Learning Videos
Learning Videos
The Service Provider Value Exchange: Why I Fired My “LaaS”
In order for any “As A Service” offering to be successful, the provider of the service must be able to demonstrate that they are adding value for the recurring fees they charge. It is a matter of a fair value exchange. If the perception is that the value being...
Pinnacle Poised for Growth in Managed Security Services
Worldwide Spending on Security Solutions Forecast to Reach $91 Billion in 2018, According to a New IDC Spending Guide Managed security services (single-tenant solutions operated by third-party providers and residing on the customers' premises) will be the largest...
Why IT Specialists Add More Value Than Generalists
My (much smarter than I) wife of 23 years is a nurse in Cardiovascular (CV) surgery. From a medical layman like myself, that by itself sounds like a particular specialty. When we talk about the cases she does and the surgeons she works with, I quickly realize that...
More Users. More Apps. More Devices. Can Your WAN Keep Up?
Welcome to the digital era. Businesses are built on cloud-based applications. Mobility is the norm. And everything connects to the network. All of these demands are impacting existing wide area networks across all industries. The need to increase bandwidth, optimize...
Pinnacle Technology Partners Achieves Cisco Cloud & Managed Services Certification
After a thorough audit process, Pinnacle Technology Partner is proud to announce that we have attained Cisco® Express Cloud & Managed Services certification. As enterprises continue to shift to software subscription services and pay-as-you-go utility models, this...
How to Extend the Value of a SIEM–InfoSec Southwest Austin
If you are in the Austin area, please join Pinnacle Technology Partners at InfoSec Southwest in Austin from 4/11 - 4/13. I'll be presenting and demonstrating how to extend the value of a Security Information Event Manager (SIEM) through the receipt of traditional and...
The Olympics are Going for the Cloud Gold
It’s remarkable the changes in both equipment and performance in the Winter Olympics over the last 20-30 years. The skis, the sleds, the improvement in skating difficultly, and the numerous new events just to name a few. Juxtapose that with the classic Olympics events...
Containing the Cost of the Cloud
We’ve got clients in all stages of cloud adoption, from the nascent migrators to the “we’re all ins.” Each stage of the journey has its own challenges, and our job is to engineer solutions for each client, at each stage. The final stage in the cloud journey (if there...
Test-driving the Fluency Platform
Technology, much like a new car, needs to be test-driven and vetted before you commit. So, we took Fluency for a spin and did the comps. And it came out a winner in our book. A large number of our customers still have simple protection technologies in place, but have...
Cisco Adaptive Security Appliance Remote Code Execution and Denial of Service Vulnerability
A vulnerability in the Secure Sockets Layer (SSL) VPN functionality of the Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to cause a reload of the affected system or to remotely execute code. The vulnerability is due...
PTP Gives Back: Christmas Delivery
Two families in need. Dozens of happy smiles. Thanks to the efforts of some really hard-working PTP "elves," Santa delivered over 60 gifts to two families in need this holiday. Partnering with St. Vincent de Paul in Cincinnati, the effort brought as much joy to the...
7 Fundamental Discussions To Have In 2018
This past year, we saw an accelerated sophistication of high profile security threats, a proliferation of new vendors, an increasing shortage of IT skills, and a pace of innovation in the Cloud that is exceeding many organizations’ abilities to keep up. What’s in...
Meltdown and Spectre Vulnerabilities, and How You Can Spot Them
wo processor vulnerabilities are currently in the news, and here’s a summary on the vulnerabilities and how customers may be affected, in addition to how Pinnacle’s threat hunting services detect and mitigate risks in these exploits. In a nutshell:Meltdown allows a...