If you operate a multi-OS environment that combines UNIX and Microsoft servers, Progent can offer security consulting by providing a CISSP-certified IT professional to help your entire enterprise in a broad set of security areas. CISSP Certification denotes mastery of a global standard for data security. ANSI (American National Standards Institute) has awarded the CISSP credential accreditation in the area of data security under ISO/IEC 17024. Progent can provide a CISSP-certified professional to help your enterprise in a broad range of security fields such as:
Security Administration Procedures
Security administration involves the identification of a company's high-value data and the creation, documentation, and execution of policies, procedures, standards. Management techniques that include information classification and risk assessment can be utilized to identify possible attacks, classify assets, and evaluate system vulnerabilities so that appropriate measures can be implemented.
Security Architecture and Models
This concerns the concepts, structures, and guidelines followed to build, track, and secure OS platforms, hardware, networks, and application software plus the controls utilized to enforce different levels of availability, integrity, and privacy.
Access Management Solutions and Methodology
Access management systems are a set of mechanisms that operate together to build a security infrastructure to protect the high-value data of the information network.
Applications Development Security
This addresses the important security principles associated with application software development. Software development security outlines the circumstances where software is designed and developed and explains the vital role application software has in providing IT system security.
Secure Operations
This has to do with identifying the management of equipment, media, and the operators and administrators with access privileges to any of these resources. Audit and monitoring are the tools and facilities that enable the identification of security-related activity and follow-on efforts to identify the essential elements and convey the pertinent information to the appropriate individual, group, or mechanism.
Physical Security
Physical security addresses protection techniques for the entire facility, from the perimeter to the desk, including all of the information system resources.
Cryptography
Data Encryption involves the principles, means, and methods of cloaking data to ensure its integrity, privacy, and legitimacy.
Telecom, Network and Internet Security
This area has to do with:
Business Continuity Preparedness
The Business Continuity Plan (BCP) covers the protection and restoration of business activity in the event of outages.
Law, Investigation and Ethics
This has to do with:
To get access to security consulting expertise for Solaris environments, call Progent at
Progent's Support for UNIX-based Platforms
Progent's UNIX-family consulting services provide small companies and developers help with administering and maintaining UNIX/Linux/Mac-based systems that can coexist with Microsoft-based technology. Progent offers your business the services of UNIX technical experts, authorized Microsoft engineers, Cisco-certified CCIEs, and security experts certified by CISM. This broad range of knowledge gives your company a convenient one-stop source to help you to create and support a safe and reliable multi-vendor network and communications infrastructure that combines Microsoft Windows with popular variants of UNIX including:
macOS and OS X ,
Solaris,
IBM AIX Operating System,
HP-UX,
Berkeley UNIX (BSD),
SCO and
Silicon Graphics IRIX or major Linux distributions including
RedHat,
SUSE Linux,
Debian-GNU and
CentOS,
Ubuntu Linux,
Mandriva Linux,
PCLlinuxOS Linux,
fedora, and
Gentoo.