If you operate a mixed-platform environment with UNIX and Windows servers, Progent can offer security support by providing a CISSP-certified IT professional to assist your entire enterprise in an extensive range of security concerns. CISSP Certification denotes mastery of a worldwide standard for data security. ANSI (American National Standards Institute) has granted the CISSP credential accreditation in the area of data security under ISO/IEC 17024. Progent can give you access to a CISSP-certified professional to help your company in a variety security fields such as:
Security Management Practices
Security management involves the identification of a company's most important information and the creation, documentation, and carrying out of policies, procedures, and guidelines. Administration techniques that include information categorization and risk assessment can be used to determine possible attacks, classify valuable data, and evaluate system weaknesses so that appropriate measures can be implemented.
Security Infrastructure and Paradigms
This involves the concepts, structures, and standards used to build, monitor, and secure operating systems, hardware, networks, and applications plus the controls utilized to police different levels of availability, integrity, and confidentiality.
Access Management Systems and Processes
Access controls are a set of mechanisms that work cohesively to build a security architecture to guard the assets of the IT network.
Applications Development Security
This addresses the key security principles related to software development. Application software development security defines the circumstances where programs are designed and produced and elucidates the critical role application software has in providing IT network security.
Operations Security
This involves determining the controls over hardware, data storage, and the operators and administrators with access rights to these resources. Audit and tracking are the tools and facilities that permit the identification of security-relevant activity and follow-on efforts to discover the essential elements and report the associated information to the designated individual, group, or mechanism.
Site Security
Physical security addresses security techniques for the entire physical facility, from the outside perimeter to the inside office space, including all of the IT system assets.
Data Encryption
Cryptography involves the concepts, techniques, and processes of disguising data to preserve its consistency, confidentiality, and legitimacy.
Telecommunications, LAN and Internet Security
This area involves:
Disaster Recovery Planning
The Business Continuity Plan covers the protection and recovery of commercial operations in the event of outages.
Crime Law, Investigation and Ethics
This has to do with:
For security consulting expertise, call Progent at
Progent's Microsoft, Cisco, and Applications Expertise
Progent's Microsoft and Cisco certified professionals offer clients in the, San Jose, and in cities nationwide a wide range of knowledge covering the basic IT requirements common to typical small business networks. Progent's core services include system support, Microsoft Exchange help, network security consulting and HelpDesk outsourcing and staffing. Progent's Application Experts Team offers in-depth knowledge of specific application areas. By providing a single source for IT generalists and experts, Progent can tailor quick, affordable and thorough IT solutions that fit the specific requirements of your organization.