Expanding your at-home or hybrid workforce can have a significant impact on IT network infrastructure, security, and your corporate workflow. Progent has two decades of background assisting small and medium-size businesses (SMBs) to plan, implement, optimize, manage, and debug network environments that incorporate a remote workforce. Progent can help you to determine the right tools and adhere to leading practices in building and maintaining a secure virtualized environment that facilitates collaboration and gives maximum business value.
Progent can provide remote IT services that range from on-demand support for helping you through occasional technical roadblocks to full project management or co-management for implementing business-critical initiatives.
Security and Compliance for At-Home Workers
Work-from-Home employees typically use their personal computing devices and usually work in an unsecured physical environment. This multiplies their vulnerability to malware attacks and calls for judicious configuration of corporate firewalls, anti-malware tools, multi-factor authentication, remote endpoint monitoring, intensive end-user training, and the creation of policies built on leading practices. Progent's veteran roster of IT security support experts can help you to plan, deploy and maintain a compliant security solution that guards critical information assets in networks that include remote workers.
Firewalls enable you to build a network that can be safely utilized by on-premises users as well as by telecommuters, mobile users, vendors, customers, and the public. Modern firewall appliances allow you to assign and control appropriate permissions to different classes of users and to scale your network and adjust your security as your business evolves and as cyber threats become more sophisticated. Progent works with both current and legacy security devices from all major manufacturers including Cisco, Palo Alto Networks, WatchGuard, Juniper, and Fortinet. For more information about Progent's firewall integration services, go to firewall support services.
Online Endpoint Monitoring makes it easy to track the various computers used by remote workers and either block or spot and respond to modern cyber attacks such as ransomware. With ProSight Active Security Monitoring services, a small-footprint software agent is put on every protected endpoint, watching all activity and using advanced machine learning and full execution context from SentinelOne to detect new threats at inception. When an attack is spotted, ProSight Active Security Monitoring immediately isolates the infected endpoint device from the corporate network to contain the threat. Since the ProSight Active Security Monitoring software agent is autonomous, endpoint devices stay secure even when they are offline. Progent is a SentinelOne Partner, reseller, and integrator. To learn more about ProSight ASM, see remote endpoint monitoring for teleworkers.
Progent's Duo authentication Services utilize Cisco's Duo cloud technology to protect against password theft by using two-factor authentication (2FA). Duo supports one-tap identity verification with Apple iOS, Android, and other personal devices. Using Duo 2FA, whenever you log into a secured online account and give your password you are requested to confirm your identity on a unit that only you possess and that uses a different network channel. A wide range of devices can be utilized for this second form of authentication including a smartphone or watch, a hardware token, a landline telephone, etc. You can designate multiple verification devices. To learn more about ProSight Duo identity authentication services, see Duo MFA two-factor authentication services for at-home workers.
Security Audits can assess the exposure of your network to all types of external and internal security threats for a network that includes an at-home workforce. Progent can deploy remote, automated cybersecurity analysis scanning for quickly and affordably uncovering a broad range of security holes that can be found over the Internet. Progent's endpoint security assessment experts, which can be provided by data security experts with advanced credentials such as CISA, ISSAP, and GIAC, can assist your company to evaluate your workflows and governance policies and assess your network infrastructure to allow you to design the highest level of security for your telecommuters.
Horizon3.ai's NodeZero Penetration Testing Platform is a leading-edge penetration test (pentest) product family that can deliver autonomous testing of your work-from-home environment as well as your internal and perimeter networks to help you identify, prioritize, remediate, and verify cybersecurity vulnerabilities before malicious hackers can take advantage of them. Progent's pentest experts can assist you to use NodeZero to perform thorough penetration tests of your network perimeter and your internal IT infrastructure in order to evaluate your current security profile. Progent can also help you to harden your network security and can assist you to design and implement a cohesive cybersecurity ecosystem that streamlines management and delivers optimum cyber defense for on-prem, cloud-based, at-home, and perimeter IT assets. To find out more details about Progent's threat analysis solutions powered by on NodeZero's penetration test platform, refer to Consulting Support for NodeZero's Penetration Test Products.
Download White Paper: Securing a Work-From-Home Network
To read or download a white paper about critical things to concentrate on for securing an IT environment that includes telecommuters, click:
Securing a Work-From-Home Network White Paper. (PDF - 2.4 MB)
Contact Progent for Remote Workforce Support Services
To get in touch with Progent about creating and managing an efficient work-from-home solution, call
Ransomware 24x7 Hot Line: Call 800-462-8800
Progent's Ransomware 24x7 Hot Line is intended to assist organizations to carry out the urgent first phase in mitigating a ransomware assault by putting out the fire. Progent's remote ransomware engineer can help you to identify and isolate breached devices and guard clean assets from being compromised. If your system has been breached by any version of ransomware, don't panic. Get immediate help by calling Progent's Ransomware Hot Line at 800-462-8800. For details, see Progent's Ransomware 24x7 Hot Line.