{"id":5804,"date":"2022-01-10T15:24:59","date_gmt":"2022-01-10T20:24:59","guid":{"rendered":"https:\/\/ptp.cloud\/?p=5804"},"modified":"2025-06-15T22:47:26","modified_gmt":"2025-06-16T02:47:26","slug":"security-assessment-from-ptp-elements-results-and-value","status":"publish","type":"post","link":"https:\/\/ptp.cloud\/security-assessment-from-ptp-elements-results-and-value\/","title":{"rendered":"Security Assessment from PTP:\u00a0 Elements, Results and Value"},"content":{"rendered":"[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;11px|||||&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;]\n<p>Typical conversations with clients around data security include the simple desire to not be breached of sensitive information and a discussion around what security protection technologies and practices are in place.\u00a0 For our <a href=\"https:\/\/ptp.cloud\/aws-for-life-sciences-practice\/\">biotechnology growth company customer base<\/a>, the discussion is typically about remote users, a lab environment, Microsoft O365 and their data and data analytics in the cloud, asking how to best secure a dynamic environment despite a low user count and very limited resources. \u00a0While a discussion around VPNs, single sign on (SSO), multi-factor authentication (MFA), firewalls, endpoint protection, encryption and other protection techniques is necessary, knowing how well they have been deployed or how well they are working through a security assessment will tell the real story of data security hygiene.\u00a0 Just like how a person can eat well, exercise, and sleep well, the overall health assessment including lab work during a routine physical demonstrates how those practices are working.\u00a0 PTP offers a high-value, low-cost assessment solution to do just that &#8211; &#8211; provide a routine evaluation of how an organizations security practices are working, and recommendations on areas for improvement.<\/p>\n<h3 style=\"text-align: center;\"><a href=\"https:\/\/ptp.cloud\/security-assessments\/\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-5807 aligncenter\" src=\"https:\/\/ptp.cloud\/wp-content\/uploads\/2022\/01\/Screen-Shot-2022-01-10-at-2.16.36-PM-1024x152.png\" alt=\"\" width=\"444\" height=\"66\" \/><\/a><\/h3>\n<h3><\/h3>\n<p>&nbsp;<\/p>\n<h3>I have security tools in place.\u00a0 Why should I conduct a security assessment?<\/h3>\n<p>In all areas of business, measurement is a best practice and security is no different.\u00a0 The fact that a highly regarded endpoint security tool is purchased and deployed does not mean that it is on every machine or that every machine is being updated.\u00a0 It also doesn\u2019t mean that when issues are presented by the endpoint security that action is being taken.\u00a0 Same for firewalls, DNS security, email security and all other technologies.\u00a0Additionally, there can be complex configuration for these tools to work while allowing communications and those configurations may or may not be optimized.\u00a0 The work in an assessment identifies these non-best practice configurations and the team simply investigates whether there is a valid reason a particular config was used, perhaps requirements for a specific business application, or whether it was a mistake.<\/p>\n<p>The environments PTP works with are typically very dynamic and changing to address developing needs, thus the importance to be either <a href=\"https:\/\/ptp.cloud\/xdr-and-soc-services-original\/\">monitoring security on a real-time basis<\/a> or conducting periodic security assessments to provide data-driven actionable security intelligence.<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-2048\" src=\"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/11\/security-assessment-output-sample-1024x458.jpg\" alt=\"\" width=\"1024\" height=\"458\" srcset=\"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/11\/security-assessment-output-sample-980x439.jpg 980w, https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/11\/security-assessment-output-sample-480x215.jpg 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw\" \/><\/p>\n<h3><\/h3>\n<p>&nbsp;<\/p>\n<h3>What comprises PTP\u2019s Security Assessment?<\/h3>\n<p>Our service has four primary components, assembled to extract the greatest amount of value in security status and visibility without excessive overhead or cost.\u00a0 Below is an outline that summarizes each element of the service, how we go about the assessment and examples of what can be expected.<\/p>\n<ul>\n<li><strong>Ingress\/Egress Data Flow Review<\/strong>\n<ul>\n<li>Add PTP collector, <a href=\"https:\/\/www.fluencysecurity.com\">Fluency<\/a>, as flow destination from source devices<\/li>\n<li>Gather 14 days of flow data<\/li>\n<li>Confirm and analyze data<\/li>\n<li>Document key findings and recommendations<\/li>\n<li>Examples of concerns uncovered through this procedure are nefarious network activity, unwanted user internet activity, connections to known risky countries, and risks relating to application data.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li><strong>Vulnerability Test<\/strong>\n<ul>\n<li>Configure central scanner and scan for known vulnerabilities against the Common Vulnerabilities and Exposures (CVE) database (cve.mitre.org).<\/li>\n<li>Confirm and analyze data<\/li>\n<li>Document key findings and recommendations<\/li>\n<li>Examples of concerns uncovered through this procedure are down-level system code, known risky protocols, unauthorized remote access, and dangerous internet facing ports.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li><strong>Domain Configuration Review <\/strong>\n<ul>\n<li>Utilize PTPs threat intelligence feeds to scan customer public domain name space<\/li>\n<li>Identify security risks and possible exposures<\/li>\n<li>Confirm and analyze data<\/li>\n<li>Document key findings and recommendations<\/li>\n<li>Examples of concerns uncovered through this procedure include domain registration validation, customer owned SSL certs, DNS subdomain validation, and domain locations.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li><strong>Review of Security Prevention Device Configurations<\/strong>\n<ul>\n<li><strong>Security Protection Tools<\/strong>\n<ul>\n<li>Review and analyze security configurations for security infrastructure elements in scope: Firewalls, IPS devices and Endpoint Security.<\/li>\n<li>Confirm and analyze data<\/li>\n<li>Document key findings and recommendations<\/li>\n<li>Examples of concerns uncovered through this procedure include broad and dangerous rule sets, signature status, code\/patch levels, and review of configuration best practices.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Cloud Security Best Practices<\/strong>\n<ul>\n<li>Configure PTP\u2019s cloud management platform to associate with cloud accounts<\/li>\n<li>Review and analyze security best practice issues by severity<\/li>\n<li>Filter and prioritize issues by impact and summarize<\/li>\n<li>Document key findings and recommendation<\/li>\n<li>Examples of concerns uncovered through this procedure include lack of use of multi-factor authentication, use of root accounts, large numbers of Administrator access, lack of encryption of cloud storage, public facing instances and inadequate password policies.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>What kind of findings can I expect?<\/h3>\n<p>Upon completion of the data collection phase of the assessment, a PTP Sr. Security Engineer will gather the data, review the output from each of the tools from each of the elements and prioritize and summarize the findings.\u00a0 The deliverable report will contain all of this summarized for ease of review and action, coupled with all of the detail exported from our tools.\u00a0 Customers may receive 100+ page reports, but our team will extract out the top issues for review in the assessment summary findings section.<\/p>\n<p>While there are too many possible issues to list, examples of our team has reviewed with customers from recent assessments are listed below:<\/p>\n<ul>\n<li>RC4 found in Kerberos negotiations<\/li>\n<li>Firewall DENY rules inconsistent<\/li>\n<li>Printers broadcasting their own WiFi networks<\/li>\n<li>VPN clients affected by Barefruit DNS tracking<\/li>\n<li>Rogue wireless APs on the network<\/li>\n<li>Abnormally high numbers of login failures for the AD Administrator account<\/li>\n<li>DNS configuration inconsistencies<\/li>\n<li>End of Life software versions for ancillary software such as Apache Tomcat<\/li>\n<li>Weak encryption algorithms in place<\/li>\n<li>Website missing security headers<\/li>\n<li>Telnet in use<\/li>\n<\/ul>\n<h3>When does it make sense to conduct a Security Assessment?<\/h3>\n<p>There are a number of reasons why and when you may want to reach out to PTP for an assessment.\u00a0 Several are listed below:<\/p>\n<ol>\n<li>You or your team is new to the environment and needs to establish a security hygiene baseline.<\/li>\n<li>You do not have a <a href=\"https:\/\/ptp.cloud\/xdr-and-soc-services-original\/\">security monitoring service<\/a> or internal security monitoring and as a quality practice, should assess the environment annually.<\/li>\n<li>You have been experiencing users with malware.<\/li>\n<li>You are receiving large quantities of phishing emails.<\/li>\n<li>There has been a meaningful change in your environment either with new locations, new applications or growth in users.<\/li>\n<\/ol>\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]\n<span class=\"et_bloom_bottom_trigger\"><\/span>","protected":false},"excerpt":{"rendered":"<p>Typical conversations with clients around data security include the simple desire to not be breached of sensitive information and a discussion around what security protection technologies and practices are in place.\u00a0 For our biotechnology growth company customer base, the discussion is typically about remote users, a lab environment, Microsoft O365 and their data and data [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":16842,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"Typical conversations with clients around data security include the simple desire to not be breached of sensitive information and a discussion around what security protection technologies and practices are in place.\u00a0 For our <a href=\"https:\/\/ptp.cloud\/aws-for-life-sciences-practice\/\">biotechnology growth company customer base<\/a>, the discussion is typically about remote users, a lab environment, Microsoft O365 and their data and data analytics in the cloud, asking how to best secure a dynamic environment despite a low user count and very limited resources. \u00a0While a discussion around VPNs, single sign on (SSO), multi-factor authentication (MFA), firewalls, endpoint protection, encryption and other protection techniques is necessary, knowing how well they have been deployed or how well they are working through a security assessment will tell the real story of data security hygiene.\u00a0 Just like how a person can eat well, exercise, and sleep well, the overall health assessment including lab work during a routine physical demonstrates how those practices are working.\u00a0 PTP offers a high-value, low-cost assessment solution to do just that - - provide a routine evaluation of how an organizations security practices are working, and recommendations on areas for improvement.\r\n<h3 style=\"text-align: center;\"><a href=\"https:\/\/ptp.cloud\/security-assessments\/\"><img class=\"wp-image-5807 aligncenter\" src=\"https:\/\/ptp.cloud\/wp-content\/uploads\/2022\/01\/Screen-Shot-2022-01-10-at-2.16.36-PM-1024x152.png\" alt=\"\" width=\"444\" height=\"66\" \/><\/a><\/h3>\r\n<h3><\/h3>\r\n\u00a0\r\n<h3>I have security tools in place.\u00a0 Why should I conduct a security assessment?<\/h3>\r\nIn all areas of business, measurement is a best practice and security is no different.\u00a0 The fact that a highly regarded endpoint security tool is purchased and deployed does not mean that it is on every machine or that every machine is being updated.\u00a0 It also doesn\u2019t mean that when issues are presented by the endpoint security that action is being taken.\u00a0 Same for firewalls, DNS security, email security and all other technologies.\u00a0Additionally, there can be complex configuration for these tools to work while allowing communications and those configurations may or may not be optimized.\u00a0 The work in an assessment identifies these non-best practice configurations and the team simply investigates whether there is a valid reason a particular config was used, perhaps requirements for a specific business application, or whether it was a mistake.\r\n\r\nThe environments PTP works with are typically very dynamic and changing to address developing needs, thus the importance to be either <a href=\"https:\/\/ptp.cloud\/xdr-and-soc-services-original\/\">monitoring security on a real-time basis<\/a> or conducting periodic security assessments to provide data-driven actionable security intelligence.\r\n<p style=\"text-align: center;\"><img class=\"alignnone size-large wp-image-2048\" src=\"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/11\/security-assessment-output-sample-1024x458.jpg\" alt=\"\" width=\"1024\" height=\"458\" \/><\/p>\r\n\r\n<h3><\/h3>\r\n\u00a0\r\n<h3>What comprises PTP\u2019s Security Assessment?<\/h3>\r\nOur service has four primary components, assembled to extract the greatest amount of value in security status and visibility without excessive overhead or cost.\u00a0 Below is an outline that summarizes each element of the service, how we go about the assessment and examples of what can be expected.\r\n<ul>\r\n \t<li><strong>Ingress\/Egress Data Flow Review<\/strong>\r\n<ul>\r\n \t<li>Add PTP collector, <a href=\"https:\/\/www.fluencysecurity.com\">Fluency<\/a>, as flow destination from source devices<\/li>\r\n \t<li>Gather 14 days of flow data<\/li>\r\n \t<li>Confirm and analyze data<\/li>\r\n \t<li>Document key findings and recommendations<\/li>\r\n \t<li>Examples of concerns uncovered through this procedure are nefarious network activity, unwanted user internet activity, connections to known risky countries, and risks relating to application data.<\/li>\r\n<\/ul>\r\n<\/li>\r\n<\/ul>\r\n<ul>\r\n \t<li><strong>Vulnerability Test<\/strong>\r\n<ul>\r\n \t<li>Configure central scanner and scan for known vulnerabilities against the Common Vulnerabilities and Exposures (CVE) database (cve.mitre.org).<\/li>\r\n \t<li>Confirm and analyze data<\/li>\r\n \t<li>Document key findings and recommendations<\/li>\r\n \t<li>Examples of concerns uncovered through this procedure are down-level system code, known risky protocols, unauthorized remote access, and dangerous internet facing ports.<\/li>\r\n<\/ul>\r\n<\/li>\r\n<\/ul>\r\n<ul>\r\n \t<li><strong>Domain Configuration Review <\/strong>\r\n<ul>\r\n \t<li>Utilize PTPs threat intelligence feeds to scan customer public domain name space<\/li>\r\n \t<li>Identify security risks and possible exposures<\/li>\r\n \t<li>Confirm and analyze data<\/li>\r\n \t<li>Document key findings and recommendations<\/li>\r\n \t<li>Examples of concerns uncovered through this procedure include domain registration validation, customer owned SSL certs, DNS subdomain validation, and domain locations.<\/li>\r\n<\/ul>\r\n<\/li>\r\n<\/ul>\r\n<ul>\r\n \t<li><strong>Review of Security Prevention Device Configurations<\/strong>\r\n<ul>\r\n \t<li><strong>Security Protection Tools<\/strong>\r\n<ul>\r\n \t<li>Review and analyze security configurations for security infrastructure elements in scope: Firewalls, IPS devices and Endpoint Security.<\/li>\r\n \t<li>Confirm and analyze data<\/li>\r\n \t<li>Document key findings and recommendations<\/li>\r\n \t<li>Examples of concerns uncovered through this procedure include broad and dangerous rule sets, signature status, code\/patch levels, and review of configuration best practices.<\/li>\r\n<\/ul>\r\n<\/li>\r\n \t<li><strong>Cloud Security Best Practices<\/strong>\r\n<ul>\r\n \t<li>Configure PTP\u2019s cloud management platform to associate with cloud accounts<\/li>\r\n \t<li>Review and analyze security best practice issues by severity<\/li>\r\n \t<li>Filter and prioritize issues by impact and summarize<\/li>\r\n \t<li>Document key findings and recommendation<\/li>\r\n \t<li>Examples of concerns uncovered through this procedure include lack of use of multi-factor authentication, use of root accounts, large numbers of Administrator access, lack of encryption of cloud storage, public facing instances and inadequate password policies.<\/li>\r\n<\/ul>\r\n<\/li>\r\n<\/ul>\r\n<\/li>\r\n<\/ul>\r\n\u00a0\r\n\r\n\u00a0\r\n<h3>What kind of findings can I expect?<\/h3>\r\nUpon completion of the data collection phase of the assessment, a PTP Sr. Security Engineer will gather the data, review the output from each of the tools from each of the elements and prioritize and summarize the findings.\u00a0 The deliverable report will contain all of this summarized for ease of review and action, coupled with all of the detail exported from our tools.\u00a0 Customers may receive 100+ page reports, but our team will extract out the top issues for review in the assessment summary findings section.\r\n\r\nWhile there are too many possible issues to list, examples of our team has reviewed with customers from recent assessments are listed below:\r\n<ul>\r\n \t<li>RC4 found in Kerberos negotiations<\/li>\r\n \t<li>Firewall DENY rules inconsistent<\/li>\r\n \t<li>Printers broadcasting their own WiFi networks<\/li>\r\n \t<li>VPN clients affected by Barefruit DNS tracking<\/li>\r\n \t<li>Rogue wireless APs on the network<\/li>\r\n \t<li>Abnormally high numbers of login failures for the AD Administrator account<\/li>\r\n \t<li>DNS configuration inconsistencies<\/li>\r\n \t<li>End of Life software versions for ancillary software such as Apache Tomcat<\/li>\r\n \t<li>Weak encryption algorithms in place<\/li>\r\n \t<li>Website missing security headers<\/li>\r\n \t<li>Telnet in use<\/li>\r\n<\/ul>\r\n\u00a0\r\n\r\n\u00a0\r\n<h3>When does it make sense to conduct a Security Assessment?<\/h3>\r\nThere are a number of reasons why and when you may want to reach out to PTP for an assessment.\u00a0 Several are listed below:\r\n<ol>\r\n \t<li>You or your team is new to the environment and needs to establish a security hygiene baseline.<\/li>\r\n \t<li>You do not have a <a href=\"https:\/\/ptp.cloud\/xdr-and-soc-services-original\/\">security monitoring service<\/a> or internal security monitoring and as a quality practice, should assess the environment annually.<\/li>\r\n \t<li>You have been experiencing users with malware.<\/li>\r\n \t<li>You are receiving large quantities of phishing emails.<\/li>\r\n \t<li>There has been a meaningful change in your environment either with new locations, new applications or growth in users.<\/li>\r\n<\/ol>\r\n\u00a0\r\n<h2 style=\"text-align: center;\"><a href=\"https:\/\/ptp.cloud\/security-assessments\/\"><img class=\" wp-image-5807 aligncenter\" src=\"https:\/\/ptp.cloud\/wp-content\/uploads\/2022\/01\/Screen-Shot-2022-01-10-at-2.16.36-PM-1024x152.png\" alt=\"\" width=\"943\" height=\"140\" \/><\/a><\/h2>\r\n\u00a0","_et_gb_content_width":"","content-type":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[9,1,10],"tags":[94,114,113],"table_tags":[],"class_list":["post-5804","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloudops-archive","category-news-archive","category-secops-archive","tag-cloud-security","tag-cybersecurity","tag-security-assessment"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.1.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Security Assessment from PTP - Now 50% Off<\/title>\n<meta name=\"description\" content=\"PTP offers a high-value security assessment to provide an evaluation of security practices and recommendations on areas for improvement.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ptp.cloud\/security-assessment-from-ptp-elements-results-and-value\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Assessment from PTP - Now 50% Off\" \/>\n<meta property=\"og:description\" content=\"PTP offers a high-value security assessment to provide an evaluation of security practices and recommendations on areas for improvement.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ptp.cloud\/security-assessment-from-ptp-elements-results-and-value\/\" \/>\n<meta property=\"og:site_name\" content=\"PTP | Cloud Experts | Biotech Enablers\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PTPCloud\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-10T20:24:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-16T02:47:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ptp.cloud\/wp-content\/uploads\/2022\/01\/Security-Assessment-from-PTP-Elements-Results-and-Value.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Gary Derheim\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PTPCloud\" \/>\n<meta name=\"twitter:site\" content=\"@PTPCloud\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Gary Derheim\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ptp.cloud\/security-assessment-from-ptp-elements-results-and-value\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ptp.cloud\/security-assessment-from-ptp-elements-results-and-value\/\"},\"author\":{\"name\":\"Gary Derheim\",\"@id\":\"https:\/\/ptp.cloud\/#\/schema\/person\/9164cae6fb27fb76f79e048d8dd2d8ab\"},\"headline\":\"Security Assessment from PTP:\u00a0 Elements, Results and Value\",\"datePublished\":\"2022-01-10T20:24:59+00:00\",\"dateModified\":\"2025-06-16T02:47:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ptp.cloud\/security-assessment-from-ptp-elements-results-and-value\/\"},\"wordCount\":1139,\"publisher\":{\"@id\":\"https:\/\/ptp.cloud\/#organization\"},\"image\":{\"@id\":\"https:\/\/ptp.cloud\/security-assessment-from-ptp-elements-results-and-value\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ptp.cloud\/wp-content\/uploads\/2022\/01\/Security-Assessment-from-PTP-Elements-Results-and-Value.jpg\",\"keywords\":[\"cloud security\",\"cybersecurity\",\"security assessment\"],\"articleSection\":[\"CloudOps\",\"News\",\"SecOps\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ptp.cloud\/security-assessment-from-ptp-elements-results-and-value\/\",\"url\":\"https:\/\/ptp.cloud\/security-assessment-from-ptp-elements-results-and-value\/\",\"name\":\"Security Assessment from PTP - Now 50% Off\",\"isPartOf\":{\"@id\":\"https:\/\/ptp.cloud\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ptp.cloud\/security-assessment-from-ptp-elements-results-and-value\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ptp.cloud\/security-assessment-from-ptp-elements-results-and-value\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ptp.cloud\/wp-content\/uploads\/2022\/01\/Security-Assessment-from-PTP-Elements-Results-and-Value.jpg\",\"datePublished\":\"2022-01-10T20:24:59+00:00\",\"dateModified\":\"2025-06-16T02:47:26+00:00\",\"description\":\"PTP offers a high-value security assessment to provide an evaluation of security practices and recommendations on areas for improvement.\",\"breadcrumb\":{\"@id\":\"https:\/\/ptp.cloud\/security-assessment-from-ptp-elements-results-and-value\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ptp.cloud\/security-assessment-from-ptp-elements-results-and-value\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ptp.cloud\/security-assessment-from-ptp-elements-results-and-value\/#primaryimage\",\"url\":\"https:\/\/ptp.cloud\/wp-content\/uploads\/2022\/01\/Security-Assessment-from-PTP-Elements-Results-and-Value.jpg\",\"contentUrl\":\"https:\/\/ptp.cloud\/wp-content\/uploads\/2022\/01\/Security-Assessment-from-PTP-Elements-Results-and-Value.jpg\",\"width\":1200,\"height\":675},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ptp.cloud\/security-assessment-from-ptp-elements-results-and-value\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/ptp.cloud\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Assessment from PTP:\u00a0 Elements, Results and Value\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ptp.cloud\/#website\",\"url\":\"https:\/\/ptp.cloud\/\",\"name\":\"PTP | Cloud Experts | Biotech Enablers\",\"description\":\"Helping innovative life sciences companies to get treatments to market faster.\",\"publisher\":{\"@id\":\"https:\/\/ptp.cloud\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ptp.cloud\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ptp.cloud\/#organization\",\"name\":\"Pinnacle Technology Partners\",\"alternateName\":\"PTP\",\"url\":\"https:\/\/ptp.cloud\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ptp.cloud\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ptp.cloud\/wp-content\/uploads\/2021\/08\/ptp_logo.png\",\"contentUrl\":\"https:\/\/ptp.cloud\/wp-content\/uploads\/2021\/08\/ptp_logo.png\",\"width\":409,\"height\":181,\"caption\":\"Pinnacle Technology Partners\"},\"image\":{\"@id\":\"https:\/\/ptp.cloud\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PTPCloud\",\"https:\/\/x.com\/PTPCloud\",\"https:\/\/www.linkedin.com\/company\/pinnacletechpartners\",\"https:\/\/www.youtube.com\/@ptp4766\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/ptp.cloud\/#\/schema\/person\/9164cae6fb27fb76f79e048d8dd2d8ab\",\"name\":\"Gary Derheim\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security Assessment from PTP - Now 50% Off","description":"PTP offers a high-value security assessment to provide an evaluation of security practices and recommendations on areas for improvement.