Expanding your home-based or hybrid workforce can have a significant effect on IT network infrastructure, cybersecurity, and corporate workflow. Progent has 20 years of background assisting small and medium-size organizations to plan, implement, tune, manage, and troubleshoot network environments that incorporate an offsite workforce. Progent can help your company to select the appropriate technologies and follow leading practices in building and supporting a secure virtual environment that facilitates teamwork and gives top value.
Progent offers online services that range from as-needed consulting for helping you over sporadic technical bottlenecks to full project management for successfully completing business-critical initiatives.
Security for Telecommuters
At-home employees typically utilize their personal computing devices and usually work in an unsecured physical area. This multiplies their vulnerability to malware threats and requires judicious deployment of corporate firewalls, AV tools, multi-factor authentication, remote monitoring, intensive end-user training, and the creation of policies based on leading practices. Progent's veteran team of data security solutions consultants can help your business to design, deploy and maintain a compliant cybersecurity solution that guards critical information assets in networks that incorporate telecommuters.
Firewalls allow companies to create a network that can be safely utilized by local users and by at-home workers, mobile users, suppliers, clients, and other stakeholders. Modern firewall devices allow you to configure and manage appropriate access rights to various classes of users and to expand your IT network and modify your security as your business evolves and as cyber threats grow more complex. Progent works with both new and older security devices from all major manufacturers including Cisco, Palo Alto Networks, Check Point, Juniper, SonicWall and Fortinet. For more information about Progent's firewall integration expertise, refer to firewall support expertise.
Remote Endpoint Security Monitoring makes it easy to track the disparate devices utilized by at-home workers and either reject or identify and respond to modern cyber attacks such as ransomware. With ProSight Active Security Monitoring (ASM) services, a lightweight software agent is installed on every secured endpoint, monitoring all activity and using advanced AI technology from SentinelOne to identify zero-day threats at inception. When an attack is discovered, ProSight ASM immediately disconnects the targeted endpoint from the corporate network to quarantine the malware. Since the ProSight ASM software agent is autonomous, endpoint devices stay secure even when they are not connected to the Internet. Progent is a SentinelOne Partner, reseller, and integrator. To find out more about ProSight Active Security Monitoring, visit remote endpoint monitoring for telecommuters.
Progent's Duo authentication Services incorporate Cisco's Duo technology to protect against compromised passwords by using two-factor authentication. Duo supports single-tap identity verification on Apple iOS, Google Android, and other personal devices. Using Duo 2FA, when you log into a secured application and enter your password you are asked to confirm your identity on a device that only you possess and that uses a different network channel. A wide range of devices can be used for this second form of authentication such as an iPhone or Android or wearable, a hardware token, a landline telephone, etc. You may designate several validation devices. To learn more about ProSight Duo identity authentication services, refer to Cisco Duo MFA two-factor authentication (2FA) services for at-home workers.
Security Audits can evaluate the exposure of your information system to all classes of outside and internal security attacks for a network that incorporates teleworkers. Progent can run remote, automated cybersecurity analysis software for rapidly and economically detecting a broad range of security weaknesses that can be found over the Internet. Progent's security assessment consulting services, which can be provided by network security professionals with advanced credentials including CISM, ISSAP, and GIAC, can assist you to evaluate your workflows and policies and assess your WAN infrastructure to enable you to implement the highest level of security for your at-home workers.
Horizon3.ai's NodeZero Penetration Testing Platform is a leading-edge penetration test (pentest) product family that can deliver automated threat assessment of your at-home environment as well as your internal and perimeter networks so you can expose, prioritize, remediate, and confirm security weaknesses before threat actors can exploit them. Progent's pentest experts can assist you to use NodeZero to perform comprehensive penetration tests of your perimeter and your internal network in order to evaluate your present security posture. Progent can also help you to harden your network security and can help you to plan and implement a unified cybersecurity ecosystem that streamlines management and delivers optimum protection for on-premises, multi-cloud, remote, and perimeter IT assets. To learn additional details about Progent's threat assessment solutions powered by on NodeZero's PEN test products, visit Consulting Support for NodeZero's PEN Test Platform.
Download White Paper: Protecting a Work-From-Home (WFH) Environment
To read or download a white paper about critical things to focus on for protecting an IT environment that incorporates work-from-home staff, click:
Securing a Work-From-Home (WFH) Environment White Paper. (PDF - 2.4 MB)
Contact Progent for Remote Workforce Support Services
To contact Progent about building and managing an efficient work-from-home solution, phone
Ransomware 24x7 Hot Line: Call 800-462-8800
Progent's Ransomware 24x7 Hot Line is intended to assist organizations to take the urgent first phase in mitigating a ransomware attack by putting out the fire. Progent's online ransomware engineer can assist businesses to identify and quarantine infected devices and protect undamaged resources from being compromised. If your system has been breached by any strain of ransomware, don't panic. Get immediate help by calling Progent's Ransomware Hot Line at 800-462-8800. For details, see Progent's Ransomware 24x7 Hot Line.