If you have a multi-platform environment that combines UNIX and Microsoft servers, Progent can offer security support by providing a CISSP-certified network expert to help your entire business in a broad set of security areas. CISSP Certification recognizes expertise with an international standard for network security. ANSI (American National Standards Institute) has granted the CISSP credential accreditation in the area of data security under ISO/IEC 17024. Progent can provide a CISSP-certified professional to help your enterprise in a broad range of security areas such as:
Security Management Practices
Security management entails the determination of a company's information assets and the creation, recording, and implementation of policies, procedures, and guidelines. Administration techniques such as information classification and threat analysis can be used to determine possible threats, categorize valuable data, and evaluate security weaknesses so that effective measures can be put in place.
Security Infrastructure and Paradigms
This concerns the principles, framework, and guidelines followed to design, monitor, and protect operating systems, hardware, networks, and applications as well as the controls used to police different levels of robustness, consistency, and privacy.
Access Control Solutions and Processes
Access controls are a set of technologies that work together to build a security architecture to protect the high-value data of the IT network.
Software Development Security
This involves the important security concepts that apply to software development. Applications development security outlines the environment where programs are planned and developed and explains the critical part software has in providing IT system security.
Operations Security
This concerns identifying the controls over hardware, data storage, and the technicians and administrators with access privileges to any of these assets. Audit and monitoring are the mechanisms and facilities that permit the identification of security-related events and consequent efforts to identify the key elements and convey the associated data to the designated person, group, or mechanism.
Physical Security
Physical security provides protection mechanisms for the entire facility, from the perimeter to the desk, including all of the IT system resources.
Cryptography
Data Encryption involves the concepts, techniques, and methods of disguising information to ensure its integrity, confidentiality, and legitimacy.
Telecom, Network and WAN Security
This area has to do with:
Business Continuity Preparedness
This covers the preservation and recovery of commercial activity after network disruptions.
Law, Investigation and Ethics
This concerns:
To get access to security consulting expertise for Solaris environments, call Progent at
Progent's Expertise for UNIX-family Systems
Progent's UNIX consulting experts offer small businesses and developers help with administering and maintaining UNIX/Linux/Mac-based systems that may operate alongside Microsoft-based environments. Progent provides your business contact with UNIX support experts, authorized Microsoft consultants, Cisco-certified CCIEs, and security experts certified by CISSP. This wide array of knowledge gives you a readily available single source to help you to create and support a safe and robust multi-vendor network and communications solution that blends Windows with popular derivatives of UNIX such as:
Apple macOS and OS X ,
Sun Solaris,
IBM AIX,
HP-UX (Hewlett Packard UNIX),
BSD,
SCO UNIX and
SGI/Irix or important Linux distributions including
RedHat Linux,
SUSE,
Debian GNU/Linux and
CentOS,
Ubuntu Linux,
Mandriva Linux,
PCLlinuxOS Linux,
fedora Linux, and
Gentoo.