Security
Users on the go, information on machines, on premises and in the cloud, being accessed from a variety of devices. Cybersecurity is not separated from other technology segments, it has to be woven into everything you do to deliver a thoughtful, layered approach to security that is commensurate with your specific organizational risk and compliance requirements. PTP has the right answers at the right cost.
Security
Users on the go, information on machines, on premises and in the cloud, being accessed from a variety of devices. Cyberecurity is not separated from other technology segments, it has to be woven into everything you do to deliver a thoughtful, layered approach to security that is commensurate with your specific organizational risk and compliance requirements. PTP has the right answers at the right cost.
Security Services
PTP’s services and solutions address data security needs across the spectrum of cyber security needs. We align with the NIST Framework which defines critical security policies and practices to IDENTIFY data, PROTECT the environment, DETECT possible threats, RESPOND to security events, and RECOVER from incidents.
Security Resources
The Fallacy of the 24×7 SOC
The security industry has trained customers to ask for and talk about the 24x7 Security Operations Center (SOC). For the majority of organizations, that's barking up the wrong tree.
Meraki Advanced Security Feature Set vs. Enterprise Licensing
"What is the value of Cisco Meraki Advanced Security Feature Set vs. Enterprise Licensing?"This is a question that comes up frequently in discussions with customers. When deciding whether or not to pay for the advanced feature set, you need to understand what the...
How to Conduct Cyber Security Threat Hunting via the MITRE ATT&CK Knowledge Base
Authored by PTP's Rich Hauke, CISSP and Steve Hoevenaar, CISSP While working with our customers to cost effectively address key risks and to make sense of the security threat landscape, PTP leverages the NIST Cybersecurity Framework. PTP utilizes this framework to...
Secure Architecture for AWS
Cisco AWS Security Panel Discussion
Meraki Security + DNS Security for Remote Office Workers
In the new and crazy working world of constant remote connectivity, companies are scrambling to get their VPN solutions working to support all their users and keep the same level security on their corporate networks. With the Cisco Meraki solution, the smaller MX...
Free Security Trials You Should Take Advantage Of!
Imagine if you could take a car off the dealer's lot and drive it around for a couple weeks, for free, before you have to commit to purchasing it. See how it handles. See how it performs. See how it fits in your garage. The word "free" is seldom associated with...
Decoding the NIST Cybersecurity Framework with AWS
IDENTIFY > PROTECT > DETECT > RESPOND > RECOVER. These are the five key functions of the NIST Cybersecurity Framework. At PTP, we leverage the Framework as a vehicle to discuss the layered approach to security with our growing Amazon Web Services (AWS)...
Leveraging AWS and DevOps to Improve Security Tools and Customer Outcomes
One of the numerous advantages we have within the PTP PeakPlus team is our ability to customize, automate, and expand security services that, in some cases, even the security vendor is unable to provide. Our customer needed a replacement for Cisco Cloud Web Security...
Capital One Breach Reaction: You Can Secure Data in AWS!
The recent announcement on the Capital One breach that affected over 100 million people (good detail from Krebs on Security here) is compelling for a number of reasons. One, it was related to data on the Amazon Web Services (AWS) cloud, which cloud nay-sayers will use...
Why PTP Chose FLUENCY for Security Detection for our Life Sciences and Healthcare Customers
We based our business in the Greater Boston area to focus on delivering high-growth and secure cloud computing for biotechnology and life sciences companies, where Boston is the #1 city in the US in both biotech jobs and square footage of office/lab space. Our charter...
Talk to an AWS expert today!
Talk to us about your technology challenges and let’s develop solutions that will significantly streamline your IT operations and reduce your costs. Schedule a call now!
Email Us
Email us using the form below and we will respond as soon as possible.