Authored by PTP’s Rich Hauke, CISSP and Steve Hoevenaar, CISSP While working with our customers to cost effectively address key risks and to make sense of the security threat landscape, PTP leverages the NIST Cybersecurity Framework. PTP utilizes this framework...
In the new and crazy working world of constant remote connectivity, companies are scrambling to get their VPN solutions working to support all their users and keep the same level security on their corporate networks. With the Cisco Meraki solution, the smaller MX...
Imagine if you could take a car off the dealer’s lot and drive it around for a couple weeks, for free, before you have to commit to purchasing it. See how it handles. See how it performs. See how it fits in your garage. The word “free” is seldom...
IDENTIFY > PROTECT > DETECT > RESPOND > RECOVER. These are the five key functions of the NIST Cybersecurity Framework. At PTP, we leverage the Framework as a vehicle to discuss the layered approach to security with our growing Amazon Web Services (AWS)...
One of the numerous advantages we have within the PTP PeakPlus team is our ability to customize, automate, and expand security services that, in some cases, even the security vendor is unable to provide. Our customer needed a replacement for Cisco Cloud Web Security...