If you run a multi-platform environment with UNIX and Windows technology, Progent can offer security support by giving you access to a CISSP-certified network professional to help your entire enterprise in an extensive range of security concerns. CISSP Certification denotes expertise with a worldwide standard for network security. ANSI (American National Standards Institute) has granted the CISSP credential accreditation in the area of information security under ISO/IEC 17024. Progent can give you access to a CISSP-certified expert to help your enterprise in a broad range of security fields such as:
- Security Management Practices
- Security Architecture and Models
- Access Management Systems and Processes
- Applications Development Security
- Secure Operations
- Physical Security
- Telecom, LAN and WAN Security
- Disaster Recovery Preparedness
- Crime Law, Investigation and Ethics
Security Management Procedures
Security management involves the identification of a company's most important information and the development, documentation, and carrying out of policies, operations, standards. Administration tools such as data categorization and risk assessment can be used to identify possible threats, categorize valuable data, and evaluate system vulnerabilities so that effective measures can be put in place.
Security Architecture and Paradigms
This concerns the principles, structures, and guidelines followed to build, track, and secure OS platforms, hardware, networks, and application software as well as the controls used to enforce different degrees of robustness, integrity, and privacy.
Access Control Systems and Methodology
Access management systems are a set of mechanisms that work cohesively to create a security architecture to guard the high-value data of the information network.
Applications Development Security
This involves the key security principles that apply to application software development. Applications development security outlines the circumstances where software is designed and developed and explains the vital role application software has in ensuring information system security.
Operations security concerns determining the controls over equipment, data storage, and the operators and administrators with access rights to these assets. Audit and tracking are the tools and facilities that permit the identification of security-relevant events and subsequent efforts to discover the essential elements and report the associated information to the appropriate person, group, or mechanism.
Physical security provides security techniques for the entire physical facility, from the perimeter to the desk, including all of the information system assets.
Cryptography entails the concepts, means, and processes of cloaking information to ensure its consistency, privacy, and legitimacy.
Telecom, LAN and Internet Security
This area concerns:
- Network Infrastructure
- Transmission mechanisms
- Transport protocols
- Security measures implemented to ensure reliability, consistency, and privacy
- Authentication for transmissions over private and public communications networks and media.
Disaster Recovery Preparedness
The Business Continuity Plan covers the protection and restoration of commercial operations after network disruptions.
Law, Investigation and Ethics
- Computer crime laws
- The measures followed and mechanisms utilized to investigate information system crime incidents
For security consulting expertise, call Progent at 800-993-9400 or visit Contact Progent.
Progent's Microsoft, Cisco, and Applications Expertise
Progent's Microsoft and Cisco certified professionals provide customers in the, Silicon Valley, and in cities nationwide a broad range of knowledge concerning the basic IT requirements common to typical small business networks. Progent's core services include system integration, Microsoft Exchange help, IT security support and Help Desk outsourcing and support. Progent's Application Experts Team offers deep knowledge of key application areas. By offering a one-stop resource for information technology generalists and specialists, Progent can deliver fast, affordable and complete IT solutions that address the particular requirements of your business.