If you have a mixed-platform environment with UNIX and Microsoft servers, Progent provides security support by giving you access to a CISSP-certified IT professional to assist your entire enterprise in an extensive set of security areas. CISSP Certification denotes mastery of a global standard for network security. ANSI (American National Standards Institute) has granted the CISSP credential accreditation in the field of data security under ISO/IEC 17024. Progent can provide a CISSP-certified professional to help your organization in a broad range of security fields including:

  • Security Administration Practices
  • Security Infrastructure and Paradigms
  • Access Control Solutions and Methodology
  • Software Development Security
  • Secure Operations
  • Site Security
  • Data Encryption
  • Telecom, LAN and Internet Security
  • Business Continuity Planning
  • Crime Law, Investigation and Ethics

Security Management Procedures
Security management entails the determination of a company's most important information and the development, documentation, and execution of policies, procedures, standards. Management techniques such as information categorization and threat assessment can be utilized to determine possible threats, categorize valuable data, and evaluate security weaknesses so that effective controls can be implemented.

Security Architecture and Models
This involves the principles, structures, and guidelines used to design, monitor, and protect operating systems, equipment, networks, and applications plus the tools utilized to police various degrees of robustness, integrity, and confidentiality.

Access Control Systems and Methodology
Access controls are a collection of mechanisms that operate together to create a security infrastructure to guard the assets of the information system.

Applications Development Security
This covers the important security concepts associated with application software development. Software development security outlines the environment where software is planned and produced and elucidates the vital role software has in ensuring information system protection.

Operations Security
Operations security involves identifying the management of equipment, media, and the technicians and administrators with access rights to any of these resources. Audit and tracking are the tools and techniques that allow the identification of security-related events and consequent efforts to identify the key factors and report the associated information to the appropriate person, group, or mechanism.

Site Security
Physical security provides security techniques for the whole physical facility, from the perimeter to the desk, including all of the IT network resources.

Cryptography
Data Encryption involves the principles, techniques, and processes of cloaking information to ensure its consistency, privacy, and legitimacy.

Telecommunications, Network and WAN Security
This area has to do with:

  • Network Infrastructure
  • Transmission mechanisms
  • Transport formats
  • Security techniques implemented to provide availability, integrity, and privacy
  • Validation for traffic over private and public networks and media.

Disaster Recovery Preparedness
The Business Continuity Plan addresses the preservation and recovery of business activity after outages.

Law, Investigation and Ethics
This involves:

  • Information system crime regulations
  • The procedures taken and technologies used to solve information system crime activity

For security consulting expertise, call Progent at 800-993-9400 or visit Contact Progent.

Progent's Microsoft, Cisco, and Applications Expertise
Progent's Microsoft and Cisco certified professionals offer clients in San Francisco, Silicon Valley, and in cities throughout the U.S a wide range of knowledge covering the fundamental IT requirements common to typical small and mid-size business environments. Progent's primary services include network support, Microsoft Exchange help, network security consulting and HelpDesk consulting and staffing. Progent's Application Experts Team offers deep expertise in strategic application topics. By offering a single resource for information technology generalists and specialists, Progent can deliver fast, economical and thorough IT solutions that align with the particular requirements of your business.

More topics of interest: