Security

Users on the go, information on machines, on premises and in the cloud, being accessed from a variety of devices. Cybersecurity is not separated from other technology segments, it has to be woven into everything you do to deliver a thoughtful, layered approach to security that is commensurate with your specific organizational risk and compliance requirements. PTP has the right answers at the right cost.

50% Off Security Assessment

Security

Users on the go, information on machines, on premises and in the cloud, being accessed from a variety of devices. Cyberecurity is not separated from other technology segments, it has to be woven into everything you do to deliver a thoughtful, layered approach to security that is commensurate with your specific organizational risk and compliance requirements. PTP has the right answers at the right cost.

50% Off Security Assessment

Security Services

PTP’s services and solutions address data security needs across the spectrum of cyber security needs. We align with the NIST Framework which defines critical security policies and practices to IDENTIFY data, PROTECT the environment, DETECT possible threats, RESPOND to security events, and RECOVER from incidents.

Security Assessments

Cloud Security

Security Infrastructure

Managed Security

Security Resources

MFA from Duo – What’s new in Version 4.0!

With 81% of breaches using weak or stolen passwords and the fact that we have been using passwords as the primary method of application authentication for over 60 years, it's no wonder why so many are turning to Multi-Factor Authentication or MFA.  PTP's preferred...

read more

Secured Cloud Services Case Study: Cisco ASAv + AWS

PTP has recently worked with three of our clients on initiatives to deploy the Cisco Adaptive Security Virtual Appliance (ASAv) into their Cloud environments to allow for the secure migration of on-premises workloads as well as encrypted VPN connectivity to their...

read more

The Fallacy of the 24×7 SOC

The security industry has trained customers to ask for and talk about the 24x7 Security Operations Center (SOC). For the majority of organizations, that's barking up the wrong tree.

read more

Meraki Security + DNS Security for Remote Office Workers

In the new and crazy working world of constant remote connectivity, companies are scrambling to get their VPN solutions working to support all their users and keep the same level security on their corporate networks. With the Cisco Meraki solution, the smaller MX...

read more

Free Security Trials You Should Take Advantage Of!

Imagine if you could take a car off the dealer's lot and drive it around for a couple weeks, for free, before you have to commit to purchasing it. See how it handles. See how it performs. See how it fits in your garage. The word "free" is seldom associated with...

read more

Decoding the NIST Cybersecurity Framework with AWS

IDENTIFY > PROTECT > DETECT > RESPOND > RECOVER. These are the five key functions of the NIST Cybersecurity Framework. At PTP, we leverage the Framework as a vehicle to discuss the layered approach to security with our growing Amazon Web Services (AWS)...

read more

Get our latest news right away!

You have Successfully Subscribed!

X
X