If you operate a multi-OS environment that combines UNIX and Microsoft servers, Progent can offer security consulting by providing a CISSP-certified IT professional to help your entire enterprise in a broad set of security areas. CISSP Certification denotes mastery of a global standard for data security. ANSI (American National Standards Institute) has awarded the CISSP credential accreditation in the area of data security under ISO/IEC 17024. Progent can provide a CISSP-certified professional to help your enterprise in a broad range of security fields such as:
- Security Management Procedures
- Security Architecture and Models
- Access Management Solutions and Processes
- Applications Development Security
- Secure Operations
- Site Security
- Telecommunications, LAN and WAN Security
- Disaster Recovery Preparedness
- Crime Law, Investigation and Ethics
Security Administration Procedures
Security administration involves the identification of a company's high-value data and the creation, documentation, and execution of policies, procedures, standards. Management techniques that include information classification and risk assessment can be utilized to identify possible attacks, classify assets, and evaluate system vulnerabilities so that appropriate measures can be implemented.
Security Architecture and Models
This concerns the concepts, structures, and guidelines followed to build, track, and secure OS platforms, hardware, networks, and application software plus the controls utilized to enforce different levels of availability, integrity, and privacy.
Access Management Solutions and Methodology
Access management systems are a set of mechanisms that operate together to build a security infrastructure to protect the high-value data of the information network.
Applications Development Security
This addresses the important security principles associated with application software development. Software development security outlines the circumstances where software is designed and developed and explains the vital role application software has in providing IT system security.
This has to do with identifying the management of equipment, media, and the operators and administrators with access privileges to any of these resources. Audit and monitoring are the tools and facilities that enable the identification of security-related activity and follow-on efforts to identify the essential elements and convey the pertinent information to the appropriate individual, group, or mechanism.
Physical security addresses protection techniques for the entire facility, from the perimeter to the desk, including all of the information system resources.
Data Encryption involves the principles, means, and methods of cloaking data to ensure its integrity, privacy, and legitimacy.
Telecom, Network and Internet Security
This area has to do with:
- Network Structures
- Transmission methods
- Transport protocols
- Security measures implemented to ensure availability, integrity, and privacy
- Verification for traffic over private and public networks and media.
Business Continuity Preparedness
The Business Continuity Plan (BCP) covers the protection and restoration of business activity in the event of outages.
Law, Investigation and Ethics
This has to do with:
- Computer crime laws
- The procedures taken and technologies used to solve information system crime incidents
To get access to security consulting expertise for Solaris environments, call Progent at 800-993-9400 or visit Contact Progent.
Progent's Support for UNIX-based Platforms
Progent's UNIX-family consulting services provide small companies and developers help with administering and maintaining UNIX/Linux/Mac-based systems that can coexist with Microsoft-based technology. Progent offers your business the services of UNIX technical experts, authorized Microsoft engineers, Cisco-certified CCIEs, and security experts certified by CISM. This broad range of knowledge gives your company a convenient one-stop source to help you to create and support a safe and reliable multi-vendor network and communications infrastructure that combines Microsoft Windows with popular variants of UNIX including:
macOS and OS X ,
IBM AIX Operating System,
Berkeley UNIX (BSD),
Silicon Graphics IRIX or major Linux distributions including