Progent can provide access to security professionals who have earned CISSP accreditation. CISSP certification denotes expertise with a global standard for data security. American National Standards Institute has awarded the CISSP certification formal recognition in the field of information security under ISO/IEC 17024. This is the first time that an IT accreditation has been given ANSI approval. CISSP is also formally accepted by the United States Department of Defense in their Information Assurance Technical and Managerial disciplines. The CISSP has in addition been accepted as a baseline for the United States NSA's ISSEP area of concentration to safeguard the National Information Infrastructure.

Progent can give you access to a CISSP-certified professional to help your organization in a variety security areas including:

  • Security Administration Procedures
  • Security Infrastructure and Models
  • Access Management Systems and Methodology
  • Software Development Security
  • Operations Security
  • Physical Security
  • Data Encryption
  • Telecommunications, Network and Internet Security
  • Disaster Recovery Planning
  • Law, Investigation and Ethics
  • Security Administration Procedures
    Security administration entails the determination of a company's high-value data and the development, recording, and implementation of policies, operations, standards. Administration techniques that include data categorization and threat assessment can be used to identify possible threats, categorize valuable data, and rate security weaknesses so that effective measures can be implemented.

  • Security Architecture and Models
    This involves the principles, framework, and guidelines followed to design, track, and protect operating systems, hardware, networks, and application software as well as the controls utilized to enforce different degrees of robustness, consistency, and confidentiality.

  • Access Management Systems and Methodology
    Access management systems are a collection of mechanisms that work in unison to build a security infrastructure to guard the high-value data of the IT system.

  • Software Development Security
    This involves the key security concepts related to application development. Application software development security outlines the circumstances where programs are designed and developed and explains the vital part application software plays in providing IT system protection.

  • Secure Operations
    This concerns identifying the controls over equipment, data storage, and the technicians and administrators with access rights to any of these resources. Audit and tracking are the tools and facilities that allow the awareness of security-relevant activity and follow-on actions to discover the essential elements and convey the associated information to the designated individual, team, or mechanism.

  • Physical Security
    Site security addresses security techniques for the entire facility, from the outside perimeter to the inside office space, including all of the IT system resources.

  • Cryptography
    Cryptography involves the concepts, means, and methods of disguising data to preserve its consistency, privacy, and authenticity.

  • Telecom, LAN and WAN Security
    This area involves:
    • Network Infrastructure
    • Transmission methods
    • Transport formats
    • Security measures used to provide availability, integrity, and confidentiality
    • Validation for transmissions over private and public communications networks and media.
  • Business Continuity Preparedness
    This addresses the protection and restoration of commercial operations in the event of network disruptions.

  • Law, Investigation and Ethics
    This concerns:
    • Computer crime regulations
    • The procedures taken and mechanisms used to solve information system crime activity

Other Credentials Help by Progent's Security Specialists
In addition to offering the services of security specialists with CISSP certifications, Progent can also provide your business with access to CISM-certified security consultants, ISSAP-certified network architecture security consultants, CISA-certified IS security auditing specialists, and GIAC-certified system security engineers.

If you're looking for security consulting expertise, call Progent at 800-993-9400 or refer to Contact Progent.














© 2002- 2017 Progent Corporation. All rights reserved.

More topics of interest: