If you have a multi-OS environment with UNIX and Microsoft servers, Progent can offer security consulting by providing a CISSP-certified IT expert to assist your entire enterprise in an extensive range of security areas. CISSP Certification denotes mastery of a global standard for information security. ANSI (American National Standards Institute) has granted the CISSP credential accreditation in the area of information security under ISO/IEC 17024. Progent can provide a CISSP-certified consultant to help your organization in a broad range of security fields including:

  • Security Administration Procedures
  • Security Architecture and Models
  • Access Control Systems and Processes
  • Software Development Security
  • Secure Operations
  • Site Security
  • Cryptography
  • Telecommunications, LAN and Internet Security
  • Disaster Recovery Preparedness
  • Crime Law, Investigation and Ethics

Security Administration Practices
Security administration involves the determination of a company's information assets and the creation, recording, and execution of policies, procedures, and guidelines. Management tools such as data categorization and risk analysis can be utilized to determine possible threats, classify assets, and evaluate security vulnerabilities so that appropriate controls can be implemented.

Security Architecture and Models
This covers the principles, structures, and standards used to build, monitor, and protect operating systems, hardware, networks, and application software plus the tools used to enforce different degrees of availability, integrity, and confidentiality.

Access Control Solutions and Methodology
Access controls are a collection of mechanisms that work cohesively to create a security infrastructure to guard the assets of the IT system.

Software Development Security
This addresses the important security principles associated with application software development. Software development security outlines the environment where software is planned and produced and explains the vital part application software has in providing information network security.

Secure Operations
Operations security involves determining the controls over equipment, media, and the technicians and managers with access privileges to these resources. Audit and tracking are the tools and facilities that permit the awareness of security-related events and consequent efforts to discover the essential factors and convey the pertinent data to the appropriate person, group, or process.

Physical Security
Physical security addresses protection mechanisms for the entire facility, from the perimeter to the desk, including all of the IT system resources.

Data Encryption
Data Encryption entails the concepts, means, and processes of cloaking data to preserve its consistency, confidentiality, and legitimacy.

Telecommunications, Network and WAN Security
This area has to do with:

  • Network Structures
  • Transmission methods
  • Transport protocols
  • Security measures implemented to provide availability, consistency, and privacy
  • Verification for traffic over private and public networks and media.

Disaster Recovery Planning
The Business Continuity Plan (BCP) covers the protection and restoration of business operations after outages.

Crime Law, Investigation and Ethics
This has to do with:

  • Computer crime regulations
  • The procedures taken and mechanisms utilized to investigate computer crime activity

For security consulting expertise, call Progent at 800-993-9400 or visit Contact Progent.

Progent's Microsoft, Cisco, and Applications Expertise
Progent's Microsoft and Cisco authorized professionals offer customers in San Francisco, Silicon Valley, and in cities across the United States a wide range of knowledge concerning the fundamental IT requirements shared by typical small and mid-size business networks. Progent's primary services include network support, Microsoft Exchange help, IT security consulting and Help Desk outsourcing and support. Progent's Application Experts Group offers in-depth expertise in key application topics. By providing a one-stop resource for information technology generalists and experts, Progent can tailor speedy, cost-effective and complete IT solutions that fit the unique requirements of your company.

© 2002- 2018 Progent Corporation. All rights reserved.

More topics of interest: