If you have a multi-OS environment that combines UNIX and Microsoft technology, Progent provides security support by giving you access to a CISSP-certified IT professional to assist your entire business in a broad set of security concerns. CISSP Certification recognizes expertise with an international standard for network security. ANSI (American National Standards Institute) has granted the CISSP credential accreditation in the field of information security under ISO/IEC 17024. Progent can give you access to a CISSP-certified consultant to help your company in a variety security areas including:
- Security Management Procedures
- Security Infrastructure and Paradigms
- Access Control Systems and Processes
- Software Development Security
- Operations Security
- Site Security
- Telecom, Network and Internet Security
- Disaster Recovery Planning
- Crime Law, Investigation and Ethics
Security Administration Practices
Security administration involves the identification of a company's most important information and the creation, documentation, and execution of policies, operations, standards. Administration tools that include information classification and risk analysis can be utilized to identify possible threats, categorize assets, and evaluate security vulnerabilities so that appropriate measures can be implemented.
Security Infrastructure and Paradigms
This involves the principles, structures, and guidelines used to build, track, and secure OS platforms, hardware, networks, and application software as well as the controls utilized to police various degrees of availability, consistency, and confidentiality.
Access Management Systems and Methodology
Access controls are a set of technologies that operate together to create a security architecture to guard the assets of the information network.
Software Development Security
This involves the important security principles related to application development. Application software development security defines the environment where software is designed and produced and explains the vital part software has in ensuring IT network protection.
Operations security concerns identifying the management of hardware, data storage, and the technicians and administrators with access rights to any of these resources. Audit and tracking are the mechanisms and facilities that permit the awareness of security-relevant activity and subsequent actions to identify the essential factors and report the associated data to the appropriate individual, team, or mechanism.
Physical security provides protection mechanisms for the entire facility, from the perimeter to the inside office space, including all of the IT network assets.
Cryptography entails the principles, techniques, and processes of cloaking information to preserve its consistency, privacy, and legitimacy.
Telecom, LAN and WAN Security
This area concerns:
- Network Infrastructure
- Transmission mechanisms
- Transport protocols
- Security measures used to provide availability, consistency, and confidentiality
- Authentication for traffic over private and public communications networks and media.
Business Continuity Preparedness
This covers the protection and recovery of commercial operations in the event of outages.
Crime Law, Investigation and Ethics
- Computer crime laws
- The measures taken and mechanisms utilized to solve computer crime activity
To get access to security consulting expertise for Solaris environments, call Progent at 800-993-9400 or visit Contact Progent.
Progent's Consulting Services for UNIX Systems
Progent's UNIX consulting experts offer small businesses and developers assistance with administering and supporting UNIX/Linux/Mac-based networks that can coexist with Microsoft environments. Progent offers your organization the services of UNIX technical experts, authorized Microsoft consultants, Cisco CCIEs, and security experts certified by CISSP and CISM. This broad array of knowledge offers you a convenient one-stop source to help you to build and maintain a secure and dependable cross-platform connectivity and communications infrastructure that incorporates Microsoft Windows with popular derivatives of UNIX such as:
macOS and OS X ,
HP-UX (Hewlett Packard UNIX),
Berkeley UNIX (BSD),
SCO UNIX and
Silicon Graphics IRIX or major Linux distributions such as
Debian GNU/Linux and