If you have a multi-platform network with UNIX and Windows servers, Progent provides security consulting by providing a CISSP-certified network consultant to assist your entire business in a broad range of security areas. CISSP Certification recognizes expertise with an international standard for information security. ANSI (American National Standards Institute) has awarded the CISSP credential accreditation in the field of information security under ISO/IEC 17024. Progent can provide a CISSP-certified professional to help your organization in a variety security fields including:
- Security Management Procedures
- Security Architecture and Models
- Access Management Systems and Methodology
- Software Development Security
- Secure Operations
- Site Security
- Telecom, Network and WAN Security
- Business Continuity Preparedness
- Law, Investigation and Ethics
Security Management Procedures
Security administration entails the identification of a company's most important information and the creation, recording, and carrying out of policies, operations, and guidelines. Administration tools such as data categorization and threat assessment can be used to identify possible attacks, categorize valuable data, and evaluate system vulnerabilities so that effective measures can be put in place.
Security Architecture and Paradigms
This involves the concepts, framework, and guidelines used to build, track, and protect operating systems, hardware, networks, and applications plus the tools utilized to police various levels of robustness, consistency, and privacy.
Access Control Solutions and Methodology
Access management systems are a set of mechanisms that work in unison to build a security architecture to guard the high-value data of the IT system.
Applications Development Security
This addresses the important security principles related to software development. Applications development security outlines the environment where software is planned and produced and elucidates the critical part application software has in ensuring IT network security.
This has to do with determining the management of equipment, data storage, and the operators and managers with access privileges to these assets. Audit and monitoring are the mechanisms and techniques that allow the identification of security-relevant events and consequent efforts to identify the key factors and report the associated data to the appropriate individual, team, or mechanism.
Site security addresses security techniques for the whole physical facility, from the perimeter to the inside office space, including all of the IT network assets.
Data Encryption entails the principles, techniques, and methods of cloaking data to ensure its consistency, privacy, and legitimacy.
Telecommunications, LAN and Internet Security
This area has to do with:
- Network Infrastructure
- Transmission methods
- Transport protocols
- Security techniques implemented to provide reliability, integrity, and confidentiality
- Authentication for traffic over private and public networks and media.
Disaster Recovery Planning
The Business Continuity Plan (BCP) covers the preservation and restoration of commercial activity in the event of network disruptions.
Crime Law, Investigation and Ethics
- Computer crime regulations
- The measures taken and mechanisms used to investigate information system crime incidents
To get access to security consulting expertise for Solaris environments, call Progent at 800-993-9400 or visit Contact Progent.
Progent's Support for UNIX-based Networks
Progent's UNIX-family consulting services offer small companies and developers assistance with managing and maintaining UNIX/Linux/Mac-based systems that may operate alongside Microsoft-based environments. Progent offers your organization access to UNIX support experts, certified Microsoft engineers, Cisco-certified CCIEs, and security experts accredited by CISM. This wide array of knowledge offers your company a readily available one-stop resource to help you to create and maintain a protected and robust cross-platform network and communications system that combines Microsoft technology with leading variants of UNIX including:
Apple macOS and OS X ,
IBM AIX Operating System,
HP-UX (Hewlett Packard UNIX),
Berkeley UNIX (BSD),
SCO UNIX and
SGI/Irix or major Linux distributions including