Security

Users on the go, information on machines, on premises and in the cloud, being accessed from a variety of devices. Cybersecurity is not separated from other technology segments, it has to be woven into everything you do to deliver a thoughtful, layered approach to security that is commensurate with your specific organizational risk and compliance requirements. PTP has the right answers at the right cost.

50% Off Security Assessment

Security

Users on the go, information on machines, on premises and in the cloud, being accessed from a variety of devices. Cyberecurity is not separated from other technology segments, it has to be woven into everything you do to deliver a thoughtful, layered approach to security that is commensurate with your specific organizational risk and compliance requirements. PTP has the right answers at the right cost.

50% Off Security Assessment

Security Services

PTP’s services and solutions address data security needs across the spectrum of cyber security needs. We align with the NIST Framework which defines critical security policies and practices to IDENTIFY data, PROTECT the environment, DETECT possible threats, RESPOND to security events, and RECOVER from incidents.

Security Assessments

Cloud Security

Security Infrastructure

Managed Security

Security Resources

SOAR based Security Monitoring

By: Rich Hauke, CISSP Security vendors are everywhere, coming out of the woodwork.  A fast growing segment of IT will yield significant investment from VCs looking to identify a rising star that has an angle on data protection that will be valuable to the market.  The...

read more

Managed Detection and Response (MDR) On-Demand Webinar

Now available on-demand, our deep-dive panel discussion with security industry experts reviewed how PTP’s Managed Detection and Response service, powered by Fluency Security and SentinelOne technologies, provides the security protection and detection growing companies...

read more

8 Common AWS Security Mistakes and How to Fix Them

by Gary DerheimWhat's Inside Improper S3 Permissions Lack of Encryption IAM Users Direct Permissions Accidental Public AMI's Improperly Configured Cloudtrail Logging on All S3 Buckets IP Address Ranges in VPC Improper NACL Traffic Configuration Why Are These AWS...

read more

Crafting a Plan to Combat Ransomware

Originally broadcast Thursday, August 19, 2021, PTP led a panel of experts to discuss Crafting a Plan to Combat Ransomware.  Moderated by Gary Derheim of PTP, the panel included Chris Jordan of Fluency Security, Adam Johnson and Kirby Kaylor from Carbonite, and Rick...

read more

MFA from Duo – What’s new in Version 4.0!

With 81% of breaches using weak or stolen passwords and the fact that we have been using passwords as the primary method of application authentication for over 60 years, it's no wonder why so many are turning to Multi-Factor Authentication or MFA.  PTP's preferred...

read more

Secured Cloud Services Case Study: Cisco ASAv + AWS

PTP has recently worked with three of our clients on initiatives to deploy the Cisco Adaptive Security Virtual Appliance (ASAv) into their Cloud environments to allow for the secure migration of on-premises workloads as well as encrypted VPN connectivity to their...

read more

The Fallacy of the 24×7 SOC

The security industry has trained customers to ask for and talk about the 24x7 Security Operations Center (SOC). For the majority of organizations, that's barking up the wrong tree.

read more

Get our latest news right away!

You have Successfully Subscribed!

X
X