{"id":1837,"date":"2019-03-13T00:05:57","date_gmt":"2019-03-13T00:05:57","guid":{"rendered":"https:\/\/ptp.cloud\/ptp\/?p=1837"},"modified":"2024-05-06T17:26:01","modified_gmt":"2024-05-06T21:26:01","slug":"cloud-security-creating-borders-in-borderless-environments","status":"publish","type":"post","link":"https:\/\/ptp.cloud\/cloud-security-creating-borders-in-borderless-environments\/","title":{"rendered":"Cloud Security: Creating Borders in Borderless Environments"},"content":{"rendered":"[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;1px|||||&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px||0px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/ptp.cloud\/ptp\/wp-content\/uploads\/2020\/11\/creating-borders-post-feature.png&#8221; title_text=&#8221;creating-borders-post-feature&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]\n<p>The Cloud has fundamentally changed the IT consumption model and enabled businesses to rethink their go-to-market strategies to become nimbler and more innovative at a lower entry point. Because of this transformation, Cloud has become the biggest change in IT since the introduction of the desktop computer. With change comes new benefits and challenges.Traditional security methods were built around a centralized data model and limited device access. While these traditional tools still have value, they leave gaping holes in a borderless environment. As a result, the Cloud Access Security Broker (CASB) market has emerged to help enable a centralized view, control, and protection over all data and access devices regardless of location. CASB is sometimes also referred to as Cloud Security Gateways (CSG). CASB in its simplest form is software that sits between the cloud provider and the cloud consumer to extend and enforce corporate security policy, governance, and compliance in to the cloud.<\/p>\n<p>We hear about cloud data breaches almost daily. There are two trends with these breaches &#8211; &#8211; they tend to be self-inflicted and they are getting more costly.<\/p>\n<ul>\n<li>Gartner estimates that through 2023, at least 99% of cloud security failures will be the customer\u2019s fault.<\/li>\n<li>According to the Ponemon Institute, the average cost of a data breach is now $3.8 million.<\/li>\n<\/ul>\n<p>There are two general methodologies corporations have traditionally used to address IT security:<\/p>\n<ul>\n<li>Protect the heart of what matters: the data<\/li>\n<li>Protect the devices and highways that access the data: endpoints, networks, etc.<\/li>\n<\/ul>\n<p>The concepts behind CASB are designed to integrate with these methodologies and technologies while providing that centralized command and control that is lost in a Cloud environment when leveraging traditional security solutions.<\/p>\n<p>CASB is a relatively young and emerging market and therefore in some respects it has become a catch-all for cloud-based security solutions. There are many providers that are claiming to be a part of the CASB market since it is the latest cloud security buzz word. However, most true CASB solutions address many of the same security and compliance gaps in a cloud environment.<\/p>\n<p>Let\u2019s take a closer look at the benefits of the CASB model.<\/p>\n<p><strong>Visibility:<\/strong> CASB can provide the ability to see traffic to, from, and between cloud services, users, and endpoints anywhere. However, just as importantly, they can help identify Shadow IT services so IT can integrate them in to their corporate security, governance and compliance requirements.<\/p>\n<p><strong>Data Security:<\/strong> Data discovery and classification are at the core of CASB security. A centralized and unified policy engine drive access, sharing, collaboration, DLP, tokenization, logging, alerting, profiling and remediation rules that can be applied to implement and enforce corporate policy. Structured and unstructured data at rest encryption, monitoring data in transit, information rights management have also been incorporated in to many solutions. Many solutions also leverage anti-malware and endpoint detection and response (EDR) solutions.<\/p>\n<p><strong>Threat Protection:<\/strong> Behavior analytics, user activity monitoring and machine learning are at the heart of many solutions. By understanding \u201cnormal\u201d behavior and responses to that behavior, CASBs can protect and take corrective action.<\/p>\n<p><strong>Compliance:<\/strong> Through the above benefits of visibility, control and reporting you are able to provide information that helps an organization report and abide by various compliance and governance requirements. In addition, the ability to monitor and manage the security posture of the cloud control plane in many SaaS environments provides continuous security controls and compliance.<\/p>\n<p>Some products address a subset of these benefits. However, more comprehensive CASB solutions may be comprised of multiple products or modules to realize these benefits.<\/p>\n<p>There are three general CASB deployment methods, each one provides coverage for different users, access scenarios, and functionality.<\/p>\n<ul>\n<li><strong>Log collection:<\/strong> Event logs are collected from infrastructure components such as firewalls, secure web gateways, and SIEMs. Log collection is sometimes leveraged for anomaly detection, performance and configuration issues, and root cause analysis. Log collection is reactive and not real time.