If you operate a mixed-platform network with UNIX and Microsoft servers, Progent provides security consulting by providing a CISSP-certified network expert to assist your entire enterprise in a broad set of security areas. CISSP Certification denotes mastery of a worldwide standard for network security. ANSI (American National Standards Institute) has granted the CISSP credential accreditation in the field of information security under ISO/IEC 17024. Progent can provide a CISSP-certified professional to help your organization in a broad range of security areas such as:
- Security Management Practices
- Security Infrastructure and Models
- Access Control Solutions and Processes
- Software Development Security
- Secure Operations
- Site Security
- Telecommunications, Network and Internet Security
- Disaster Recovery Planning
- Crime Law, Investigation and Ethics
Security Management Procedures
Security administration entails the determination of an organization's most important information and the creation, recording, and execution of policies, operations, standards. Management tools that include information categorization and risk analysis can be utilized to identify potential attacks, classify valuable data, and evaluate security vulnerabilities so that effective controls can be put in place.
Security Infrastructure and Paradigms
This concerns the concepts, framework, and guidelines followed to design, monitor, and protect operating systems, hardware, networks, and applications as well as the tools utilized to police various degrees of robustness, consistency, and confidentiality.
Access Control Systems and Methodology
Access controls are a collection of technologies that operate together to create a security architecture to guard the assets of the IT network.
Software Development Security
This involves the important security principles related to application software development. Software development security defines the circumstances where software is designed and developed and elucidates the critical role application software plays in providing IT system security.
Operations security involves determining the management of equipment, media, and the operators and administrators with access rights to any of these assets. Audit and monitoring are the tools and techniques that enable the identification of security-related events and consequent actions to identify the essential factors and convey the pertinent information to the appropriate individual, team, or mechanism.
Site security addresses protection techniques for the whole physical facility, from the perimeter to the inside office space, including all of the information system resources.
Cryptography entails the concepts, techniques, and processes of disguising data to preserve its consistency, confidentiality, and authenticity.
Telecommunications, LAN and Internet Security
This area involves:
- Network Structures
- Transmission methods
- Transport protocols
- Security techniques implemented to ensure availability, integrity, and confidentiality
- Authentication for transmissions over private and public communications networks and media.
Business Continuity Planning
The Business Continuity Plan (BCP) covers the protection and recovery of business operations after outages.
Law, Investigation and Ethics
- Computer crime regulations
- The procedures taken and technologies used to investigate computer crime activity
For security consulting expertise, call Progent at 800-993-9400 or visit Contact Progent.
Progent's Microsoft, Cisco, and Applications Expertise
Progent's Microsoft and Cisco authorized professionals offer businesses in San Francisco, Silicon Valley, and in cities throughout the U.S a broad array of expertise covering the fundamental IT requirements common to most small and mid-size business environments. Progent's core consulting areas include network integration, MS Exchange consulting, system security consulting and HelpDesk outsourcing and staffing. Progent's Application Experts Group offers deep knowledge of key application areas. By offering a single source for information technology generalists and specialists, Progent is able to tailor fast, economical and comprehensive IT solutions that fit the specific requirements of your company.