By: Rich Hauke, CISSP Security vendors are everywhere, coming out of the woodwork. A fast growing segment of IT will yield significant investment from VCs looking to identify a rising star that has an angle on data protection that will be valuable to the market. The...
Challenges Clients were increasingly spinning up workloads and resources in the cloud and on-premises. PTP really needed visibility and to “keep their eyes on the ball” to make sure they understood what was in their customers’ environments and how everything was...
by Gary Derheim What’s Inside What is Cloud Cost Optimization? What Discounts are Available in the Cloud? Which Cloud Discount is Right? “Hidden” Costs of the Operating in the Cloud? Does Scalability have anything to do with Clous Cost Optimization?...
by Gary Derheim What’s Inside Improper S3 Permissions Lack of Encryption IAM Users Direct Permissions Accidental Public AMI’s Improperly Configured Cloudtrail Logging on All S3 Buckets IP Address Ranges in VPC Improper NACL Traffic Configuration Why Are...
Typical conversations with clients around data security include the simple desire to not be breached of sensitive information and a discussion around what security protection technologies and practices are in place. For our biotechnology growth company customer base,...
In Life Sciences and running or considering running genomics workloads? Do not overlook the power of AWS High Performance Compute (HPC). As an AWS Advanced Consulting Partner with the Life Sciences Competency, the team at PTP comes across numerous biotech firms...