If you operate a multi-platform network with UNIX and Microsoft servers, Progent can offer security consulting by providing a CISSP-certified IT expert to assist your entire business in an extensive range of security areas. CISSP Certification recognizes mastery of an international standard for data security. ANSI (American National Standards Institute) has granted the CISSP credential accreditation in the field of information security under ISO/IEC 17024. Progent can provide a CISSP-certified professional to help your organization in a variety security areas such as:

  • Security Administration Procedures
  • Security Infrastructure and Paradigms
  • Access Management Solutions and Methodology
  • Applications Development Security
  • Operations Security
  • Physical Security
  • Cryptography
  • Telecom, LAN and WAN Security
  • Disaster Recovery Planning
  • Crime Law, Investigation and Ethics

Security Management Procedures
Security administration entails the identification of an organization's information assets and the development, recording, and implementation of policies, procedures, and guidelines. Management tools that include information categorization and risk analysis can be utilized to identify potential attacks, classify valuable data, and rate security vulnerabilities so that effective controls can be put in place.

Security Infrastructure and Paradigms
This concerns the principles, structures, and guidelines followed to build, monitor, and secure operating systems, equipment, infrastructure, and application software plus the controls used to enforce different degrees of robustness, integrity, and privacy.

Access Management Systems and Methodology
Access management systems are a collection of mechanisms that operate in unison to create a security architecture to protect the high-value data of the IT network.

Applications Development Security
This involves the important security principles that apply to application development. Application software development security defines the environment where programs are designed and developed and explains the critical part software plays in providing information network protection.

Secure Operations
This involves identifying the controls over equipment, data storage, and the technicians and managers with access privileges to these resources. Audit and tracking are the mechanisms and facilities that allow the identification of security-related activity and consequent efforts to discover the essential elements and convey the associated information to the designated individual, team, or process.

Site Security
Site security provides security mechanisms for the whole physical facility, from the perimeter to the inside office space, including all of the IT network resources.

Cryptography
Cryptography entails the principles, techniques, and methods of disguising data to ensure its integrity, confidentiality, and authenticity.

Telecommunications, LAN and Internet Security
This area concerns:

  • Network Structures
  • Transmission mechanisms
  • Transport protocols
  • Security measures used to provide reliability, integrity, and confidentiality
  • Verification for traffic over private and public communications networks and media.

Business Continuity Planning
The Business Continuity Plan (BCP) addresses the preservation and restoration of commercial operations after outages.

Law, Investigation and Ethics
This has to do with:

  • Computer crime regulations
  • The procedures followed and technologies used to investigate information system crime activity

To get access to security consulting expertise for Solaris environments, call Progent at 800-993-9400 or visit Contact Progent.

Progent's Support for UNIX Networks
Progent's UNIX consulting experts provide small businesses and product developers assistance with administering and supporting UNIX/Linux/Mac-based networks that can coexist with Microsoft environments. Progent offers your organization contact with UNIX support experts, certified Microsoft engineers, Cisco-certified CCIEs, and security specialists certified by CISSP and CISM. This broad range of expertise gives your company a readily available one-stop resource to assist your business to create and maintain a safe and robust multi-vendor connectivity and communications system that combines Windows with popular variants of UNIX such as: Apple macOS and OS X , Solaris, IBM AIX Operating System, HP-UX, Berkeley UNIX (BSD), SCO and Silicon Graphics IRIX or important Linux distributions such as RedHat Linux, SUSE Linux, Debian GNU/Linux and CentOS Linux, Ubuntu, Mandriva, PCLlinuxOS, fedora Linux, and Gentoo Linux.

More topics of interest: