If you operate a mixed-platform network with UNIX and Windows servers, Progent provides security support by providing a CISSP-certified IT expert to help your entire business in a broad range of security areas. CISSP Certification denotes expertise with a global standard for network security. ANSI (American National Standards Institute) has granted the CISSP credential accreditation in the field of data security under ISO/IEC 17024. Progent can provide a CISSP-certified expert to help your business in a broad range of security fields such as:

  • Security Management Procedures
  • Security Infrastructure and Models
  • Access Control Solutions and Processes
  • Applications Development Security
  • Operations Security
  • Site Security
  • Data Encryption
  • Telecom, LAN and WAN Security
  • Disaster Recovery Preparedness
  • Crime Law, Investigation and Ethics

Security Management Procedures
Security administration entails the identification of an organization's information assets and the development, recording, and execution of policies, procedures, standards. Administration tools such as data categorization and risk analysis can be used to determine potential attacks, classify assets, and evaluate system weaknesses so that appropriate controls can be put in place.

Security Architecture and Paradigms
This concerns the principles, framework, and standards used to build, monitor, and secure OS platforms, hardware, infrastructure, and applications as well as the controls used to police various degrees of robustness, integrity, and privacy.

Access Management Solutions and Processes
Access management systems are a collection of mechanisms that work cohesively to build a security infrastructure to guard the high-value data of the information network.

Applications Development Security
This covers the key security concepts associated with software development. Application software development security outlines the circumstances where software is planned and developed and explains the critical role software plays in providing information system protection.

Operations Security
This concerns identifying the management of equipment, media, and the operators and administrators with access rights to any of these assets. Audit and monitoring are the tools and facilities that permit the awareness of security-related activity and follow-on efforts to identify the essential elements and report the pertinent information to the appropriate individual, group, or mechanism.

Physical Security
Physical security provides security techniques for the entire facility, from the outside perimeter to the desk, including all of the information network assets.

Data Encryption
Data Encryption covers the principles, techniques, and processes of cloaking data to ensure its consistency, confidentiality, and legitimacy.

Telecom, Network and Internet Security
This area involves:

  • Network Structures
  • Transmission methods
  • Transport formats
  • Security techniques implemented to provide availability, integrity, and confidentiality
  • Authentication for transmissions over private and public networks and media.

Disaster Recovery Planning
The Business Continuity Plan covers the protection and restoration of commercial activity in the event of network disruptions.

Law, Investigation and Ethics
This involves:

  • Information system crime regulations
  • The procedures taken and technologies utilized to solve information system crime incidents

For security consulting expertise, call Progent at 800-993-9400 or visit Contact Progent.

Progent's Microsoft, Cisco, and Applications Expertise
Progent's Microsoft and Cisco authorized consultants provide clients in the San Francisco Bay Area, San Jose, and in cities throughout the U.S a broad range of expertise concerning the basic information technology requirements shared by typical small business networks. Progent's primary services include network integration, MS Exchange help, network security consulting and HelpDesk consulting and support. Progent's Experts Group offers in-depth knowledge of key application topics. By providing a single resource for IT generalists and experts, Progent is able to tailor speedy, affordable and complete network solutions that align with the unique needs of your business.
















© 2002- 2019 Progent Corporation. All rights reserved.


More topics of interest: