CISSP-ISSAP Certification
The CISSP-ISSAP credential demonstrates mastery of the most rigorous requirements for information security architecture. An ISSAP certified consultant must be a CISSP in good standing, pass the ISSAP examination, and demonstrate two years of professional experience in the area of security architecture. ISSAP consultants have in-depth knowledge of access control systems and methodologies, telecommunications and network security, cryptography, requirements analysis, business continuity and disaster recovery planning, and physical security integration. The Information System Security Architecture Professional (ISSAP) Certification indicates proven competence in the more in-depth requirements of information security architecture, within the broader scope of information security knowledge required for CISSP certification.
Progent's CISSP-ISSAP-certified consultants are CISSP-certified cybersecurity experts at the top of their fields. Areas where Progent's CISSP-ISSAP consultants can providing advanced security consulting expertise include:
Access Control Systems and Methodology
The Access Control Systems and Methodology area covers the critical requirements to establish comprehensive and effective access control restrictions for an organization. Access control protects systems, data, physical infrastructure and personnel in order to maintain data integrity, availability and confidentiality.
Failure to design, develop, maintain and enforce access control can leave your company exposed to security breaches initiated locally or remotely. Progent's ISSAP-certified consultants understand the types of controls that are available, their underlying technologies, and the principles of access control.
ISSAP consultants can apply both the hard and soft aspects of access control including controls provided through physical controls policy, organizational structure, and security technology. All Progent's ISSAP consultants follow the principles of industry best practices in designing access controls.
Telecommunications and Network Security
The area of Telecommunications and Network Security addresses the security concerns associated with the crucial role of telecommunications and networks in distributed computing environments. Progent's ISSAP-certified consultants are familiar with the risks to communications networks whether data, voice, or multimedia. This includes understanding communications processes and protocols, threats and countermeasures, support for organizational growth and operations, and the ability to design, implement, and monitor secure network architectures.
Cryptography
ISSAP-certified professionals understand cryptographic methodologies and the use of cryptography to protect an organization's data storage and communications from compromise or misuse. This includes awareness of the threats to an organization's cryptographic infrastructure. Progent's ISSAP security experts can help companies choose, implement, and monitor cryptographic products and adopt corporate cryptographic standards and policy. This can entail oversight of digital signatures and PKI implementations and a secure manner of addressing the issues and risks associated with managing cryptographic keys.
Requirements Analysis and Security Standards, Guidelines, Criteria
A secure information systems architecture relies on careful attention to standards. awareness of threats, and identification of the risks and values of data. Progent's ISSAP security consultants know and follow industry best practices and standards for network and information systems design, and can help you implement a practical architecture that provides adequate security and resilience for business.
Technology Related Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)
Business Continuity and Disaster Recovery involves the identification of adverse events that could threaten the ability of organizations to continue normal operations. Progent's ISSAP security experts can help your business identify risks and implement countermeasures to reduce the likelihood of these incidents occurring. Progent's ISSAP-certified consultants can also help you design and develop realistic business continuity plans that will meet the operational requirements of your company by planning for the provisioning of appropriate recovery solutions.
Physical Security Integration
Physical security and personnel controls are critical in a complete information system security model. Progent's ISSAP security specialists understand the risks and tools used in providing physical security. These include secure management, administration, and deployment of physical access controls to prevent, detect, or react to suspicious activity.
Other Security Credentials Held by Progent's Consultants
In addition to offering the services of security specialists with ISSAP Network Security Architecture certification, Progent can also provide your business with access to CISM-certified security management consultants, CISSP-certified cybersecurity experts, CISA-certified network audit professionals, GIAC-certified information assurance specialists, and CRISC-certified risk management consultants.
Contact Progent for Access to an ISSAP-certified Security Architecture Professional
If you're looking for security consulting, telephone Progent at
Ransomware 24x7 Hot Line: Call 800-462-8800
Progent's Ransomware 24x7 Hot Line is designed to assist you to carry out the time-critical first step in responding to a ransomware attack by stopping the bleeding. Progent's online ransomware expert can assist you to identify and isolate infected servers and endpoints and protect undamaged resources from being compromised. If your network has been breached by any strain of ransomware, act fast. Get immediate help by calling Progent's Ransomware Hot Line at 800-462-8800. For more information, see Progent's Ransomware 24x7 Hot Line.