Progent can provide access to security experts who have earned CISSP certification. CISSP certification denotes mastery of a global standard for network security. ANSI (American National Standards Institute) has granted the CISSP credential official accreditation in the area of information security under ISO/IEC 17024. This is the first time that an IT accreditation has been given ANSI recognition. CISSP is formally accepted by the U.S. Department of Defense in their Information Assurance Technical (IAT) and Managerial (IAM) categories. The CISSP has in addition been adopted as a baseline for the U.S. National Security Agency's Information Systems Security Engineering Professional initiative to safeguard the National Information Infrastructure (NII).

Progent can give you access to a CISSP-certified consultant to help your enterprise in a broad range of security areas including:

  • Security Management Practices
  • Security Infrastructure and Models
  • Access Control Solutions and Processes
  • Applications Development Security
  • Operations Security
  • Site Security
  • Cryptography
  • Telecom, Network and Internet Security
  • Business Continuity Preparedness
  • Crime Law, Investigation and Ethics
  • Security Management Practices
    Security management involves the identification of a company's most important information and the creation, recording, and execution of policies, procedures, standards. Administration tools such as information categorization and threat assessment can be used to determine potential attacks, categorize assets, and rate security weaknesses so that effective measures can be put in place.

  • Security Architecture and Models
    This concerns the concepts, framework, and guidelines followed to design, track, and secure operating systems, hardware, infrastructure, and applications as well as the controls utilized to enforce different levels of robustness, integrity, and confidentiality.

  • Access Management Solutions and Methodology
    Access management systems are a collection of mechanisms that operate in unison to create a security architecture to guard the high-value data of the information system.

  • Applications Development Security
    This addresses the key security concepts that apply to software development. Application software development security defines the environment where software is designed and developed and elucidates the critical role software plays in ensuring IT network security.

  • Operations Security
    Operations security concerns determining the controls over equipment, media, and the operators and managers with access privileges to these resources. Audit and monitoring are the mechanisms and facilities that enable the awareness of security-related activity and subsequent efforts to identify the key factors and report the associated data to the designated individual, group, or mechanism.

  • Physical Security
    Site security addresses security techniques for the whole physical facility, from the perimeter to the desk, including all of the information network resources.

  • Cryptography
    Data Encryption entails the concepts, means, and methods of cloaking data to ensure its consistency, privacy, and legitimacy.

  • Telecommunications, LAN and WAN Security
    This area concerns:
    • Network Infrastructure
    • Transmission mechanisms
    • Transport formats
    • Security measures used to ensure availability, consistency, and privacy
    • Verification for traffic over private and public networks and media.
  • Disaster Recovery Planning
    The Business Continuity Plan (BCP) addresses the protection and recovery of business operations after outages.

  • Crime Law, Investigation and Ethics
    This involves:
    • Information system crime regulations
    • The measures taken and mechanisms utilized to investigate information system crime incidents

Other Credentials Help by Progent's Security Specialists
In addition to offering the services of security specialists with CISSP certifications, Progent can also provide your business with access to CISM-certified security consultants, ISSAP-certified network architecture security consultants, CISA-certified IS security auditing specialists, and GIAC-certified system security engineers.

If you want security consulting, phone Progent at 800-993-9400 or visit Contact Progent.

© 2002- 2017 Progent Corporation. All rights reserved.

More topics of interest: