If you operate a multi-platform network with UNIX and Windows servers, Progent can offer security support by providing a CISSP-certified network expert to help your entire business in a broad range of security areas. CISSP Certification denotes mastery of an international standard for data security. ANSI (American National Standards Institute) has granted the CISSP credential accreditation in the field of data security under ISO/IEC 17024. Progent can give you access to a CISSP-certified professional to help your organization in a variety security areas such as:
Security Management Procedures
Security administration involves the determination of an organization's most important information and the creation, documentation, and implementation of policies, procedures, and guidelines. Management tools such as information categorization and threat assessment can be utilized to identify potential attacks, categorize assets, and rate system weaknesses so that effective measures can be put in place.
Security Infrastructure and Models
This concerns the principles, framework, and standards followed to design, monitor, and protect operating systems, equipment, infrastructure, and application software as well as the controls used to enforce different levels of availability, integrity, and confidentiality.
Access Management Solutions and Processes
Access management systems are a collection of technologies that work cohesively to build a security architecture to protect the high-value data of the IT network.
Software Development Security
This covers the key security principles associated with application software development. Applications development security outlines the environment where software is planned and developed and explains the critical part software has in providing IT network protection.
Operations Security
Operations security involves identifying the controls over equipment, media, and the operators and managers with access rights to any of these resources. Audit and monitoring are the tools and techniques that enable the awareness of security-related events and consequent efforts to discover the essential elements and convey the pertinent information to the appropriate individual, team, or process.
Site Security
Site security addresses protection techniques for the whole physical facility, from the outside perimeter to the inside office space, including all of the information network resources.
Data Encryption
Cryptography entails the principles, techniques, and processes of cloaking data to ensure its integrity, privacy, and legitimacy.
Telecommunications, LAN and Internet Security
This area involves:
Business Continuity Planning
The Business Continuity Plan addresses the protection and restoration of business operations in the event of network disruptions.
Crime Law, Investigation and Ethics
This concerns:
To get access to security consulting expertise for Solaris environments, call Progent at
Progent's Expertise for UNIX Platforms
Progent's UNIX consulting services offer small companies and software developers help with managing and servicing UNIX/Linux/Mac-based networks that can operate alongside Microsoft-based technology. Progent provides your business contact with UNIX support professionals, authorized Microsoft consultants, Cisco CCIEs, and security specialists certified by CISM. This broad array of expertise gives your company a convenient single source to assist you to create and maintain a protected and reliable cross-platform connectivity and communications solution that blends Microsoft Windows with leading variants of UNIX including:
macOS and OS X ,
Sun Solaris,
IBM AIX OS,
HP-UX,
BSD,
SCO UNIX and
Silicon Graphics IRIX (SGI/IRIX) or important Linux distributions including
RedHat,
SUSE Linux,
Debian GNU/Linux and
CentOS Linux,
Ubuntu Linux,
Mandriva Linux,
PCLlinuxOS,
fedora Linux, and
Gentoo.