If you run a multi-platform network that combines UNIX and Windows servers, Progent provides security consulting by providing a CISSP-certified IT expert to help your entire enterprise in a broad set of security concerns. CISSP Certification denotes mastery of a worldwide standard for network security. ANSI (American National Standards Institute) has awarded the CISSP credential accreditation in the field of data security under ISO/IEC 17024. Progent can provide a CISSP-certified consultant to help your company in a broad range of security areas such as:

  • Security Administration Practices
  • Security Architecture and Models
  • Access Management Solutions and Processes
  • Software Development Security
  • Secure Operations
  • Site Security
  • Data Encryption
  • Telecom, LAN and WAN Security
  • Disaster Recovery Planning
  • Crime Law, Investigation and Ethics

Security Management Practices
Security management involves the identification of an organization's high-value data and the creation, documentation, and execution of policies, operations, and guidelines. Administration tools that include data categorization and threat analysis can be used to identify potential threats, classify valuable data, and evaluate security weaknesses so that appropriate controls can be implemented.

Security Architecture and Paradigms
This concerns the concepts, structures, and guidelines followed to build, monitor, and secure operating systems, hardware, infrastructure, and applications plus the controls used to police various degrees of availability, integrity, and confidentiality.

Access Management Solutions and Processes
Access controls are a set of technologies that work cohesively to create a security architecture to guard the high-value data of the IT network.

Software Development Security
This involves the important security concepts related to application software development. Application software development security outlines the circumstances where programs are planned and developed and elucidates the vital part application software plays in ensuring information system protection.

Secure Operations
Operations security involves identifying the controls over hardware, data storage, and the operators and administrators with access rights to any of these assets. Audit and monitoring are the tools and facilities that enable the awareness of security-relevant events and subsequent efforts to discover the essential factors and report the pertinent data to the appropriate individual, team, or mechanism.

Site Security
Physical security addresses security techniques for the whole physical facility, from the perimeter to the desk, including all of the IT network resources.

Cryptography
Data Encryption entails the concepts, means, and processes of disguising data to preserve its integrity, confidentiality, and authenticity.

Telecom, LAN and Internet Security
This area has to do with:

  • Network Infrastructure
  • Transmission mechanisms
  • Transport formats
  • Security measures used to ensure reliability, consistency, and confidentiality
  • Authentication for transmissions over private and public networks and media.

Business Continuity Planning
The Business Continuity Plan covers the protection and restoration of commercial operations in the event of outages.

Crime Law, Investigation and Ethics
This involves:

  • Information system crime regulations
  • The measures taken and technologies used to solve computer crime activity

For security consulting expertise, call Progent at 800-993-9400 or visit Contact Progent.

Progent's Microsoft, Cisco, and Applications Expertise
Progent's Microsoft and Cisco authorized consultants provide clients in San Francisco, San Jose, and in cities across the United States a broad range of expertise concerning the basic information technology needs shared by most small and mid-size business environments. Progent's primary consulting areas include network integration, Microsoft Exchange help, network security support and HelpDesk consulting and staffing. Progent's Experts Team offers in-depth knowledge of specific application areas. By offering a single source for IT generalists and experts, Progent can deliver fast, cost-effective and comprehensive IT solutions that address the exact requirements of your company.
















© 2002- 2017 Progent Corporation. All rights reserved.

More topics of interest: