If you operate a multi-platform environment with UNIX and Windows technology, Progent can offer security support by giving you access to a CISSP-certified IT consultant to help your entire enterprise in an extensive set of security areas. CISSP Certification recognizes mastery of a global standard for information security. ANSI (American National Standards Institute) has granted the CISSP credential accreditation in the field of data security under ISO/IEC 17024. Progent can provide a CISSP-certified expert to help your enterprise in a broad range of security fields including:
- Security Administration Practices
- Security Infrastructure and Paradigms
- Access Management Solutions and Processes
- Software Development Security
- Secure Operations
- Physical Security
- Telecommunications, Network and WAN Security
- Disaster Recovery Planning
- Law, Investigation and Ethics
Security Administration Procedures
Security management entails the identification of a company's high-value data and the development, documentation, and implementation of policies, operations, and guidelines. Management techniques that include data categorization and threat analysis can be utilized to identify potential attacks, classify valuable data, and evaluate security weaknesses so that effective controls can be implemented.
Security Infrastructure and Models
This involves the principles, framework, and guidelines followed to design, monitor, and secure OS platforms, equipment, infrastructure, and applications plus the controls utilized to enforce various levels of availability, consistency, and confidentiality.
Access Management Solutions and Processes
Access controls are a set of technologies that work in unison to build a security infrastructure to protect the assets of the IT network.
Applications Development Security
This involves the key security concepts that apply to application software development. Software development security defines the environment where programs are planned and developed and elucidates the vital part application software has in ensuring IT network protection.
This has to do with identifying the management of equipment, data storage, and the technicians and managers with access rights to these assets. Audit and monitoring are the tools and facilities that permit the identification of security-relevant events and follow-on actions to discover the key elements and convey the associated data to the appropriate person, group, or process.
Site security provides security techniques for the whole physical facility, from the perimeter to the inside office space, including all of the information network assets.
Cryptography entails the concepts, means, and methods of disguising data to ensure its consistency, privacy, and legitimacy.
Telecom, Network and Internet Security
This area has to do with:
- Network Structures
- Transmission methods
- Transport formats
- Security measures used to ensure reliability, consistency, and privacy
- Verification for traffic over private and public communications networks and media.
Business Continuity Planning
The Business Continuity Plan (BCP) covers the preservation and restoration of business activity in the event of outages.
Crime Law, Investigation and Ethics
- Computer crime regulations
- The procedures followed and technologies used to solve computer crime incidents
For security consulting expertise, call Progent at 800-993-9400 or visit Contact Progent.
Progent's Microsoft, Cisco, and Applications Expertise
Progent's Microsoft and Cisco authorized professionals provide clients in the, , and in cities throughout the U.S a wide range of expertise covering the fundamental IT requirements common to typical small and mid-size business environments. Progent's core services include network support, Microsoft Exchange help, network security support and Help Desk outsourcing and staffing. Progent's Experts Group offers deep expertise in specific application topics. By offering a single resource for information technology generalists and experts, Progent can tailor quick, affordable and comprehensive network solutions that align with the exact needs of your business.