If you run a multi-platform network with UNIX and Microsoft servers, Progent can offer security consulting by providing a CISSP-certified IT consultant to assist your entire business in a broad set of security concerns. CISSP Certification denotes mastery of a global standard for network security. ANSI (American National Standards Institute) has granted the CISSP credential accreditation in the area of information security under ISO/IEC 17024. Progent can give you access to a CISSP-certified professional to help your enterprise in a variety security fields such as:
- Security Administration Procedures
- Security Architecture and Models
- Access Control Systems and Methodology
- Applications Development Security
- Operations Security
- Site Security
- Data Encryption
- Telecom, LAN and Internet Security
- Business Continuity Preparedness
- Crime Law, Investigation and Ethics
Security Management Procedures
Security administration involves the identification of an organization's high-value data and the creation, documentation, and carrying out of policies, operations, standards. Management tools that include data classification and risk assessment can be used to identify possible attacks, categorize valuable data, and rate system weaknesses so that appropriate measures can be implemented.
Security Infrastructure and Paradigms
This covers the principles, structures, and standards used to design, monitor, and secure OS platforms, hardware, infrastructure, and application software plus the controls used to enforce various degrees of robustness, integrity, and confidentiality.
Access Management Systems and Methodology
Access controls are a collection of mechanisms that work cohesively to build a security architecture to guard the high-value data of the IT network.
Software Development Security
This addresses the key security principles related to application development. Software development security outlines the circumstances where programs are designed and developed and explains the vital part software has in ensuring information system protection.
Operations security involves identifying the management of hardware, data storage, and the operators and administrators with access privileges to these resources. Audit and monitoring are the tools and techniques that allow the awareness of security-related activity and consequent efforts to identify the key factors and report the pertinent information to the designated person, team, or process.
Physical security provides security mechanisms for the entire physical facility, from the perimeter to the desk, including all of the IT network resources.
Cryptography entails the concepts, means, and processes of disguising data to preserve its consistency, privacy, and authenticity.
Telecom, LAN and WAN Security
This area has to do with:
- Network Structures
- Transmission mechanisms
- Transport protocols
- Security measures used to provide reliability, integrity, and confidentiality
- Authentication for transmissions over private and public communications networks and media.
Disaster Recovery Preparedness
The Business Continuity Plan (BCP) addresses the preservation and restoration of commercial operations after outages.
Crime Law, Investigation and Ethics
This has to do with:
- Information system crime regulations
- The procedures followed and mechanisms utilized to investigate information system crime activity
To get access to security consulting expertise for Solaris environments, call Progent at 800-993-9400 or visit Contact Progent.
Progent's Help for UNIX Systems
Progent's UNIX support services offer small companies and software developers help with administering and servicing UNIX/Linux/Mac-based networks that can coexist with Microsoft-based technology. Progent offers your company the services of UNIX technical experts, certified Microsoft consultants, Cisco-certified CCIEs, and security specialists accredited by CISM. This wide range of expertise offers you a readily available one-stop resource to assist your business to build and manage a safe and resilient cross-platform connectivity and communications solution that combines Windows with popular derivatives of UNIX such as:
macOS and OS X ,
IBM AIX OS,
HP-UX (Hewlett Packard UNIX),
Berkeley UNIX (BSD),
SGI/Irix or important Linux distributions such as
fedora Linux, and