If you run a multi-OS environment with UNIX and Windows technology, Progent can offer security support by giving you access to a CISSP-certified IT consultant to help your entire business in a broad range of security areas. CISSP Certification recognizes expertise with an international standard for data security. ANSI (American National Standards Institute) has awarded the CISSP credential accreditation in the field of data security under ISO/IEC 17024. Progent can give you access to a CISSP-certified consultant to help your business in a variety security areas including:
- Security Management Procedures
- Security Infrastructure and Models
- Access Management Solutions and Processes
- Applications Development Security
- Operations Security
- Site Security
- Telecom, LAN and WAN Security
- Business Continuity Planning
- Crime Law, Investigation and Ethics
Security Administration Procedures
Security management entails the identification of an organization's high-value data and the creation, recording, and carrying out of policies, procedures, and guidelines. Management tools that include information classification and threat assessment can be used to determine potential attacks, categorize valuable data, and evaluate system vulnerabilities so that effective controls can be implemented.
Security Infrastructure and Models
This covers the concepts, framework, and standards used to build, track, and protect operating systems, hardware, networks, and applications as well as the controls utilized to police different levels of availability, consistency, and confidentiality.
Access Control Solutions and Processes
Access management systems are a collection of mechanisms that operate in unison to build a security architecture to guard the high-value data of the IT system.
Software Development Security
This covers the key security concepts that apply to application software development. Applications development security outlines the circumstances where programs are designed and developed and explains the vital part software plays in providing IT system security.
This involves determining the management of hardware, data storage, and the operators and administrators with access rights to these resources. Audit and monitoring are the tools and techniques that permit the awareness of security-relevant events and subsequent actions to identify the essential elements and report the associated information to the designated person, team, or mechanism.
Physical security provides security techniques for the whole facility, from the outside perimeter to the desk, including all of the IT system assets.
Cryptography covers the concepts, means, and methods of cloaking information to ensure its integrity, privacy, and authenticity.
Telecommunications, LAN and WAN Security
This area has to do with:
- Network Infrastructure
- Transmission methods
- Transport protocols
- Security measures used to provide reliability, consistency, and confidentiality
- Validation for transmissions over private and public networks and media.
Business Continuity Preparedness
The Business Continuity Plan addresses the protection and recovery of commercial operations in the event of outages.
Crime Law, Investigation and Ethics
- Computer crime regulations
- The procedures taken and mechanisms utilized to solve computer crime activity
For security consulting expertise, call Progent at 800-993-9400 or visit Contact Progent.
Progent's Microsoft, Cisco, and Applications Expertise
Progent's Microsoft and Cisco certified consultants offer businesses in San Francisco, San Jose, and in cities across the United States a wide range of knowledge covering the basic information technology needs common to most small and mid-size business environments. Progent's primary services include network integration, MS Exchange consulting, IT security consulting and HelpDesk outsourcing and staffing. Progent's Application Experts Group offers in-depth expertise in key application topics. By providing a single source for information technology generalists and specialists, Progent can tailor quick, economical and thorough network solutions that fit the unique requirements of your company.