If you operate a multi-OS network with UNIX and Microsoft technology, Progent provides security consulting by providing a CISSP-certified IT professional to help your entire business in an extensive set of security areas. CISSP Certification denotes expertise with a worldwide standard for network security. ANSI (American National Standards Institute) has granted the CISSP credential accreditation in the field of information security under ISO/IEC 17024. Progent can provide a CISSP-certified consultant to help your business in a broad range of security fields including:

  • Security Management Procedures
  • Security Architecture and Paradigms
  • Access Management Solutions and Processes
  • Software Development Security
  • Operations Security
  • Physical Security
  • Cryptography
  • Telecommunications, LAN and Internet Security
  • Disaster Recovery Preparedness
  • Crime Law, Investigation and Ethics

Security Administration Practices
Security management entails the identification of a company's most important information and the development, documentation, and implementation of policies, operations, standards. Management tools that include data classification and threat analysis can be utilized to determine potential attacks, categorize valuable data, and evaluate system vulnerabilities so that effective controls can be implemented.

Security Architecture and Paradigms
This involves the concepts, framework, and guidelines used to design, track, and secure OS platforms, hardware, networks, and application software as well as the tools utilized to police various levels of robustness, integrity, and confidentiality.

Access Control Solutions and Methodology
Access management systems are a collection of mechanisms that operate cohesively to create a security infrastructure to protect the assets of the information network.

Applications Development Security
This covers the important security concepts related to software development. Software development security defines the circumstances where software is designed and produced and explains the critical part application software has in providing information network protection.

Secure Operations
This has to do with determining the management of equipment, data storage, and the technicians and administrators with access privileges to any of these assets. Audit and monitoring are the tools and techniques that allow the awareness of security-related events and subsequent actions to identify the key elements and report the associated data to the designated individual, group, or mechanism.

Physical Security
Physical security provides security techniques for the entire physical facility, from the perimeter to the desk, including all of the IT system resources.

Data Encryption
Cryptography entails the principles, means, and methods of disguising data to ensure its integrity, confidentiality, and legitimacy.

Telecom, Network and WAN Security
This area involves:

  • Network Structures
  • Transmission methods
  • Transport formats
  • Security techniques implemented to ensure reliability, consistency, and privacy
  • Validation for transmissions over private and public networks and media.

Business Continuity Preparedness
The Business Continuity Plan addresses the preservation and recovery of business operations after outages.

Law, Investigation and Ethics
This has to do with:

  • Information system crime laws
  • The measures followed and mechanisms used to solve computer crime activity

For security consulting expertise, call Progent at 800-993-9400 or visit Contact Progent.

Progent's Microsoft, Cisco, and Applications Expertise
Progent's Microsoft and Cisco authorized consultants offer customers in the San Francisco Bay Area, Silicon Valley, and in cities throughout the U.S a broad range of expertise covering the fundamental IT requirements shared by most small and mid-size business environments. Progent's primary consulting areas include network support, MS Exchange consulting, system security consulting and HelpDesk outsourcing and support. Progent's Experts Group offers deep knowledge of strategic application areas. By providing a one-stop resource for information technology generalists and experts, Progent is able to tailor quick, affordable and complete network solutions that fit the special requirements of your company.
















© 2002- 2018 Progent Corporation. All rights reserved.


More topics of interest: