Progent offers access to security consultants who have qualified for CISSP accreditation. CISSP certification recognizes mastery of an international standard for data security. ANSI (American National Standards Institute) has granted the CISSP credential official accreditation in the area of data security under ISO/IEC 17024:2003. This represents the first time that an information technology accreditation has earned ANSI recognition. CISSP is formally accepted by the U.S. Department of Defense in their Information Assurance Technical (IAT) and IAM categories. The CISSP has in addition been approved as a baseline for the U.S. National Security Agency's ISSEP initiative to secure the NII.

Progent can provide a CISSP-certified consultant to help your business in a broad range of security areas including:

  • Security Administration Practices
  • Security Architecture and Models
  • Access Control Systems and Methodology
  • Software Development Security
  • Secure Operations
  • Site Security
  • Data Encryption
  • Telecommunications, LAN and Internet Security
  • Disaster Recovery Planning
  • Law, Investigation and Ethics
  • Security Management Practices
    Security administration entails the determination of an organization's information assets and the creation, documentation, and carrying out of policies, procedures, and guidelines. Management tools that include data classification and threat analysis can be used to determine potential attacks, classify valuable data, and rate security weaknesses so that effective measures can be put in place.

  • Security Architecture and Models
    This covers the concepts, framework, and standards used to design, track, and protect operating systems, hardware, infrastructure, and applications as well as the controls used to police various degrees of robustness, integrity, and privacy.

  • Access Management Solutions and Processes
    Access management systems are a collection of technologies that work cohesively to create a security infrastructure to guard the high-value data of the information system.

  • Applications Development Security
    This involves the key security principles associated with application development. Software development security defines the circumstances where software is designed and produced and explains the critical role software has in providing information system security.

  • Operations Security
    Operations security concerns determining the management of hardware, data storage, and the operators and managers with access rights to these resources. Audit and tracking are the tools and techniques that allow the identification of security-relevant events and subsequent efforts to identify the essential factors and convey the associated data to the appropriate individual, team, or mechanism.

  • Physical Security
    Physical security provides protection techniques for the whole facility, from the outside perimeter to the desk, including all of the information system resources.

  • Data Encryption
    Cryptography entails the concepts, means, and methods of disguising data to preserve its consistency, privacy, and authenticity.

  • Telecom, Network and Internet Security
    This area has to do with:
    • Network Infrastructure
    • Transmission methods
    • Transport formats
    • Security techniques implemented to ensure availability, consistency, and confidentiality
    • Verification for traffic over private and public communications networks and media.
  • Business Continuity Preparedness
    This addresses the protection and recovery of business operations after network disruptions.

  • Crime Law, Investigation and Ethics
    This concerns:
    • Computer crime laws
    • The procedures taken and mechanisms utilized to investigate information system crime activity

Other Credentials Help by Progent's Security Specialists
In addition to offering the services of security specialists with CISSP certifications, Progent can also provide your business with access to CISM-certified security consultants, ISSAP-certified network architecture security consultants, CISA-certified IS security auditing specialists, and GIAC-certified system security engineers.

If you're looking for network security support services, telephone Progent at 800-993-9400 or see Contact Progent.

© 2002- 2018 Progent Corporation. All rights reserved.

More topics of interest: