If you have a multi-platform environment with UNIX and Microsoft technology, Progent can offer security support by giving you access to a CISSP-certified network consultant to assist your entire business in an extensive set of security areas. CISSP Certification denotes expertise with a global standard for information security. ANSI (American National Standards Institute) has awarded the CISSP credential accreditation in the area of information security under ISO/IEC 17024. Progent can give you access to a CISSP-certified expert to help your business in a variety security areas such as:
- Security Administration Procedures
- Security Infrastructure and Models
- Access Control Systems and Processes
- Software Development Security
- Operations Security
- Physical Security
- Data Encryption
- Telecommunications, Network and WAN Security
- Disaster Recovery Planning
- Crime Law, Investigation and Ethics
Security Management Procedures
Security administration involves the identification of a company's high-value data and the development, recording, and implementation of policies, procedures, and guidelines. Administration techniques such as information classification and risk assessment can be utilized to identify potential threats, categorize assets, and evaluate system weaknesses so that appropriate measures can be implemented.
Security Architecture and Paradigms
This covers the concepts, framework, and standards followed to design, track, and protect OS platforms, hardware, networks, and applications plus the controls utilized to police various degrees of availability, integrity, and confidentiality.
Access Control Solutions and Processes
Access management systems are a collection of technologies that operate together to build a security architecture to guard the high-value data of the IT system.
Software Development Security
This addresses the key security principles related to application software development. Application software development security outlines the circumstances where software is designed and produced and explains the critical part software has in ensuring information network protection.
Operations security concerns identifying the controls over hardware, data storage, and the operators and administrators with access rights to any of these resources. Audit and monitoring are the tools and techniques that permit the identification of security-relevant events and subsequent actions to discover the key elements and report the associated data to the appropriate person, group, or process.
Physical security addresses security mechanisms for the entire facility, from the perimeter to the inside office space, including all of the IT network assets.
Cryptography involves the concepts, techniques, and methods of cloaking information to preserve its consistency, privacy, and legitimacy.
Telecom, Network and WAN Security
This area has to do with:
- Network Infrastructure
- Transmission methods
- Transport formats
- Security techniques implemented to provide reliability, integrity, and privacy
- Validation for traffic over private and public communications networks and media.
Disaster Recovery Planning
The Business Continuity Plan (BCP) addresses the protection and restoration of commercial operations in the event of outages.
Law, Investigation and Ethics
- Information system crime regulations
- The procedures followed and mechanisms utilized to solve information system crime activity
For security consulting expertise, call Progent at 800-993-9400 or visit Contact Progent.
Progent's Microsoft, Cisco, and Applications Expertise
Progent's Microsoft and Cisco authorized professionals provide customers in San Francisco, Northern California, and in cities throughout the U.S a wide array of knowledge covering the fundamental information technology needs common to most small business environments. Progent's core services include network integration, MS Exchange consulting, system security support and Help Desk outsourcing and support. Progent's Application Experts Team offers deep knowledge of specific application topics. By offering a one-stop source for IT generalists and specialists, Progent is able to deliver speedy, cost-effective and complete IT solutions that align with the special needs of your organization.