If you operate a multi-platform network that combines UNIX and Windows technology, Progent provides security support by providing a CISSP-certified network expert to assist your entire enterprise in an extensive range of security concerns. CISSP Certification recognizes expertise with a worldwide standard for information security. ANSI (American National Standards Institute) has awarded the CISSP credential accreditation in the area of information security under ISO/IEC 17024. Progent can provide a CISSP-certified consultant to help your organization in a variety security fields such as:
- Security Administration Practices
- Security Infrastructure and Paradigms
- Access Management Systems and Methodology
- Applications Development Security
- Operations Security
- Physical Security
- Data Encryption
- Telecom, Network and Internet Security
- Business Continuity Preparedness
- Law, Investigation and Ethics
Security Management Procedures
Security administration involves the identification of a company's most important information and the development, documentation, and carrying out of policies, procedures, and guidelines. Administration tools such as data categorization and risk assessment can be utilized to identify possible attacks, classify valuable data, and evaluate system weaknesses so that appropriate measures can be implemented.
Security Architecture and Paradigms
This concerns the principles, structures, and guidelines used to build, track, and secure operating systems, equipment, infrastructure, and application software as well as the tools used to police different degrees of robustness, consistency, and privacy.
Access Control Systems and Methodology
Access management systems are a set of technologies that operate cohesively to build a security architecture to guard the high-value data of the information system.
Software Development Security
This involves the important security concepts associated with application development. Software development security outlines the environment where software is planned and produced and elucidates the critical role software plays in providing IT system protection.
This has to do with determining the management of equipment, data storage, and the operators and administrators with access rights to these assets. Audit and tracking are the mechanisms and techniques that permit the awareness of security-relevant activity and subsequent actions to discover the key factors and convey the pertinent data to the appropriate individual, team, or mechanism.
Physical security addresses protection mechanisms for the entire physical facility, from the perimeter to the inside office space, including all of the information system resources.
Data Encryption entails the concepts, techniques, and processes of disguising information to ensure its consistency, confidentiality, and legitimacy.
Telecommunications, Network and Internet Security
This area has to do with:
- Network Infrastructure
- Transmission mechanisms
- Transport protocols
- Security measures implemented to provide reliability, consistency, and privacy
- Validation for transmissions over private and public networks and media.
Disaster Recovery Preparedness
This covers the preservation and restoration of business activity in the event of outages.
Crime Law, Investigation and Ethics
- Information system crime laws
- The measures followed and mechanisms utilized to solve information system crime activity
To get access to security consulting expertise for Solaris environments, call Progent at 800-993-9400 or visit Contact Progent.
Progent's Consulting Services for UNIX Environments
Progent's UNIX-family consulting experts provide small businesses and software developers help with administering and maintaining UNIX/Linux/Mac-based systems that may operate alongside Microsoft-based environments. Progent offers your organization access to UNIX technical experts, authorized Microsoft engineers, Cisco CCIEs, and security experts certified by CISSP. This wide array of expertise gives your company a readily available single source to assist you to build and maintain a protected and reliable multi-vendor connectivity and communications system that incorporates Windows with popular variants of UNIX such as:
Apple macOS and OS X ,
IBM AIX OS,
HP-UX (Hewlett Packard UNIX),
SGI/Irix or major Linux distributions including
Debian GNU/Linux and