Security
Users on the go, information on machines, on premises and in the cloud, being accessed from a variety of devices. Cybersecurity is not separated from other technology segments, it has to be woven into everything you do to deliver a thoughtful, layered approach to security that is commensurate with your specific organizational risk and compliance requirements. PTP has the right answers at the right cost.
Security
Users on the go, information on machines, on premises and in the cloud, being accessed from a variety of devices. Cyberecurity is not separated from other technology segments, it has to be woven into everything you do to deliver a thoughtful, layered approach to security that is commensurate with your specific organizational risk and compliance requirements. PTP has the right answers at the right cost.
Security Services
PTP’s services and solutions address data security needs across the spectrum of cyber security needs. We align with the NIST Framework which defines critical security policies and practices to IDENTIFY data, PROTECT the environment, DETECT possible threats, RESPOND to security events, and RECOVER from incidents.
Security Resources
Cloud/Data Security – The Need to Prioritize
The narrative around data protection and security services is consistent and is seemingly everywhere you turn. More advisories, more complex and covert attacks, increasing demands on internal IT, lack of skilled people, applications in the cloud, SaaS apps, and legacy...
PTP Achieves Cisco Umbrella Authorization for Managed Security Service Provider
Pinnacle Technology Partners (PTP) expands the offerings of its PeakPlus SECURE services through its authorization from Cisco for Umbrella for Managed Security Service Provider. This authorization recognizes Cisco Partners that have mature Managed Security Services...
Protecting Your Network from the Latest WPA1/WPA2-PSK Vulnerability
There is a new tool available in the Meraki dashboard to assess if your network is impacted. On August 4, 2018, a new method to exploit a known vulnerability was announced by Jens Steube from the Hashcat project for wireless networks that use WPA1/WPA2-PSK (pre-shared...
Meraki MR + Umbrella: A Match Made In the Cloud
Meraki APs now integrate with Cisco Umbrella, the industry’s first Secure Internet Gateway, to protect wireless clients from malicious online threats. The pace at which new security threats are being introduced and propagated online has reached exponential levels,...
A Personal Attack
Have you recently received an email with one of your actual passwords in the subject line? There is a new email attack circulating where the scammers claim they stole your password and hijacked your webcam. Your password was most likely found in one of the many...
MSP Metrics – Most Are Missing the Point
I'm a middle-aged husband and father of three daughters. I have fond memories of the baby and toddler days, and am amazed we were able to muster the energy to persevere through them! When the girls were young some of the most exciting days were the doctor appointments...
Network Security Challenge: Put Your Security Visibility to the Test
The security landscape changes at such a rapid pace that it’s nearly impossible for security, IT or business leaders to stay on top, let alone ahead, of the latest threats and how they can best protect their sensitive data.The most dangerous threats are the ones you...
Where Managed Services Works … and Where It Doesn’t
Commonly attributed to Benjamin Franklin, the quote "...nothing in this world can be said to be certain but death and taxes..." seems more true everyday, and—just having gone through federal tax filing—it’s more painful than ever! Interestingly though, we love to...
The Service Provider Value Exchange: Why I Fired My “LaaS”
In order for any “As A Service” offering to be successful, the provider of the service must be able to demonstrate that they are adding value for the recurring fees they charge. It is a matter of a fair value exchange. If the perception is that the value being...
How to Extend the Value of a SIEM–InfoSec Southwest Austin
If you are in the Austin area, please join Pinnacle Technology Partners at InfoSec Southwest in Austin from 4/11 - 4/13. I'll be presenting and demonstrating how to extend the value of a Security Information Event Manager (SIEM) through the receipt of traditional and...
Talk to an AWS expert today!
Talk to us about your technology challenges and let’s develop solutions that will significantly streamline your IT operations and reduce your costs. Schedule a call now!
Email Us
Email us using the form below and we will respond as soon as possible.