Careers at PTP
Join our team! Email us at info@ptp.cloud with your resume and we will respond as soon as possible.
Containing the Cost of the Cloud
We’ve got clients in all stages of cloud adoption, from the nascent migrators to the “we’re all ins.” Each stage of the journey has its own challenges, and our job is to engineer solutions for each client, at each stage. The final stage in the cloud journey (if there...
Test-driving the Fluency Platform
Technology, much like a new car, needs to be test-driven and vetted before you commit. So, we took Fluency for a spin and did the comps. And it came out a winner in our book. A large number of our customers still have simple protection technologies in place, but have...
Cisco Adaptive Security Appliance Remote Code Execution and Denial of Service Vulnerability
A vulnerability in the Secure Sockets Layer (SSL) VPN functionality of the Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to cause a reload of the affected system or to remotely execute code. The vulnerability is due...
PTP Gives Back: Christmas Delivery
Two families in need. Dozens of happy smiles. Thanks to the efforts of some really hard-working PTP "elves," Santa delivered over 60 gifts to two families in need this holiday. Partnering with St. Vincent de Paul in Cincinnati, the effort brought as much joy to the...
7 Fundamental Discussions To Have In 2018
This past year, we saw an accelerated sophistication of high profile security threats, a proliferation of new vendors, an increasing shortage of IT skills, and a pace of innovation in the Cloud that is exceeding many organizations’ abilities to keep up. What’s in...
Meltdown and Spectre Vulnerabilities, and How You Can Spot Them
wo processor vulnerabilities are currently in the news, and here’s a summary on the vulnerabilities and how customers may be affected, in addition to how Pinnacle’s threat hunting services detect and mitigate risks in these exploits. In a nutshell:Meltdown allows a...
Cybersecurity and the “Human Factor”
A very large percentage of security breaches are caused by human error. HUMANS are the weakest security link in today’s technology infrastructure. That said (and perhaps ironically), best security practices require continual human examination and intervention, even...
Join our team! Email us at info@ptp.cloud with your resume and we will respond as soon as possible.