If you run a multi-OS network that combines UNIX and Microsoft servers, Progent can offer security consulting by giving you access to a CISSP-certified IT expert to help your entire business in an extensive set of security concerns. CISSP Certification denotes mastery of an international standard for information security. ANSI (American National Standards Institute) has granted the CISSP credential accreditation in the area of information security under ISO/IEC 17024. Progent can give you access to a CISSP-certified professional to help your company in a variety security areas such as:
Security Administration Practices
Security management involves the identification of an organization's most important information and the development, recording, and execution of policies, procedures, standards. Administration techniques that include data classification and threat analysis can be used to determine possible attacks, categorize assets, and rate system vulnerabilities so that appropriate controls can be implemented.
Security Infrastructure and Models
This concerns the concepts, framework, and guidelines followed to build, monitor, and protect OS platforms, hardware, infrastructure, and applications as well as the tools used to police various degrees of availability, consistency, and confidentiality.
Access Management Systems and Processes
Access management systems are a collection of technologies that operate cohesively to build a security architecture to guard the assets of the IT network.
Software Development Security
This involves the key security principles that apply to application development. Software development security defines the circumstances where programs are designed and produced and elucidates the vital part application software has in ensuring information network security.
Operations Security
This concerns determining the controls over hardware, media, and the operators and administrators with access privileges to these resources. Audit and tracking are the mechanisms and facilities that allow the identification of security-relevant activity and follow-on actions to discover the key factors and report the associated data to the appropriate person, team, or process.
Site Security
Physical security addresses protection mechanisms for the entire facility, from the perimeter to the desk, including all of the information system resources.
Data Encryption
Cryptography covers the concepts, techniques, and methods of disguising information to ensure its consistency, confidentiality, and legitimacy.
Telecommunications, LAN and WAN Security
This area involves:
Disaster Recovery Planning
This covers the preservation and recovery of business activity after network disruptions.
Law, Investigation and Ethics
This involves:
To get access to security consulting expertise for Solaris environments, call Progent at
Progent's Consulting Services for UNIX-based Systems
Progent's UNIX consulting experts provide small businesses and product developers help with administering and servicing UNIX/Linux/Mac-based networks that can operate alongside Microsoft environments. Progent provides your company the services of UNIX support experts, certified Microsoft consultants, Cisco-certified CCIEs, and security specialists accredited by CISM. This wide range of expertise offers you a convenient single source to assist your business to build and maintain a secure and resilient cross-platform connectivity and communications infrastructure that blends Windows with leading derivatives of UNIX including:
macOS and OS X ,
Sun Solaris,
IBM AIX,
HP-UX,
BSD,
SCO UNIX and
Silicon Graphics IRIX or major Linux distributions including
RedHat,
SUSE Linux,
Debian GNU/Linux and
CentOS,
Ubuntu Linux,
Mandriva Linux,
PCLlinuxOS,
fedora Linux, and
Gentoo Linux.