If you operate a multi-platform network that combines UNIX and Microsoft technology, Progent provides security consulting by giving you access to a CISSP-certified network expert to help your entire enterprise in an extensive range of security areas. CISSP Certification recognizes mastery of a global standard for network security. ANSI (American National Standards Institute) has awarded the CISSP credential accreditation in the field of information security under ISO/IEC 17024. Progent can provide a CISSP-certified consultant to help your company in a broad range of security areas such as:
- Security Management Procedures
- Security Architecture and Paradigms
- Access Control Systems and Methodology
- Software Development Security
- Operations Security
- Site Security
- Data Encryption
- Telecommunications, Network and WAN Security
- Disaster Recovery Planning
- Crime Law, Investigation and Ethics
Security Administration Practices
Security management involves the identification of an organization's most important information and the creation, documentation, and implementation of policies, procedures, and guidelines. Administration techniques that include data categorization and risk assessment can be utilized to identify potential attacks, classify assets, and evaluate security vulnerabilities so that effective controls can be put in place.
Security Architecture and Paradigms
This involves the principles, structures, and guidelines used to design, track, and secure OS platforms, hardware, networks, and application software plus the tools utilized to enforce various degrees of robustness, consistency, and confidentiality.
Access Management Systems and Methodology
Access controls are a set of technologies that operate together to build a security infrastructure to protect the assets of the information system.
Software Development Security
This addresses the important security concepts related to software development. Software development security outlines the environment where software is planned and produced and elucidates the critical part application software plays in ensuring information network protection.
Operations security has to do with identifying the management of hardware, media, and the technicians and managers with access privileges to any of these assets. Audit and monitoring are the mechanisms and techniques that allow the awareness of security-related activity and consequent actions to discover the essential factors and convey the associated data to the designated person, team, or process.
Site security addresses protection techniques for the whole physical facility, from the perimeter to the inside office space, including all of the IT network resources.
Data Encryption involves the concepts, techniques, and processes of disguising information to ensure its consistency, privacy, and authenticity.
Telecom, LAN and Internet Security
This area concerns:
- Network Structures
- Transmission mechanisms
- Transport formats
- Security measures used to ensure availability, consistency, and confidentiality
- Verification for transmissions over private and public communications networks and media.
Disaster Recovery Preparedness
The Business Continuity Plan (BCP) covers the preservation and restoration of business operations in the event of outages.
Law, Investigation and Ethics
- Computer crime laws
- The procedures followed and mechanisms used to investigate computer crime activity
For security consulting expertise, call Progent at 800-993-9400 or visit Contact Progent.
Progent's Microsoft, Cisco, and Applications Expertise
Progent's Microsoft and Cisco authorized consultants offer clients in the , Silicon Valley, and in cities throughout the U.S a wide range of expertise covering the basic information technology requirements shared by typical small business networks. Progent's core services include network support, MS Exchange consulting, IT security support and Help Desk outsourcing and staffing. Progent's Experts Group offers in-depth expertise in strategic application areas. By offering a one-stop source for information technology generalists and specialists, Progent is able to deliver fast, cost-effective and thorough IT solutions that address the special requirements of your business.