If you operate a multi-OS environment with UNIX and Windows technology, Progent can offer security support by giving you access to a CISSP-certified IT consultant to help your entire enterprise in an extensive range of security concerns. CISSP Certification denotes expertise with a worldwide standard for network security. ANSI (American National Standards Institute) has granted the CISSP credential accreditation in the area of information security under ISO/IEC 17024. Progent can provide a CISSP-certified consultant to help your business in a broad range of security fields including:

  • Security Administration Practices
  • Security Infrastructure and Models
  • Access Management Systems and Methodology
  • Software Development Security
  • Secure Operations
  • Physical Security
  • Data Encryption
  • Telecom, LAN and Internet Security
  • Disaster Recovery Preparedness
  • Law, Investigation and Ethics

Security Management Procedures
Security management entails the identification of a company's high-value data and the development, recording, and carrying out of policies, operations, and guidelines. Administration techniques such as data classification and threat assessment can be utilized to determine possible threats, categorize valuable data, and evaluate system weaknesses so that appropriate controls can be implemented.

Security Architecture and Models
This concerns the principles, structures, and guidelines used to design, monitor, and protect operating systems, equipment, infrastructure, and applications plus the tools used to enforce different degrees of availability, integrity, and confidentiality.

Access Management Systems and Methodology
Access controls are a set of mechanisms that work together to create a security architecture to protect the assets of the IT network.

Software Development Security
This covers the key security concepts related to application development. Applications development security outlines the circumstances where software is designed and produced and elucidates the critical role application software plays in providing IT system protection.

Secure Operations
This involves identifying the controls over equipment, media, and the operators and managers with access privileges to these resources. Audit and monitoring are the tools and facilities that allow the identification of security-related activity and consequent actions to discover the key elements and report the associated information to the designated individual, group, or mechanism.

Physical Security
Site security provides protection mechanisms for the whole facility, from the outside perimeter to the desk, including all of the information system resources.

Data Encryption
Data Encryption covers the concepts, means, and processes of disguising data to preserve its integrity, privacy, and legitimacy.

Telecom, Network and Internet Security
This area has to do with:

  • Network Infrastructure
  • Transmission methods
  • Transport formats
  • Security measures used to ensure availability, consistency, and privacy
  • Authentication for transmissions over private and public communications networks and media.

Business Continuity Planning
The Business Continuity Plan (BCP) covers the preservation and recovery of business activity in the event of network disruptions.

Crime Law, Investigation and Ethics
This has to do with:

  • Computer crime laws
  • The procedures taken and technologies utilized to investigate computer crime incidents

To get access to security consulting expertise for Solaris environments, call Progent at 800-993-9400 or visit Contact Progent.

Progent's Help for UNIX Networks
Progent's UNIX consulting services provide small companies and developers assistance with managing and supporting UNIX/Linux/Mac-based networks that can operate alongside Microsoft-based environments. Progent offers your business access to UNIX support professionals, certified Microsoft consultants, Cisco CCIEs, and security specialists accredited by CISSP. This wide array of expertise offers you a convenient one-stop resource to help your business to create and support a protected and robust multi-vendor connectivity and communications system that combines Microsoft Windows with popular variants of UNIX such as: macOS and OS X , Solaris, IBM AIX OS, HP-UX, BSD, SCO and Silicon Graphics IRIX (SGI/IRIX) or important Linux distributions including RedHat, SUSE, Debian-GNU and CentOS Linux, Ubuntu Linux, Mandriva Linux, PCLlinuxOS Linux, fedora, and Gentoo.

More topics of interest: