Security

Users on the go, information on machines, on premises and in the cloud, being accessed from a variety of devices. Cybersecurity is not separated from other technology segments, it has to be woven into everything you do to deliver a thoughtful, layered approach to security that is commensurate with your specific organizational risk and compliance requirements. PTP has the right answers at the right cost.

50% Off Security Assessment

Security

Users on the go, information on machines, on premises and in the cloud, being accessed from a variety of devices. Cyberecurity is not separated from other technology segments, it has to be woven into everything you do to deliver a thoughtful, layered approach to security that is commensurate with your specific organizational risk and compliance requirements. PTP has the right answers at the right cost.

50% Off Security Assessment

Security Services

PTP’s services and solutions address data security needs across the spectrum of cyber security needs. We align with the NIST Framework which defines critical security policies and practices to IDENTIFY data, PROTECT the environment, DETECT possible threats, RESPOND to security events, and RECOVER from incidents.

Security Assessments

Cloud Security

Security Infrastructure

Managed Security

Security Resources

The Fallacy of the 24×7 SOC

The security industry has trained customers to ask for and talk about the 24x7 Security Operations Center (SOC). For the majority of organizations, that's barking up the wrong tree.

read more

Meraki Security + DNS Security for Remote Office Workers

In the new and crazy working world of constant remote connectivity, companies are scrambling to get their VPN solutions working to support all their users and keep the same level security on their corporate networks. With the Cisco Meraki solution, the smaller MX...

read more

Free Security Trials You Should Take Advantage Of!

Imagine if you could take a car off the dealer's lot and drive it around for a couple weeks, for free, before you have to commit to purchasing it. See how it handles. See how it performs. See how it fits in your garage. The word "free" is seldom associated with...

read more

Decoding the NIST Cybersecurity Framework with AWS

IDENTIFY > PROTECT > DETECT > RESPOND > RECOVER. These are the five key functions of the NIST Cybersecurity Framework. At PTP, we leverage the Framework as a vehicle to discuss the layered approach to security with our growing Amazon Web Services (AWS)...

read more

Capital One Breach Reaction: You Can Secure Data in AWS!

The recent announcement on the Capital One breach that affected over 100 million people (good detail from Krebs on Security here) is compelling for a number of reasons. One, it was related to data on the Amazon Web Services (AWS) cloud, which cloud nay-sayers will use...

read more

Get our latest news right away!

You have Successfully Subscribed!