If you have a multi-OS environment with UNIX and Windows technology, Progent can offer security consulting by providing a CISSP-certified IT professional to help your entire enterprise in an extensive range of security concerns. CISSP Certification denotes expertise with an international standard for data security. ANSI (American National Standards Institute) has awarded the CISSP credential accreditation in the area of information security under ISO/IEC 17024. Progent can give you access to a CISSP-certified consultant to help your business in a broad range of security fields such as:

  • Security Management Procedures
  • Security Architecture and Paradigms
  • Access Control Solutions and Processes
  • Software Development Security
  • Operations Security
  • Site Security
  • Data Encryption
  • Telecom, Network and WAN Security
  • Business Continuity Planning
  • Law, Investigation and Ethics

Security Administration Procedures
Security administration involves the identification of an organization's high-value data and the creation, documentation, and carrying out of policies, procedures, and guidelines. Management techniques that include data categorization and risk analysis can be used to identify potential threats, classify valuable data, and evaluate system vulnerabilities so that appropriate controls can be put in place.

Security Infrastructure and Paradigms
This concerns the concepts, structures, and guidelines used to design, monitor, and protect OS platforms, equipment, networks, and applications as well as the controls used to police various degrees of availability, consistency, and confidentiality.

Access Control Solutions and Methodology
Access controls are a set of mechanisms that work cohesively to create a security architecture to guard the assets of the IT network.

Software Development Security
This involves the key security principles that apply to software development. Software development security defines the circumstances where software is planned and developed and elucidates the critical part software has in providing information network protection.

Operations Security
This has to do with identifying the management of equipment, media, and the technicians and managers with access privileges to these resources. Audit and monitoring are the mechanisms and techniques that enable the identification of security-related activity and subsequent actions to discover the essential elements and report the associated information to the appropriate person, team, or mechanism.

Site Security
Site security provides security techniques for the entire facility, from the perimeter to the inside office space, including all of the information system resources.

Data Encryption
Data Encryption covers the principles, means, and methods of disguising data to ensure its consistency, privacy, and authenticity.

Telecom, LAN and WAN Security
This area concerns:

  • Network Structures
  • Transmission mechanisms
  • Transport formats
  • Security techniques implemented to provide availability, integrity, and confidentiality
  • Verification for traffic over private and public communications networks and media.

Business Continuity Preparedness
The Business Continuity Plan covers the preservation and recovery of business operations in the event of outages.

Crime Law, Investigation and Ethics
This involves:

  • Information system crime laws
  • The measures taken and mechanisms utilized to solve information system crime incidents

For security consulting expertise, call Progent at 800-993-9400 or visit Contact Progent.

Progent's Microsoft, Cisco, and Applications Expertise
Progent's Microsoft and Cisco certified consultants provide customers in the San Francisco Bay Area, Silicon Valley, and in cities throughout the U.S a broad array of knowledge concerning the fundamental information technology requirements common to most small and mid-size business networks. Progent's primary consulting areas include network integration, MS Exchange help, IT security support and HelpDesk consulting and staffing. Progent's Experts Team offers deep expertise in specific application areas. By providing a single resource for information technology generalists and experts, Progent can deliver speedy, economical and thorough IT solutions that fit the special requirements of your organization.

© 2002- 2018 Progent Corporation. All rights reserved.

More topics of interest: