by PTPstaff | Feb 27, 2018 | Cloud, Cloud Migration, Managed Network, Managed Services, Networking
It’s remarkable the changes in both equipment and performance in the Winter Olympics over the last 20-30 years. The skis, the sleds, the improvement in skating difficultly, and the numerous new events just to name a few. Juxtapose that with the classic Olympics events...
by PTPstaff | Feb 24, 2018 | AWS, Cloud, Cloud Management & Optimization, Cloud Security, Managed Security, Managed Services
We’ve got clients in all stages of cloud adoption, from the nascent migrators to the “we’re all ins.” Each stage of the journey has its own challenges, and our job is to engineer solutions for each client, at each stage. The final stage in the cloud journey (if there...
by PTPstaff | Feb 4, 2018 | Managed Security, Managed Services, Security
Technology, much like a new car, needs to be test-driven and vetted before you commit. So, we took Fluency for a spin and did the comps. And it came out a winner in our book. A large number of our customers still have simple protection technologies in place, but have...
by PTPstaff | Jan 15, 2018 | Cloud Engineering & Staffing, Managed Security, Managed Services, Security
This past year, we saw an accelerated sophistication of high profile security threats, a proliferation of new vendors, an increasing shortage of IT skills, and a pace of innovation in the Cloud that is exceeding many organizations’ abilities to keep up. What’s in...
by PTPstaff | Jan 15, 2018 | Managed Security, Managed Services, Networking, News, Security
wo processor vulnerabilities are currently in the news, and here’s a summary on the vulnerabilities and how customers may be affected, in addition to how Pinnacle’s threat hunting services detect and mitigate risks in these exploits. In a nutshell:Meltdown allows a...
by PTPstaff | Dec 2, 2017 | Cloud Security, Managed Security, Managed Services, Security
A very large percentage of security breaches are caused by human error. HUMANS are the weakest security link in today’s technology infrastructure. That said (and perhaps ironically), best security practices require continual human examination and intervention, even...