automated cybersecurity inventory software for quickly and economically detecting a broad range of security weaknesses that can be found via the Internet. Progent's endpoint security assessment experts, which can be managed by data security experts with advanced certifications such as CISA, ISSAP, and GIAC, can assist your business to audit your workflows and governance policies and review your IT infrastructure to enable you to design the highest level of protection for your telecommuters.
Download White Paper: Protecting a Work-From-Home Environment
To view or download a white paper about critical things to concentrate on for securing a network that includes work-from-home staff, click:
Protecting a Work-From-Home Environment White Paper. (PDF - 2.4 MB)
Contact Progent for Remote Workforce Support Services
To get in touch with Progent about creating and managing an efficient telecommuter environment for your Sydney, New South Wales business, call 1-800-993-9400 or go to Contact Progent.