Security

Users on the go, information on machines, on premises and in the cloud, being accessed from a variety of devices. Security is not separated from other technology segments, it has to be woven into everything you do to deliver a thoughtful, layered approach to security that is commensurate with your specific organizational risk and compliance requirements. PTP has answers.
Free Security Assessment

Security

Users on the go, information on machines, on premises and in the cloud, being accessed from a variety of devices. Security is not separated from other technology segments, it has to be woven into everything you do to deliver a thoughtful, layered approach to security that is commensurate with your specific organizational risk and compliance requirements. PTP has answers.
Free Security Assessment

Security Services

PTP’s services and solutions address data security needs across the spectrum of cyber security needs. We align with the NIST Framework which defines critical security policies and practices to IDENTIFY data, PROTECT the environment, DETECT possible threats, RESPOND to security events, and RECOVER from incidents.

Security Assessments

Cloud Security

Security Infrastructure

Managed Security

Security Resources

Secured Cloud Services Case Study: Cisco ASAv + AWS

PTP has recently worked with three of our clients on initiatives to deploy the Cisco Adaptive Security Virtual Appliance (ASAv) into their Cloud environments to allow for the secure migration of on-premises workloads as well as encrypted VPN connectivity to their...

read more

The Fallacy of the 24×7 SOC

The security industry has trained customers to ask for and talk about the 24x7 Security Operations Center (SOC). For the majority of organizations, that's barking up the wrong tree.

read more

Meraki Security + DNS Security for Remote Office Workers

In the new and crazy working world of constant remote connectivity, companies are scrambling to get their VPN solutions working to support all their users and keep the same level security on their corporate networks. With the Cisco Meraki solution, the smaller MX...

read more

Free Security Trials You Should Take Advantage Of!

Imagine if you could take a car off the dealer's lot and drive it around for a couple weeks, for free, before you have to commit to purchasing it. See how it handles. See how it performs. See how it fits in your garage. The word "free" is seldom associated with...

read more

Decoding the NIST Cybersecurity Framework with AWS

IDENTIFY > PROTECT > DETECT > RESPOND > RECOVER. These are the five key functions of the NIST Cybersecurity Framework. At PTP, we leverage the Framework as a vehicle to discuss the layered approach to security with our growing Amazon Web Services (AWS)...

read more

Email Us

Email us using the link below and we will respond as soon as possible.

Get our latest news right away!

You have Successfully Subscribed!