If you have a multi-OS environment that combines UNIX and Windows technology, Progent can offer security support by giving you access to a CISSP-certified IT expert to assist your entire enterprise in a broad set of security concerns. CISSP Certification recognizes mastery of a global standard for information security. ANSI (American National Standards Institute) has awarded the CISSP credential accreditation in the field of data security under ISO/IEC 17024. Progent can give you access to a CISSP-certified expert to help your company in a variety security fields including:
- Security Management Practices
- Security Infrastructure and Models
- Access Control Systems and Processes
- Applications Development Security
- Secure Operations
- Site Security
- Data Encryption
- Telecom, LAN and WAN Security
- Business Continuity Preparedness
- Crime Law, Investigation and Ethics
Security Management Procedures
Security administration entails the identification of an organization's most important information and the development, recording, and implementation of policies, operations, and guidelines. Administration techniques such as data categorization and risk assessment can be used to identify potential threats, categorize valuable data, and evaluate security weaknesses so that appropriate controls can be put in place.
Security Infrastructure and Models
This covers the principles, framework, and standards followed to build, track, and secure operating systems, hardware, infrastructure, and application software plus the controls used to police various degrees of robustness, integrity, and confidentiality.
Access Control Systems and Processes
Access management systems are a set of technologies that work in unison to build a security infrastructure to guard the high-value data of the IT network.
Software Development Security
This involves the key security principles related to software development. Applications development security defines the circumstances where software is planned and developed and elucidates the vital part application software has in ensuring IT network protection.
This concerns identifying the controls over hardware, media, and the technicians and managers with access rights to these assets. Audit and monitoring are the mechanisms and facilities that allow the identification of security-relevant activity and follow-on efforts to discover the key elements and convey the pertinent information to the designated individual, team, or process.
Physical security addresses security mechanisms for the whole physical facility, from the perimeter to the inside office space, including all of the IT network assets.
Data Encryption involves the concepts, techniques, and methods of disguising data to ensure its integrity, privacy, and authenticity.
Telecom, Network and WAN Security
This area concerns:
- Network Infrastructure
- Transmission methods
- Transport protocols
- Security techniques implemented to ensure reliability, integrity, and privacy
- Authentication for transmissions over private and public networks and media.
Disaster Recovery Preparedness
The Business Continuity Plan (BCP) covers the preservation and restoration of business operations after outages.
Law, Investigation and Ethics
- Computer crime laws
- The measures taken and mechanisms utilized to investigate computer crime incidents
To get access to security consulting expertise for Solaris environments, call Progent at 800-993-9400 or visit Contact Progent.
Progent's Expertise for UNIX Networks
Progent's UNIX-family consulting experts offer small companies and software developers assistance with administering and servicing UNIX/Linux/Mac-based networks that may operate alongside Microsoft-based technology. Progent offers your business the services of UNIX technical professionals, authorized Microsoft consultants, Cisco-certified CCIEs, and security specialists accredited by CISM. This broad range of knowledge offers you a readily available single resource to help you to build and manage a secure and dependable cross-platform connectivity and communications system that combines Windows with popular versions of UNIX such as:
Apple macOS and OS X ,
IBM AIX Operating System,
HP-UX (Hewlett Packard UNIX),
SGI/Irix or major Linux distributions including
Debian GNU/Linux and
fedora Linux, and