Progent can provide the services of security consultants who have qualified for CISSP accreditation. CISSP certification denotes mastery of an international standard for information security. American National Standards Institute has awarded the CISSP certification official recognition in the field of data security under ISO/IEC 17024:2003. This represents the first time that an information technology accreditation has been awarded ANSI recognition. CISSP is also formally accepted by the United States Department of Defense in their Information Assurance Technical and Managerial categories. The CISSP has in addition been approved as a standard for the U.S. NSA's Information Systems Security Engineering Professional program to protect the National Information Infrastructure (NII).

Progent can provide a CISSP-certified professional to help your business in a variety security areas including:

  • Security Management Procedures
  • Security Infrastructure and Models
  • Access Management Solutions and Methodology
  • Applications Development Security
  • Secure Operations
  • Site Security
  • Cryptography
  • Telecom, Network and WAN Security
  • Business Continuity Preparedness
  • Law, Investigation and Ethics
  • Security Management Procedures
    Security administration involves the identification of an organization's high-value data and the development, documentation, and carrying out of policies, operations, and guidelines. Administration tools such as data categorization and risk assessment can be used to determine possible threats, categorize assets, and rate system vulnerabilities so that appropriate measures can be implemented.

  • Security Infrastructure and Models
    This concerns the concepts, structures, and guidelines used to build, track, and protect operating systems, equipment, infrastructure, and application software plus the controls utilized to police various degrees of robustness, consistency, and confidentiality.

  • Access Management Solutions and Processes
    Access management systems are a set of technologies that work in unison to build a security infrastructure to guard the high-value data of the information system.

  • Applications Development Security
    This involves the key security concepts that apply to software development. Application software development security defines the circumstances where software is designed and developed and elucidates the vital role application software plays in providing IT network protection.

  • Secure Operations
    Operations security involves determining the management of hardware, media, and the operators and administrators with access privileges to any of these assets. Audit and tracking are the mechanisms and facilities that enable the awareness of security-related activity and follow-on efforts to discover the essential factors and convey the associated data to the designated person, group, or process.

  • Site Security
    Site security addresses security techniques for the whole physical facility, from the outside perimeter to the inside office space, including all of the IT network resources.

  • Data Encryption
    Cryptography involves the concepts, means, and processes of disguising information to ensure its consistency, confidentiality, and authenticity.

  • Telecommunications, LAN and Internet Security
    This area involves:
    • Network Infrastructure
    • Transmission methods
    • Transport protocols
    • Security measures used to ensure reliability, consistency, and privacy
    • Authentication for transmissions over private and public networks and media.
  • Business Continuity Planning
    The Business Continuity Plan addresses the preservation and restoration of commercial operations in the event of network disruptions.

  • Law, Investigation and Ethics
    This concerns:
    • Computer crime laws
    • The measures followed and technologies used to solve computer crime activity

Other Credentials Help by Progent's Security Specialists
In addition to offering the services of security specialists with CISSP certifications, Progent can also provide your business with access to CISM-certified security consultants, ISSAP-certified network architecture security consultants, CISA-certified IS security auditing specialists, and GIAC-certified system security engineers.

For network security consulting expertise, phone Progent at 800-993-9400 or visit Contact Progent.

© 2002- 2018 Progent Corporation. All rights reserved.

More topics of interest: