If you have a mixed-platform network that combines UNIX and Microsoft technology, Progent provides security consulting by giving you access to a CISSP-certified IT consultant to assist your entire business in a broad range of security concerns. CISSP Certification recognizes mastery of a worldwide standard for data security. ANSI (American National Standards Institute) has awarded the CISSP credential accreditation in the area of information security under ISO/IEC 17024. Progent can provide a CISSP-certified expert to help your business in a variety security areas including:
Security Administration Procedures
Security management entails the identification of a company's high-value data and the creation, documentation, and execution of policies, operations, standards. Management techniques that include information categorization and threat assessment can be utilized to identify potential threats, categorize assets, and rate system weaknesses so that effective measures can be implemented.
Security Infrastructure and Models
This involves the principles, structures, and guidelines followed to build, monitor, and protect OS platforms, equipment, infrastructure, and applications as well as the tools used to police different degrees of robustness, consistency, and confidentiality.
Access Control Systems and Methodology
Access management systems are a collection of mechanisms that operate cohesively to build a security infrastructure to protect the high-value data of the information system.
Software Development Security
This addresses the important security principles related to software development. Application software development security outlines the circumstances where software is planned and developed and explains the vital part software has in providing information system protection.
Secure Operations
Operations security has to do with identifying the controls over equipment, media, and the technicians and administrators with access rights to these assets. Audit and tracking are the mechanisms and facilities that allow the awareness of security-relevant activity and follow-on efforts to identify the essential elements and report the associated information to the designated individual, team, or process.
Site Security
Site security provides security techniques for the entire facility, from the perimeter to the inside office space, including all of the IT system assets.
Cryptography
Data Encryption covers the concepts, techniques, and methods of cloaking information to ensure its integrity, privacy, and authenticity.
Telecommunications, LAN and Internet Security
This area has to do with:
Business Continuity Planning
This addresses the protection and restoration of commercial operations in the event of network disruptions.
Crime Law, Investigation and Ethics
This involves:
For security consulting expertise, call Progent at
Progent's Microsoft, Cisco, and Applications Expertise
Progent's Microsoft and Cisco authorized consultants provide clients in the, , and in cities across the United States a wide array of knowledge concerning the basic IT requirements shared by most small and mid-size business environments. Progent's primary services include system integration, Microsoft Exchange consulting, network security consulting and HelpDesk outsourcing and staffing. Progent's Experts Group offers in-depth knowledge of strategic application topics. By offering a one-stop resource for information technology generalists and specialists, Progent can deliver fast, affordable and thorough network solutions that align with the unique requirements of your company.