If you operate a mixed-platform network that combines UNIX and Microsoft technology, Progent can offer security support by providing a CISSP-certified IT expert to help your entire enterprise in an extensive set of security areas. CISSP Certification recognizes expertise with a global standard for data security. ANSI (American National Standards Institute) has granted the CISSP credential accreditation in the area of data security under ISO/IEC 17024. Progent can provide a CISSP-certified consultant to help your company in a variety security fields including:
- Security Administration Practices
- Security Architecture and Paradigms
- Access Management Solutions and Processes
- Applications Development Security
- Operations Security
- Physical Security
- Telecommunications, LAN and WAN Security
- Disaster Recovery Planning
- Crime Law, Investigation and Ethics
Security Administration Practices
Security administration entails the determination of a company's information assets and the development, recording, and carrying out of policies, operations, standards. Management techniques that include information classification and risk assessment can be utilized to determine potential threats, classify valuable data, and rate system weaknesses so that appropriate controls can be put in place.
Security Architecture and Paradigms
This involves the concepts, structures, and standards used to design, monitor, and secure operating systems, hardware, infrastructure, and application software plus the controls used to police different degrees of availability, consistency, and privacy.
Access Control Systems and Methodology
Access management systems are a collection of mechanisms that operate together to create a security architecture to guard the assets of the IT system.
Applications Development Security
This addresses the important security concepts associated with application development. Application software development security outlines the environment where software is planned and developed and explains the vital part application software plays in providing information system protection.
Operations security concerns identifying the management of hardware, data storage, and the operators and administrators with access rights to these assets. Audit and monitoring are the tools and facilities that allow the awareness of security-relevant activity and subsequent efforts to identify the essential elements and report the associated data to the designated person, team, or mechanism.
Physical security provides protection techniques for the whole physical facility, from the perimeter to the inside office space, including all of the IT system assets.
Cryptography covers the concepts, techniques, and methods of disguising data to preserve its integrity, confidentiality, and legitimacy.
Telecom, Network and Internet Security
This area involves:
- Network Structures
- Transmission methods
- Transport protocols
- Security measures implemented to provide availability, consistency, and confidentiality
- Authentication for transmissions over private and public communications networks and media.
Business Continuity Planning
The Business Continuity Plan (BCP) addresses the preservation and restoration of business activity after outages.
Law, Investigation and Ethics
- Information system crime laws
- The procedures followed and technologies used to investigate computer crime activity
To get access to security consulting expertise for Solaris environments, call Progent at 800-993-9400 or visit Contact Progent.
Progent's Expertise for UNIX Systems
Progent's UNIX-family consulting services provide small businesses and software developers assistance with administering and maintaining UNIX/Linux/Mac-based networks that can operate alongside Microsoft technology. Progent offers your company the services of UNIX support experts, authorized Microsoft engineers, Cisco CCIEs, and security experts accredited by CISM. This broad array of expertise gives you a convenient one-stop source to help you to create and support a safe and robust cross-platform network and communications system that combines Microsoft technology with leading variants of UNIX such as:
Apple macOS and OS X ,
IBM AIX Open UNIX,
HP-UX (Hewlett Packard UNIX),
Berkeley UNIX (BSD),
SCO UNIX and
Silicon Graphics IRIX or important Linux distributions such as