If you run a mixed-platform network with UNIX and Microsoft servers, Progent can offer security support by giving you access to a CISSP-certified IT consultant to assist your entire business in an extensive range of security concerns. CISSP Certification denotes expertise with an international standard for data security. ANSI (American National Standards Institute) has granted the CISSP credential accreditation in the area of information security under ISO/IEC 17024. Progent can provide a CISSP-certified expert to help your company in a variety security areas including:
- Security Management Practices
- Security Infrastructure and Models
- Access Control Systems and Processes
- Software Development Security
- Operations Security
- Physical Security
- Data Encryption
- Telecommunications, Network and Internet Security
- Business Continuity Planning
- Crime Law, Investigation and Ethics
Security Management Practices
Security management entails the identification of a company's information assets and the creation, recording, and carrying out of policies, operations, and guidelines. Management techniques such as information classification and risk assessment can be used to identify possible attacks, classify assets, and evaluate system weaknesses so that appropriate measures can be implemented.
Security Infrastructure and Paradigms
This involves the concepts, framework, and standards used to design, track, and secure operating systems, equipment, networks, and application software plus the tools utilized to police different levels of availability, integrity, and confidentiality.
Access Management Systems and Processes
Access management systems are a collection of technologies that work cohesively to create a security architecture to guard the high-value data of the information system.
Applications Development Security
This covers the important security concepts related to application software development. Software development security defines the environment where programs are planned and produced and explains the critical role application software has in providing information system security.
This concerns identifying the management of equipment, data storage, and the operators and managers with access privileges to any of these assets. Audit and tracking are the tools and techniques that allow the identification of security-related activity and consequent efforts to discover the key elements and convey the pertinent data to the appropriate person, team, or process.
Site security addresses security mechanisms for the whole facility, from the perimeter to the desk, including all of the information system assets.
Data Encryption covers the principles, means, and methods of disguising data to ensure its consistency, confidentiality, and authenticity.
Telecom, LAN and WAN Security
This area concerns:
- Network Infrastructure
- Transmission mechanisms
- Transport formats
- Security measures used to ensure reliability, integrity, and confidentiality
- Authentication for transmissions over private and public communications networks and media.
Business Continuity Planning
The Business Continuity Plan covers the protection and restoration of commercial activity after network disruptions.
Law, Investigation and Ethics
This has to do with:
- Information system crime regulations
- The measures taken and mechanisms used to solve computer crime activity
For security consulting expertise, call Progent at 800-993-9400 or visit Contact Progent.
Progent's Microsoft, Cisco, and Applications Expertise
Progent's Microsoft and Cisco certified professionals provide businesses in San Francisco, Silicon Valley, and in cities throughout the U.S a wide range of expertise covering the fundamental information technology requirements common to typical small and mid-size business environments. Progent's primary services include system support, MS Exchange help, network security consulting and HelpDesk outsourcing and staffing. Progent's Experts Team offers in-depth knowledge of specific application areas. By offering a single source for information technology generalists and specialists, Progent can tailor speedy, cost-effective and complete IT solutions that fit the unique requirements of your business.