Enlarging your remote workforce may have a significant effect on network architecture, security/compliance, and corporate workflows. Progent has two decades of background assisting small and mid-size businesses to plan, deploy, manage, optimize, and troubleshoot IT environments that incorporate work-from-home employees. Progent can assist your Anchorage company to select the appropriate tools and adhere to best practices in building and operating a secure virtual office ecosystem for teleworkers that facilitates collaboration and delivers maximum business value. Progent offers support services that go from on demand guidance for getting you past occasional technical bottlenecks to full project management or co-management to help you carry out business-critical tasks.

Progent can assist Anchorage, Alaska organizations to with any facet of creating a high-performing work-from-home environment by providing network infrastructure design and configuration services, IP voice troubleshooting, voice/video conferencing integration, collaboration platform customization and training, public cloud connectivity, helpdesk outsourcing, security and compliance, data protection solutions, and centralized management.

Security and Compliance for Teleworkers
At-home employees typically utilize their own computing devices and usually operate in a poorly secured physical area. This increases their vulnerability to malware threats and calls for judicious deployment of firewalls, AV tools, MFA-based identity verification, remote endpoint monitoring, extensive end-user training, and the creation of policies based on best practices. Progent's veteran roster of IT security support experts can assist your business to design, configure and maintain an effective security solution that protects vital IT assets in networks that include remote workers.

Firewall Integration Services for At-Home WorkersFirewalls enable companies to create a network environment that can be securely utilized by on-premises users as well as by an at-home workforce, mobile employees, suppliers, clients, and the public. Modern firewall appliances allow you to assign and manage appropriate permissions to various groups of users and to expand your network and adjust your cybersecurity posture as your business evolves and as cyber threats become more sophisticated. Progent works with both new and older security devices from all leading vendors like Cisco, Palo Alto Networks, Check Point, Juniper, SonicWall and Fortinet. For details about Progent's firewall support expertise, refer to firewall integration and support expertise.

Remote Endpoint Monitoring and Management for TeleworkersRemote Endpoint Monitoring makes it easy to watch over the various computers used by teleworkers and either block or identify and respond to modern cyber attacks like ransomware. With ProSight Active Security Monitoring services, a lightweight software agent is put on every secured endpoint device, watching all activity and using advanced AI technology from SentinelOne to identify zero-day threats before they can spread. When a cyberattack is discovered, ProSight Active Security Monitoring immediately isolates the infected device from the network to contain the malware. Because the ProSight ASM software agent is self-contained, endpoints stay secure even when they are offline. Progent is a SentinelOne Partner, reseller, and integrator. For details about ProSight ASM, see remote endpoint security monitoring for teleworkers.

Two-factor Authentication Services for TelecommutersProgent's Duo authentication Service Plans utilize Cisco's Duo technology to defend against password theft through the use of two-factor authentication. Duo enables one-tap identity verification on iOS, Android, and other out-of-band devices. With 2FA, whenever you log into a secured application and enter your password you are asked to verify your identity on a device that only you possess and that uses a different network channel. A broad selection of devices can be utilized for this added means of authentication including a smartphone or wearable, a hardware/software token, a landline phone, etc. You may register several validation devices. To learn more about Duo two-factor identity validation services, refer to Duo MFA two-factor authentication (2FA) services for at-home workers.

Security Audit Services for At-Home WorkersSecurity Audits can evaluate the exposure of your information system to all classes of external and internal security attacks for a network that includes remote workers. Progent can deploy remote, automated security analysis scanning for quickly and economically detecting a broad range of security holes that can be surfaced via the Internet. Progent's security audit consulting services, which can be managed by data security professionals with top certifications such as CISA, ISSAP, and GIAC, can assist you to audit your procedures and governance policies and assess your WAN infrastructure to enable you to implement the highest level of security for your an at-home workforce.

NodeZero Pentetration Testing for At-Home WorkersHorizon3.ai's NodeZero PEN Testing Platform is a breakthrough penetration test (pentest) product family that supports autonomous testing of your work-from-home connectivity solution as well as your internal and perimeter networks so you can identify, rank, remediate, and confirm cybersecurity vulnerabilities before malicious hackers can take advantage of them. Progent's pentest experts can help you to deploy NodeZero to carry out thorough pentests of your perimeter and your internal network so you can determine your current security posture. Progent can also help you to strengthen your existing network security and can help you to design and deploy a cohesive cybersecurity strategy that streamlines management and delivers maximum cyber defense for on-prem, cloud-based, remote, and perimeter IT resources. To learn more details about Progent's vulnerability assessment solutions powered by on NodeZero's pentest products, visit Consulting Services for NodeZero's Penetration Test Products.

Download White Paper: Protecting a Work-From-Home Network
To view or download a white paper about critical areas to focus on for protecting an IT environment that supports work-from-home staff, click:
Securing a Work-From-Home (WFH) Network White Paper. (PDF - 2.4 MB)

Contact Progent for Telecommuter Support Services
To contact Progent about creating and managing an efficient work-from-home environment for your Anchorage, Alaska organization, phone 1-800-993-9400 or go to Contact Progent.