If you operate a mixed-platform environment that combines UNIX and Windows technology, Progent provides security support by providing a CISSP-certified IT consultant to assist your entire enterprise in an extensive range of security areas. CISSP Certification recognizes expertise with a global standard for data security. ANSI (American National Standards Institute) has awarded the CISSP credential accreditation in the field of information security under ISO/IEC 17024. Progent can provide a CISSP-certified expert to help your enterprise in a variety security areas including:
- Security Administration Procedures
- Security Infrastructure and Models
- Access Management Systems and Methodology
- Software Development Security
- Secure Operations
- Physical Security
- Data Encryption
- Telecom, LAN and Internet Security
- Business Continuity Preparedness
- Law, Investigation and Ethics
Security Administration Procedures
Security administration involves the determination of a company's information assets and the development, documentation, and carrying out of policies, procedures, and guidelines. Management tools that include information categorization and risk analysis can be utilized to determine possible threats, classify assets, and rate security weaknesses so that effective measures can be put in place.
Security Infrastructure and Models
This concerns the concepts, structures, and guidelines followed to build, track, and protect OS platforms, hardware, infrastructure, and application software plus the controls used to enforce various degrees of robustness, integrity, and privacy.
Access Control Solutions and Methodology
Access management systems are a set of mechanisms that work cohesively to build a security infrastructure to guard the high-value data of the IT system.
Software Development Security
This covers the key security principles related to software development. Software development security outlines the environment where programs are designed and produced and elucidates the critical part application software has in providing information system protection.
Operations security has to do with identifying the controls over equipment, media, and the technicians and administrators with access privileges to any of these assets. Audit and tracking are the mechanisms and techniques that enable the identification of security-related events and subsequent actions to discover the essential factors and report the pertinent information to the designated individual, group, or mechanism.
Site security provides protection mechanisms for the whole facility, from the outside perimeter to the desk, including all of the IT system resources.
Data Encryption covers the principles, means, and methods of disguising data to preserve its integrity, confidentiality, and authenticity.
Telecommunications, LAN and Internet Security
This area concerns:
- Network Infrastructure
- Transmission methods
- Transport protocols
- Security techniques implemented to provide reliability, integrity, and privacy
- Verification for traffic over private and public communications networks and media.
Disaster Recovery Preparedness
The Business Continuity Plan (BCP) covers the protection and recovery of business activity after network disruptions.
Crime Law, Investigation and Ethics
- Computer crime regulations
- The procedures followed and technologies utilized to solve information system crime incidents
To get access to security consulting expertise for Solaris environments, call Progent at 800-993-9400 or visit Contact Progent.
Progent's Consulting Services for UNIX-based Platforms
Progent's UNIX consulting services provide small businesses and product developers help with administering and servicing UNIX/Linux/Mac-based systems that may operate alongside Microsoft technology. Progent provides your company the services of UNIX support professionals, authorized Microsoft engineers, Cisco-certified CCIEs, and security experts certified by CISM. This broad range of knowledge offers you a convenient one-stop source to help your business to build and support a safe and reliable multi-vendor network and communications system that blends Microsoft technology with leading variants of UNIX including:
macOS and OS X ,
IBM AIX OS,
SCO UNIX and
Silicon Graphics IRIX (SGI/IRIX) or important Linux distributions such as