If you have a multi-platform network that combines UNIX and Microsoft technology, Progent provides security consulting by giving you access to a CISSP-certified IT professional to assist your entire enterprise in an extensive set of security concerns. CISSP Certification denotes mastery of a global standard for data security. ANSI (American National Standards Institute) has awarded the CISSP credential accreditation in the area of information security under ISO/IEC 17024. Progent can provide a CISSP-certified consultant to help your business in a broad range of security areas including:
- Security Management Practices
- Security Infrastructure and Paradigms
- Access Management Solutions and Processes
- Software Development Security
- Secure Operations
- Site Security
- Telecom, Network and Internet Security
- Business Continuity Planning
- Law, Investigation and Ethics
Security Management Procedures
Security management entails the identification of an organization's high-value data and the development, recording, and carrying out of policies, procedures, standards. Management tools such as information categorization and threat assessment can be used to determine possible threats, classify assets, and evaluate security weaknesses so that effective controls can be put in place.
Security Infrastructure and Paradigms
This involves the concepts, structures, and guidelines followed to design, track, and protect OS platforms, equipment, networks, and application software plus the controls utilized to enforce various levels of availability, consistency, and privacy.
Access Management Systems and Processes
Access management systems are a set of technologies that work together to build a security architecture to protect the assets of the IT network.
Applications Development Security
This involves the important security concepts related to application software development. Software development security outlines the environment where programs are designed and produced and explains the critical role application software plays in ensuring IT system security.
Operations security has to do with determining the controls over hardware, data storage, and the technicians and administrators with access rights to any of these assets. Audit and monitoring are the tools and facilities that allow the awareness of security-related activity and consequent actions to discover the key factors and report the pertinent information to the designated individual, team, or process.
Site security provides security techniques for the entire facility, from the perimeter to the desk, including all of the information network assets.
Data Encryption entails the principles, means, and methods of disguising data to preserve its integrity, privacy, and authenticity.
Telecommunications, LAN and WAN Security
This area has to do with:
- Network Structures
- Transmission mechanisms
- Transport formats
- Security measures used to provide availability, consistency, and privacy
- Verification for traffic over private and public networks and media.
Disaster Recovery Planning
The Business Continuity Plan covers the preservation and restoration of commercial operations in the event of outages.
Law, Investigation and Ethics
This has to do with:
- Computer crime laws
- The procedures followed and mechanisms used to investigate computer crime incidents
For security consulting expertise, call Progent at 800-993-9400 or visit Contact Progent.
Progent's Microsoft, Cisco, and Applications Expertise
Progent's Microsoft and Cisco certified consultants offer businesses in San Francisco, , and in cities nationwide a wide array of knowledge concerning the fundamental information technology requirements common to typical small and mid-size business networks. Progent's primary consulting areas include system support, MS Exchange help, system security consulting and Help Desk outsourcing and staffing. Progent's Experts Team offers deep expertise in strategic application topics. By offering a one-stop resource for information technology generalists and experts, Progent is able to tailor speedy, cost-effective and thorough IT solutions that align with the specific requirements of your company.