If you operate a multi-OS environment that combines UNIX and Microsoft servers, Progent can offer security support by giving you access to a CISSP-certified network expert to assist your entire enterprise in an extensive set of security concerns. CISSP Certification recognizes expertise with a global standard for network security. ANSI (American National Standards Institute) has granted the CISSP credential accreditation in the field of information security under ISO/IEC 17024. Progent can give you access to a CISSP-certified expert to help your company in a variety security areas including:
Security Administration Procedures
Security administration entails the identification of an organization's most important information and the creation, recording, and carrying out of policies, procedures, standards. Management tools such as information classification and threat analysis can be utilized to determine potential threats, categorize assets, and rate security weaknesses so that appropriate measures can be put in place.
Security Infrastructure and Models
This covers the principles, structures, and standards followed to design, track, and secure OS platforms, hardware, networks, and application software plus the tools utilized to police various levels of robustness, integrity, and confidentiality.
Access Control Solutions and Processes
Access controls are a collection of mechanisms that operate in unison to create a security infrastructure to guard the high-value data of the IT network.
Applications Development Security
This involves the key security principles related to application development. Application software development security defines the environment where software is designed and developed and elucidates the vital role software plays in ensuring IT network protection.
Secure Operations
This concerns identifying the management of hardware, data storage, and the operators and managers with access privileges to these resources. Audit and monitoring are the mechanisms and techniques that enable the identification of security-relevant events and consequent actions to identify the key factors and convey the pertinent information to the designated person, group, or mechanism.
Site Security
Site security addresses security techniques for the whole physical facility, from the perimeter to the desk, including all of the IT system resources.
Cryptography
Cryptography involves the concepts, means, and processes of cloaking information to ensure its consistency, confidentiality, and legitimacy.
Telecommunications, Network and Internet Security
This area involves:
Business Continuity Planning
This addresses the preservation and recovery of commercial operations in the event of network disruptions.
Law, Investigation and Ethics
This involves:
For security consulting expertise, call Progent at
Progent's Microsoft, Cisco, and Applications Expertise
Progent's Microsoft and Cisco certified professionals offer businesses in the, , and in cities nationwide a wide range of expertise concerning the basic information technology needs common to typical small and mid-size business environments. Progent's primary consulting areas include system integration, MS Exchange consulting, system security consulting and HelpDesk consulting and support. Progent's Experts Group offers deep expertise in specific application topics. By providing a one-stop source for IT generalists and specialists, Progent is able to tailor speedy, cost-effective and comprehensive IT solutions that address the unique requirements of your organization.