If you run a mixed-platform environment that combines UNIX and Microsoft servers, Progent provides security consulting by giving you access to a CISSP-certified IT expert to help your entire business in an extensive set of security areas. CISSP Certification denotes mastery of a worldwide standard for information security. ANSI (American National Standards Institute) has granted the CISSP credential accreditation in the area of data security under ISO/IEC 17024. Progent can provide a CISSP-certified professional to help your company in a variety security areas such as:
- Security Management Practices
- Security Architecture and Models
- Access Management Solutions and Methodology
- Applications Development Security
- Secure Operations
- Physical Security
- Telecommunications, Network and Internet Security
- Disaster Recovery Planning
- Law, Investigation and Ethics
Security Administration Procedures
Security administration involves the determination of a company's most important information and the creation, recording, and execution of policies, procedures, standards. Management techniques that include data categorization and threat analysis can be used to determine possible threats, categorize valuable data, and rate system weaknesses so that appropriate measures can be implemented.
Security Architecture and Paradigms
This covers the principles, framework, and standards followed to build, monitor, and secure OS platforms, equipment, networks, and application software as well as the tools utilized to enforce different levels of availability, integrity, and confidentiality.
Access Control Systems and Methodology
Access management systems are a collection of technologies that operate cohesively to build a security architecture to protect the high-value data of the information system.
Applications Development Security
This addresses the important security concepts associated with application software development. Software development security defines the environment where programs are designed and produced and explains the critical part software has in ensuring information network protection.
This concerns identifying the controls over equipment, data storage, and the operators and managers with access privileges to these resources. Audit and tracking are the mechanisms and facilities that permit the identification of security-relevant activity and consequent actions to discover the key elements and convey the pertinent data to the appropriate person, group, or mechanism.
Site security addresses security mechanisms for the whole facility, from the outside perimeter to the inside office space, including all of the information network resources.
Cryptography covers the concepts, techniques, and processes of cloaking data to preserve its consistency, confidentiality, and legitimacy.
Telecom, LAN and Internet Security
This area has to do with:
- Network Infrastructure
- Transmission methods
- Transport formats
- Security techniques used to ensure reliability, consistency, and privacy
- Authentication for transmissions over private and public communications networks and media.
Disaster Recovery Preparedness
The Business Continuity Plan (BCP) addresses the preservation and restoration of business activity in the event of network disruptions.
Law, Investigation and Ethics
- Computer crime regulations
- The procedures taken and mechanisms used to solve computer crime activity
To get access to security consulting expertise for Solaris environments, call Progent at 800-993-9400 or visit Contact Progent.
Progent's Consulting Services for UNIX-based Networks
Progent's UNIX support services offer small companies and software developers assistance with managing and supporting UNIX/Linux/Mac-based networks that can coexist with Microsoft technology. Progent offers your business contact with UNIX technical professionals, authorized Microsoft engineers, Cisco CCIEs, and security specialists certified by CISSP and CISM. This wide range of expertise offers your company a readily available one-stop source to help your business to build and manage a protected and resilient multi-vendor network and communications solution that incorporates Microsoft Windows with popular variants of UNIX such as:
Apple macOS and OS X ,
IBM AIX Operating System,
SGI/Irix or major Linux distributions such as
Debian GNU/Linux and