Expanding your at-home workforce may have a significant effect on IT architecture, security/compliance, and company culture. Progent has 20 years of experience helping small and mid-size businesses to plan, configure, manage, tune, and debug IT environments that support a remote workforce. Progent can help your Tucson organization to pick the right tools and adhere to best practices in creating and maintaining a secure virtual office solution for telecommuters that facilitates collaboration and delivers maximum value. Progent offers services that go from as-needed guidance for helping you over occasional IT roadblocks to full project management to help you successfully complete business-critical tasks.
Progent's consultants can assist Tucson, Arizona organizations to succeed with any aspect of creating a high-functioning work-at-home ecosystem by delivering infrastructure configuration services, IP voice troubleshooting, video conferencing support, collaboration platform selection and deployment, cloud integration, helpdesk services, security monitoring, data protection solutions, and streamlined management.
Security and Compliance for Teleworkers
Work-from-Home workers typically use their own devices and often work in a poorly secured physical space. This situation increases their vulnerability to malware threats and requires judicious deployment of firewalls, AV tools, MFA-based identity verification, remote endpoint monitoring, thorough user training, and the creation of security policies built on best practices. Progent's seasoned roster of IT security solutions experts can assist your business to plan, implement and manage an effective security solution that protects vital IT resources in networks that include telecommuters.
Firewalls enable you to create a network that can be safely utilized by local users and by telecommuters, mobile users, suppliers, clients, and other stakeholders. Next-generation firewall devices allow you to configure and manage appropriate permissions to different groups of users and to scale your network and adjust your cybersecurity posture as your company evolves and as network attacks grow more sophisticated. Progent supports both new and legacy security devices from all major manufacturers like Cisco, Palo Alto Networks, Check Point, Juniper, and Fortinet. To find out more about Progent's firewall integration services, refer to firewall integration and support services.
Online Endpoint Security Monitoring makes it easy to track the various computers used by at-home workers and either block or spot and mitigate the latest threats like ransomware. With Progent's ProSight Active Security Monitoring (ASM) services, a small-footprint agent is put on every secured endpoint device, watching all activity and using advanced behavioral threat analysis from SentinelOne to identify zero-day threats before they can spread. When a cyberattack is discovered, ProSight Active Security Monitoring instantly disconnects the impacted device from the corporate network to quarantine the threat. Since the ProSight ASM agent is autonomous, endpoint devices stay secure even if they are not connected to the Internet. Progent is a SentinelOne Partner, dealer, and integrator. For details about ProSight Active Security Monitoring, refer to remote endpoint security monitoring for teleworkers.
Progent's Duo MFA Services utilize Cisco's Duo technology to protect against password theft through the use of two-factor authentication (2FA). Duo supports single-tap identity verification on Apple iOS, Google Android, and other out-of-band devices. Using 2FA, whenever you log into a protected online account and give your password you are requested to confirm who you are on a unit that only you have and that is accessed using a different ("out-of-band") network channel. A broad range of devices can be used for this second form of ID validation including an iPhone or Android or wearable, a hardware/software token, a landline telephone, etc. You can designate several verification devices. For details about Duo two-factor identity validation services, refer to Duo MFA two-factor authentication (2FA) services for an at-home workforce.
Security Audits can assess the exposure of your network to all types of outside and local security attacks for a network that incorporates remote workers. Progent can run online, automated cybersecurity inventory software for rapidly and affordably uncovering a broad range of security weaknesses that can be found over the Internet. Progent's endpoint security assessment experts, which can be managed by network security experts with top credentials such as CISA, ISSAP, and GIAC, can assist you to audit your procedures and policies and assess your IT architecture to allow you to design top-level security for your at-home workers.
Horizon3.ai's NodeZero PEN Testing Platform is a leading-edge penetration test (pentest) product family that can deliver autonomous threat assessment of your work-from-home environment as well as your internal and perimeter networks to help you expose, prioritize, fix, and verify cybersecurity weaknesses before threat actors can exploit them. Progent can assist you to use NodeZero to carry out thorough penetration tests of your network perimeter and your internal IT infrastructure so you can evaluate your present security posture. Progent can also assist you to harden your network security and can help you to design and implement a cohesive cybersecurity strategy that simplifies management and delivers optimum cyber defense for on-premises, cloud-based, at-home, and perimeter IT resources. To find out more details about Progent's threat analysis services powered by on NodeZero's PEN test products, refer to Consulting Support for NodeZero's Penetration Test Platform.
Download White Paper: Protecting a Work-From-Home (WFH) Network
To read or download a white paper describing key areas to focus on for securing a network that incorporates work-from-home staff, click:
Securing a Work-From-Home Environment White Paper. (PDF - 2.4 MB)
Contact Progent for At-Home Worker Expertise
To contact Progent about building and managing a productive work-from-home environment for your Tucson, Arizona company, phone