If you have a multi-platform network that combines UNIX and Windows technology, Progent provides security support by providing a CISSP-certified network professional to assist your entire enterprise in an extensive set of security concerns. CISSP Certification denotes expertise with a worldwide standard for data security. ANSI (American National Standards Institute) has awarded the CISSP credential accreditation in the area of data security under ISO/IEC 17024. Progent can provide a CISSP-certified professional to help your business in a variety security areas such as:
- Security Administration Practices
- Security Infrastructure and Paradigms
- Access Management Solutions and Methodology
- Applications Development Security
- Secure Operations
- Site Security
- Data Encryption
- Telecommunications, LAN and Internet Security
- Business Continuity Planning
- Crime Law, Investigation and Ethics
Security Administration Procedures
Security administration involves the identification of a company's most important information and the development, documentation, and implementation of policies, procedures, standards. Administration tools such as data categorization and risk analysis can be utilized to determine potential threats, categorize valuable data, and rate system weaknesses so that effective controls can be implemented.
Security Architecture and Paradigms
This concerns the principles, structures, and standards followed to design, monitor, and secure operating systems, hardware, infrastructure, and applications as well as the controls utilized to enforce various levels of availability, integrity, and confidentiality.
Access Management Solutions and Methodology
Access controls are a set of technologies that operate cohesively to create a security infrastructure to guard the high-value data of the IT network.
Applications Development Security
This covers the key security principles that apply to application development. Applications development security outlines the circumstances where programs are planned and developed and explains the vital role application software plays in providing information network protection.
This involves identifying the controls over equipment, media, and the operators and administrators with access rights to any of these assets. Audit and monitoring are the mechanisms and techniques that allow the awareness of security-related activity and subsequent efforts to discover the essential factors and convey the pertinent information to the appropriate individual, group, or mechanism.
Physical security addresses protection mechanisms for the entire facility, from the perimeter to the inside office space, including all of the information system assets.
Cryptography entails the principles, means, and methods of cloaking data to ensure its consistency, privacy, and authenticity.
Telecom, Network and Internet Security
This area has to do with:
- Network Infrastructure
- Transmission mechanisms
- Transport protocols
- Security techniques used to provide availability, consistency, and confidentiality
- Verification for traffic over private and public communications networks and media.
Disaster Recovery Preparedness
This covers the preservation and recovery of business activity after network disruptions.
Law, Investigation and Ethics
This has to do with:
- Information system crime laws
- The procedures followed and mechanisms utilized to solve information system crime incidents
For security consulting expertise, call Progent at 800-993-9400 or visit Contact Progent.
Progent's Microsoft, Cisco, and Applications Expertise
Progent's Microsoft and Cisco authorized consultants offer businesses in the, , and in cities across the United States a broad array of expertise covering the fundamental information technology needs shared by typical small and mid-size business environments. Progent's core consulting areas include system support, Microsoft Exchange consulting, network security consulting and Help Desk outsourcing and support. Progent's Experts Team offers deep knowledge of strategic application areas. By providing a single resource for information technology generalists and specialists, Progent is able to tailor speedy, cost-effective and thorough network solutions that fit the exact requirements of your business.