If you have a multi-OS environment that combines UNIX and Microsoft servers, Progent can offer security support by giving you access to a CISSP-certified IT professional to assist your entire business in an extensive range of security areas. CISSP Certification recognizes expertise with an international standard for data security. ANSI (American National Standards Institute) has granted the CISSP credential accreditation in the area of information security under ISO/IEC 17024. Progent can provide a CISSP-certified consultant to help your enterprise in a broad range of security areas including:
- Security Management Procedures
- Security Infrastructure and Paradigms
- Access Control Solutions and Processes
- Software Development Security
- Operations Security
- Physical Security
- Telecom, Network and WAN Security
- Disaster Recovery Preparedness
- Law, Investigation and Ethics
Security Administration Practices
Security management involves the identification of a company's high-value data and the creation, recording, and execution of policies, operations, and guidelines. Administration techniques that include data classification and risk assessment can be used to determine possible attacks, categorize valuable data, and evaluate security weaknesses so that appropriate measures can be implemented.
Security Architecture and Models
This covers the concepts, framework, and standards followed to design, monitor, and secure OS platforms, equipment, networks, and application software plus the controls used to enforce various levels of robustness, integrity, and privacy.
Access Management Systems and Processes
Access management systems are a collection of technologies that work in unison to build a security infrastructure to guard the assets of the IT system.
Software Development Security
This involves the important security concepts related to application development. Application software development security outlines the circumstances where software is planned and developed and explains the vital part software has in providing IT system security.
This has to do with identifying the management of equipment, media, and the technicians and administrators with access rights to these assets. Audit and tracking are the mechanisms and facilities that allow the identification of security-related events and subsequent efforts to discover the key factors and convey the pertinent data to the designated person, group, or mechanism.
Physical security addresses security techniques for the entire physical facility, from the outside perimeter to the desk, including all of the information network assets.
Cryptography covers the principles, means, and processes of cloaking data to preserve its integrity, confidentiality, and authenticity.
Telecommunications, LAN and WAN Security
This area involves:
- Network Structures
- Transmission methods
- Transport formats
- Security techniques implemented to provide availability, consistency, and confidentiality
- Validation for transmissions over private and public networks and media.
Disaster Recovery Planning
This addresses the preservation and restoration of business activity after outages.
Law, Investigation and Ethics
This has to do with:
- Computer crime regulations
- The procedures followed and mechanisms utilized to investigate computer crime incidents
For security consulting expertise, call Progent at 800-993-9400 or visit Contact Progent.
Progent's Microsoft, Cisco, and Applications Expertise
Progent's Microsoft and Cisco certified consultants provide customers in San Francisco, , and in cities across the United States a wide array of expertise concerning the basic information technology needs shared by typical small business environments. Progent's core services include system integration, MS Exchange help, IT security consulting and HelpDesk outsourcing and support. Progent's Experts Group offers deep expertise in specific application areas. By providing a single source for information technology generalists and specialists, Progent is able to tailor fast, affordable and complete network solutions that address the special requirements of your organization.