If you have a mixed-platform network that combines UNIX and Microsoft technology, Progent provides security consulting by giving you access to a CISSP-certified network expert to help your entire business in an extensive range of security concerns. CISSP Certification recognizes mastery of an international standard for data security. ANSI (American National Standards Institute) has granted the CISSP credential accreditation in the field of data security under ISO/IEC 17024. Progent can give you access to a CISSP-certified consultant to help your company in a variety security areas including:
- Security Administration Procedures
- Security Infrastructure and Paradigms
- Access Management Solutions and Processes
- Applications Development Security
- Secure Operations
- Physical Security
- Data Encryption
- Telecommunications, LAN and WAN Security
- Disaster Recovery Preparedness
- Crime Law, Investigation and Ethics
Security Management Procedures
Security management entails the determination of a company's information assets and the development, documentation, and implementation of policies, procedures, standards. Administration techniques such as information classification and threat assessment can be used to identify possible threats, classify assets, and rate system vulnerabilities so that appropriate measures can be put in place.
Security Infrastructure and Models
This involves the concepts, framework, and guidelines used to build, monitor, and secure OS platforms, equipment, infrastructure, and application software as well as the controls utilized to enforce different degrees of availability, consistency, and confidentiality.
Access Control Solutions and Methodology
Access management systems are a set of technologies that work cohesively to build a security infrastructure to guard the assets of the information network.
Software Development Security
This covers the key security principles related to application software development. Software development security defines the environment where software is planned and produced and elucidates the critical part application software has in ensuring information network security.
Operations security has to do with identifying the management of hardware, media, and the technicians and managers with access privileges to any of these resources. Audit and tracking are the tools and facilities that permit the identification of security-relevant activity and follow-on actions to identify the essential factors and convey the pertinent data to the appropriate individual, group, or process.
Physical security provides protection mechanisms for the whole facility, from the outside perimeter to the desk, including all of the information network assets.
Cryptography entails the principles, means, and methods of cloaking information to ensure its consistency, confidentiality, and authenticity.
Telecommunications, LAN and Internet Security
This area has to do with:
- Network Infrastructure
- Transmission mechanisms
- Transport formats
- Security techniques used to ensure reliability, integrity, and privacy
- Verification for transmissions over private and public communications networks and media.
Business Continuity Planning
This covers the protection and restoration of commercial operations after outages.
Crime Law, Investigation and Ethics
This has to do with:
- Information system crime laws
- The procedures taken and technologies utilized to investigate information system crime incidents
To get access to security consulting expertise for Solaris environments, call Progent at 800-993-9400 or visit Contact Progent.
Progent's Support for UNIX Networks
Progent's UNIX support services offer small companies and developers help with administering and maintaining UNIX/Linux/Mac-based networks that may operate alongside Microsoft technology. Progent provides your organization contact with UNIX technical experts, certified Microsoft consultants, Cisco CCIEs, and security specialists accredited by CISSP. This broad range of knowledge gives your company a readily available single resource to help you to build and manage a safe and dependable multi-vendor network and communications system that combines Windows with popular versions of UNIX including:
Apple macOS and OS X ,
IBM AIX Operating System,
HP-UX (Hewlett Packard UNIX),
Berkeley UNIX (BSD),
SGI/Irix or important Linux distributions such as
Debian GNU/Linux and