<\/li>\n<li><strong>API:<\/strong> IaaS and SaaS providers may allow direct integration through APIs to provide functionality such as data and user visibility and enforcement. API is generally considered the preferred method for a specific cloud resource since it directly integrates the security model in to that cloud resource, minimizes any performance impact, has visibility in to all traffic to that resource, scales better than the proxy method and secures all traffic to the cloud resource. The challenge with API is that it is specific to the cloud resource it is tied in to and will not have visibility or secure other traffic.<\/li>\n<li><span style=\"font-size: 14px;\"><strong>Forward Proxy:<\/strong> deployment between the endpoint and the cloud service where the user is directed to the CASB proxy<\/span><\/li>\n<li><strong>Reverse Proxy:<\/strong> deployment between the endpoint and the cloud service where the cloud service routes traffic to the CASB proxy<\/li>\n<\/ul>\n<p>Both forward and reverse proxy solutions are in-line and can take security action in real time. However, proxy solutions can impact performance since traffic is forced through a common interface and could miss traffic if it is not configured for all users or endpoints that don\u2019t support proxies or may not capture some cloud-to-cloud traffic.<\/p>\n<p>CASB is still an emerging market. Garter expects CASB to be deployed in more than 60% of enterprise organizations by 2022, up from less than 20% today. As more IaaS, SaaS, and PaaS providers make APIs available, the scalability and controls will continue to improve, management will be reduced, and the end user experience will become seamless.<\/p>\n<p>It is the transformation to a new IT consumption model that drove the creation of PTP. Our mission is to help dynamic and fast paced companies realize their potential by leveraging the latest technologies that enable infinite innovation and maximize the end user experience.<\/p>\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]\n<span class=\"et_bloom_bottom_trigger\"><\/span>","protected":false},"excerpt":{"rendered":"<p>The Cloud has fundamentally changed the IT consumption model and enabled businesses to rethink their go-to-market strategies to become nimbler and more innovative at a lower entry point. Because of this transformation, Cloud has become the biggest change in IT since the introduction of the desktop computer. With change comes new benefits and challenges.Traditional security [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1838,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[31],"tags":[],"table_tags":[],"class_list":["post-1837","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-netops-archive"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.1.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cloud Security: Creating Borders in Borderless Environments | PTP News<\/title>\n<meta name=\"description\" content=\"Maximize Cloud Security with CASB: Explore how Cloud Access Security Brokers (CASB) offer centralized control and protection for your data in the cloud. Gain insights into CASB benefits like enhanced visibility, data security, threat protection, and compliance, ensuring your cloud environment remains secure against rising breaches. Learn about CASB deployment methods for comprehensive cloud security coverage and prepare your business for the future with PTP&#039;s expert guidance.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ptp.cloud\/cloud-security-creating-borders-in-borderless-environments\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cloud Security: Creating Borders in Borderless Environments | PTP News\" \/>\n<meta property=\"og:description\" content=\"Maximize Cloud Security with CASB: Explore how Cloud Access Security Brokers (CASB) offer centralized control and protection for your data in the cloud. Gain insights into CASB benefits like enhanced visibility, data security, threat protection, and compliance, ensuring your cloud environment remains secure against rising breaches. Learn about CASB deployment methods for comprehensive cloud security coverage and prepare your business for the future with PTP&#039;s expert guidance.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ptp.cloud\/cloud-security-creating-borders-in-borderless-environments\/\" \/>\n<meta property=\"og:site_name\" content=\"PTP | Cloud Experts | Biotech Enablers\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PTPCloud\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-13T00:05:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-06T21:26:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/11\/creating-borders-post-feature.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1069\" \/>\n\t<meta property=\"og:image:height\" content=\"727\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"PTPstaff\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PTPCloud\" \/>\n<meta name=\"twitter:site\" content=\"@PTPCloud\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"PTPstaff\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ptp.cloud\/cloud-security-creating-borders-in-borderless-environments\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ptp.cloud\/cloud-security-creating-borders-in-borderless-environments\/\"},\"author\":{\"name\":\"PTPstaff\",\"@id\":\"https:\/\/ptp.cloud\/#\/schema\/person\/23219285c14844480b63688ae98ff7c5\"},\"headline\":\"Cloud Security: Creating Borders in Borderless Environments\",\"datePublished\":\"2019-03-13T00:05:57+00:00\",\"dateModified\":\"2024-05-06T21:26:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ptp.cloud\/cloud-security-creating-borders-in-borderless-environments\/\"},\"wordCount\":1081,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/ptp.cloud\/#organization\"},\"image\":{\"@id\":\"https:\/\/ptp.cloud\/cloud-security-creating-borders-in-borderless-environments\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/11\/creating-borders-post-feature.png\",\"articleSection\":[\"NetOps\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/ptp.cloud\/cloud-security-creating-borders-in-borderless-environments\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ptp.cloud\/cloud-security-creating-borders-in-borderless-environments\/\",\"url\":\"https:\/\/ptp.cloud\/cloud-security-creating-borders-in-borderless-environments\/\",\"name\":\"Cloud Security: Creating Borders in Borderless Environments | PTP News\",\"isPartOf\":{\"@id\":\"https:\/\/ptp.cloud\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ptp.cloud\/cloud-security-creating-borders-in-borderless-environments\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ptp.cloud\/cloud-security-creating-borders-in-borderless-environments\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/11\/creating-borders-post-feature.png\",\"datePublished\":\"2019-03-13T00:05:57+00:00\",\"dateModified\":\"2024-05-06T21:26:01+00:00\",\"description\":\"Maximize Cloud Security with CASB: Explore how Cloud Access Security Brokers (CASB) offer centralized control and protection for your data in the cloud. Gain insights into CASB benefits like enhanced visibility, data security, threat protection, and compliance, ensuring your cloud environment remains secure against rising breaches. Learn about CASB deployment methods for comprehensive cloud security coverage and prepare your business for the future with PTP's expert guidance.\",\"breadcrumb\":{\"@id\":\"https:\/\/ptp.cloud\/cloud-security-creating-borders-in-borderless-environments\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ptp.cloud\/cloud-security-creating-borders-in-borderless-environments\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ptp.cloud\/cloud-security-creating-borders-in-borderless-environments\/#primaryimage\",\"url\":\"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/11\/creating-borders-post-feature.png\",\"contentUrl\":\"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/11\/creating-borders-post-feature.png\",\"width\":1069,\"height\":727},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ptp.cloud\/cloud-security-creating-borders-in-borderless-environments\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/ptp.cloud\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cloud Security: Creating Borders in Borderless Environments\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ptp.cloud\/#website\",\"url\":\"https:\/\/ptp.cloud\/\",\"name\":\"PTP | Cloud Experts | Biotech Enablers\",\"description\":\"Helping innovative life sciences companies to get treatments to market faster.\",\"publisher\":{\"@id\":\"https:\/\/ptp.cloud\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ptp.cloud\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ptp.cloud\/#organization\",\"name\":\"Pinnacle Technology Partners\",\"alternateName\":\"PTP\",\"url\":\"https:\/\/ptp.cloud\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ptp.cloud\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ptp.cloud\/wp-content\/uploads\/2021\/08\/ptp_logo.png\",\"contentUrl\":\"https:\/\/ptp.cloud\/wp-content\/uploads\/2021\/08\/ptp_logo.png\",\"width\":409,\"height\":181,\"caption\":\"Pinnacle Technology Partners\"},\"image\":{\"@id\":\"https:\/\/ptp.cloud\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PTPCloud\",\"https:\/\/x.com\/PTPCloud\",\"https:\/\/www.linkedin.com\/company\/pinnacletechpartners\",\"https:\/\/www.youtube.com\/@ptp4766\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/ptp.cloud\/#\/schema\/person\/23219285c14844480b63688ae98ff7c5\",\"name\":\"PTPstaff\",\"sameAs\":[\"https:\/\/ptpcloud.mystagingwebsite.com\/ptp\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cloud Security: Creating Borders in Borderless Environments | PTP News","description":"Maximize Cloud Security with CASB: Explore how Cloud Access Security Brokers (CASB) offer centralized control and protection for your data in the cloud. Gain insights into CASB benefits like enhanced visibility, data security, threat protection, and compliance, ensuring your cloud environment remains secure against rising breaches. Learn about CASB deployment methods for comprehensive cloud security coverage and prepare your business for the future with PTP's expert guidance.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ptp.cloud\/cloud-security-creating-borders-in-borderless-environments\/","og_locale":"en_US","og_type":"article","og_title":"Cloud Security: Creating Borders in Borderless Environments | PTP News","og_description":"Maximize Cloud Security with CASB: Explore how Cloud Access Security Brokers (CASB) offer centralized control and protection for your data in the cloud. Gain insights into CASB benefits like enhanced visibility, data security, threat protection, and compliance, ensuring your cloud environment remains secure against rising breaches. Learn about CASB deployment methods for comprehensive cloud security coverage and prepare your business for the future with PTP's expert guidance.","og_url":"https:\/\/ptp.cloud\/cloud-security-creating-borders-in-borderless-environments\/","og_site_name":"PTP | Cloud Experts | Biotech Enablers","article_publisher":"https:\/\/www.facebook.com\/PTPCloud","article_published_time":"2019-03-13T00:05:57+00:00","article_modified_time":"2024-05-06T21:26:01+00:00","og_image":[{"width":1069,"height":727,"url":"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/11\/creating-borders-post-feature.png","type":"image\/png"}],"author":"PTPstaff","twitter_card":"summary_large_image","twitter_creator":"@PTPCloud","twitter_site":"@PTPCloud","twitter_misc":{"Written by":"PTPstaff","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ptp.cloud\/cloud-security-creating-borders-in-borderless-environments\/#article","isPartOf":{"@id":"https:\/\/ptp.cloud\/cloud-security-creating-borders-in-borderless-environments\/"},"author":{"name":"PTPstaff","@id":"https:\/\/ptp.cloud\/#\/schema\/person\/23219285c14844480b63688ae98ff7c5"},"headline":"Cloud Security: Creating Borders in Borderless Environments","datePublished":"2019-03-13T00:05:57+00:00","dateModified":"2024-05-06T21:26:01+00:00","mainEntityOfPage":{"@id":"https:\/\/ptp.cloud\/cloud-security-creating-borders-in-borderless-environments\/"},"wordCount":1081,"commentCount":0,"publisher":{"@id":"https:\/\/ptp.cloud\/#organization"},"image":{"@id":"https:\/\/ptp.cloud\/cloud-security-creating-borders-in-borderless-environments\/#primaryimage"},"thumbnailUrl":"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/11\/creating-borders-post-feature.png","articleSection":["NetOps"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ptp.cloud\/cloud-security-creating-borders-in-borderless-environments\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ptp.cloud\/cloud-security-creating-borders-in-borderless-environments\/","url":"https:\/\/ptp.cloud\/cloud-security-creating-borders-in-borderless-environments\/","name":"Cloud Security: Creating Borders in Borderless Environments | PTP News","isPartOf":{"@id":"https:\/\/ptp.cloud\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ptp.cloud\/cloud-security-creating-borders-in-borderless-environments\/#primaryimage"},"image":{"@id":"https:\/\/ptp.cloud\/cloud-security-creating-borders-in-borderless-environments\/#primaryimage"},"thumbnailUrl":"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/11\/creating-borders-post-feature.png","datePublished":"2019-03-13T00:05:57+00:00","dateModified":"2024-05-06T21:26:01+00:00","description":"Maximize Cloud Security with CASB: Explore how Cloud Access Security Brokers (CASB) offer centralized control and protection for your data in the cloud. Gain insights into CASB benefits like enhanced visibility, data security, threat protection, and compliance, ensuring your cloud environment remains secure against rising breaches. Learn about CASB deployment methods for comprehensive cloud security coverage and prepare your business for the future with PTP's expert guidance.","breadcrumb":{"@id":"https:\/\/ptp.cloud\/cloud-security-creating-borders-in-borderless-environments\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ptp.cloud\/cloud-security-creating-borders-in-borderless-environments\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ptp.cloud\/cloud-security-creating-borders-in-borderless-environments\/#primaryimage","url":"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/11\/creating-borders-post-feature.png","contentUrl":"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/11\/creating-borders-post-feature.png","width":1069,"height":727},{"@type":"BreadcrumbList","@id":"https:\/\/ptp.cloud\/cloud-security-creating-borders-in-borderless-environments\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ptp.cloud\/"},{"@type":"ListItem","position":2,"name":"Cloud Security: Creating Borders in Borderless Environments"}]},{"@type":"WebSite","@id":"https:\/\/ptp.cloud\/#website","url":"https:\/\/ptp.cloud\/","name":"PTP | Cloud Experts | Biotech Enablers","description":"Helping innovative life sciences companies to get treatments to market faster.","publisher":{"@id":"https:\/\/ptp.cloud\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ptp.cloud\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/ptp.cloud\/#organization","name":"Pinnacle Technology Partners","alternateName":"PTP","url":"https:\/\/ptp.cloud\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ptp.cloud\/#\/schema\/logo\/image\/","url":"https:\/\/ptp.cloud\/wp-content\/uploads\/2021\/08\/ptp_logo.png","contentUrl":"https:\/\/ptp.cloud\/wp-content\/uploads\/2021\/08\/ptp_logo.png","width":409,"height":181,"caption":"Pinnacle Technology Partners"},"image":{"@id":"https:\/\/ptp.cloud\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PTPCloud","https:\/\/x.com\/PTPCloud","https:\/\/www.linkedin.com\/company\/pinnacletechpartners","https:\/\/www.youtube.com\/@ptp4766"]},{"@type":"Person","@id":"https:\/\/ptp.cloud\/#\/schema\/person\/23219285c14844480b63688ae98ff7c5","name":"PTPstaff","sameAs":["https:\/\/ptpcloud.mystagingwebsite.com\/ptp"]}]}},"jetpack_featured_media_url":"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/11\/creating-borders-post-feature.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/posts\/1837","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/comments?post=1837"}],"version-history":[{"count":0,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/posts\/1837\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/media\/1838"}],"wp:attachment":[{"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/media?parent=1837"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/categories?post=1837"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/tags?post=1837"},{"taxonomy":"table_tags","embeddable":true,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/table_tags?post=1837"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}