Enlarging your remote workforce may have a significant impact on network architecture, cybersecurity, and corporate workflows. Progent has 20 years of background helping small and mid-size businesses to plan, deploy, administer, optimize, and troubleshoot IT networks that support at-home workers. Progent can assist your Edison organization to select the appropriate technologies and adhere to leading practices in creating and maintaining a secure virtual solution for telecommuters that promotes collaboration and returns maximum business value. Progent offers support services that go from as-needed expertise for getting you over occasional technical bottlenecks to comprehensive project management or co-management to help you successfully complete mission-critical initiatives.

Progent's consultants can assist Edison, New Jersey organizations to succeed with any facet of creating a high-performing telecommuting ecosystem by delivering infrastructure design and configuration services, VoIP PBX troubleshooting, voice/video conferencing integration, collaboration platform selection and deployment, cloud integration, Help Desk services, data security, backup/restore solutions, and unified management.

Security for Teleworkers
Work-from-Home workers typically use their personal devices and often work in an unsecured physical environment. This situation multiplies their susceptibility to malware attacks and requires judicious configuration of firewalls, anti-malware tools, multi-factor authentication, remote monitoring, thorough user education, and the creation of security policies built on leading practices. Progent's veteran group of IT security support consultants can help your business to design, implement and maintain a compliant cybersecurity solution that guards critical information assets in networks that include telecommuters.

Firewall Integration Services for At-Home WorkersFirewalls allow companies to create a network environment that can be safely accessed by on-premises users and by an at-home workforce, mobile users, suppliers, clients, and other stakeholders. Modern firewall appliances permit you to assign and manage appropriate access rights to different classes of users and to scale your IT network and modify your security profile as your company evolves and as network attacks grow increasingly complex. Progent works with both new and older security devices from all leading manufacturers like Cisco, Palo Alto Networks, Check Point, Juniper, and Fortinet. To find out more about Progent's firewall integration expertise, visit firewall configuration and support services.

Remote Endpoint Monitoring and Management Services for TelecommutersOnline Endpoint Security Monitoring makes it easy to watch over the disparate devices utilized by remote workers and either block or identify and mitigate modern cyber attacks like ransomware. With ProSight Active Security Monitoring (ASM) services, a small-footprint software agent is installed on every secured endpoint device, watching all activity and using state-of-the-art machine learning from SentinelOne to detect new attacks on arrival. When an attack is spotted, ProSight ASM instantly disconnects the targeted endpoint device from the network to quarantine the malware. Because the ProSight Active Security Monitoring software agent is autonomous, endpoint devices stay secure even if they are not connected to the Internet. Progent is a SentinelOne Partner, reseller, and integrator. To find out more about ProSight ASM, visit remote endpoint security monitoring for an at-home workforce.

Two-factor Authentication Services for Remote WorkersProgent's Duo authentication services incorporate Cisco's Duo cloud technology to protect against compromised passwords by using two-factor authentication (2FA). Duo enables one-tap identity confirmation with Apple iOS, Android, and other out-of-band devices. Using 2FA, whenever you sign into a protected online account and give your password you are requested to verify your identity via a device that only you have and that is accessed using a different network channel. A broad selection of out-of-band devices can be utilized as this second means of ID validation including a smartphone or watch, a hardware token, a landline phone, etc. You may designate multiple verification devices. To learn more about Duo identity validation services, go to Cisco Duo MFA two-factor authentication services for remote workers.

Security Audit Services for At-Home WorkersSecurity Audits can evaluate the vulnerability of your network to all classes of external and internal security attacks for a network that incorporates an at-home workforce. Progent can deploy online, automated security inventory scanning for quickly and economically detecting a wide variety of security holes that can be surfaced via the Internet. Progent's security assessment experts, which can be provided by data security professionals with top credentials including CISM, CISSP, and GIAC, can assist your business to evaluate your processes and policies and review your network infrastructure to allow you to design the highest level of security for your telecommuters.

Download White Paper: Securing a Work-From-Home Network
To read or download a white paper describing key areas to focus on for securing an IT environment that incorporates telecommuters, click:
Securing a Work-From-Home Environment White Paper. (PDF - 2.4 MB)

Contact Progent for Telecommuter Expertise
To get in touch with Progent about creating and managing an efficient work-from-home solution for your Edison, New Jersey business, phone 1-800-993-9400 or visit Contact Progent.