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ptp.cloud\/security-assessment-from-ptp-elements-results-and-value\/","og_locale":"en_US","og_type":"article","og_title":"Security Assessment from PTP - Now 50% Off","og_description":"PTP offers a high-value security assessment to provide an evaluation of security practices and recommendations on areas for improvement.","og_url":"https:\/\/ptp.cloud\/security-assessment-from-ptp-elements-results-and-value\/","og_site_name":"PTP | Cloud Experts | Biotech Enablers","article_publisher":"https:\/\/www.facebook.com\/PTPCloud","article_published_time":"2022-01-10T20:24:59+00:00","article_modified_time":"2025-06-16T02:47:26+00:00","og_image":[{"width":1200,"height":675,"url":"https:\/\/ptp.cloud\/wp-content\/uploads\/2022\/01\/Security-Assessment-from-PTP-Elements-Results-and-Value.jpg","type":"image\/jpeg"}],"author":"Gary Derheim","twitter_card":"summary_large_image","twitter_creator":"@PTPCloud","twitter_site":"@PTPCloud","twitter_misc":{"Written by":"Gary Derheim","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ptp.cloud\/security-assessment-from-ptp-elements-results-and-value\/#article","isPartOf":{"@id":"https:\/\/ptp.cloud\/security-assessment-from-ptp-elements-results-and-value\/"},"author":{"name":"Gary Derheim","@id":"https:\/\/ptp.cloud\/#\/schema\/person\/9164cae6fb27fb76f79e048d8dd2d8ab"},"headline":"Security Assessment from PTP:\u00a0 Elements, Results and Value","datePublished":"2022-01-10T20:24:59+00:00","dateModified":"2025-06-16T02:47:26+00:00","mainEntityOfPage":{"@id":"https:\/\/ptp.cloud\/security-assessment-from-ptp-elements-results-and-value\/"},"wordCount":1139,"publisher":{"@id":"https:\/\/ptp.cloud\/#organization"},"image":{"@id":"https:\/\/ptp.cloud\/security-assessment-from-ptp-elements-results-and-value\/#primaryimage"},"thumbnailUrl":"https:\/\/ptp.cloud\/wp-content\/uploads\/2022\/01\/Security-Assessment-from-PTP-Elements-Results-and-Value.jpg","keywords":["cloud security","cybersecurity","security assessment"],"articleSection":["CloudOps","News","SecOps"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/ptp.cloud\/security-assessment-from-ptp-elements-results-and-value\/","url":"https:\/\/ptp.cloud\/security-assessment-from-ptp-elements-results-and-value\/","name":"Security Assessment from PTP - Now 50% Off","isPartOf":{"@id":"https:\/\/ptp.cloud\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ptp.cloud\/security-assessment-from-ptp-elements-results-and-value\/#primaryimage"},"image":{"@id":"https:\/\/ptp.cloud\/security-assessment-from-ptp-elements-results-and-value\/#primaryimage"},"thumbnailUrl":"https:\/\/ptp.cloud\/wp-content\/uploads\/2022\/01\/Security-Assessment-from-PTP-Elements-Results-and-Value.jpg","datePublished":"2022-01-10T20:24:59+00:00","dateModified":"2025-06-16T02:47:26+00:00","description":"PTP offers a high-value security assessment to provide an evaluation of security practices and recommendations on areas for improvement.","breadcrumb":{"@id":"https:\/\/ptp.cloud\/security-assessment-from-ptp-elements-results-and-value\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ptp.cloud\/security-assessment-from-ptp-elements-results-and-value\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ptp.cloud\/security-assessment-from-ptp-elements-results-and-value\/#primaryimage","url":"https:\/\/ptp.cloud\/wp-content\/uploads\/2022\/01\/Security-Assessment-from-PTP-Elements-Results-and-Value.jpg","contentUrl":"https:\/\/ptp.cloud\/wp-content\/uploads\/2022\/01\/Security-Assessment-from-PTP-Elements-Results-and-Value.jpg","width":1200,"height":675},{"@type":"BreadcrumbList","@id":"https:\/\/ptp.cloud\/security-assessment-from-ptp-elements-results-and-value\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ptp.cloud\/"},{"@type":"ListItem","position":2,"name":"Security Assessment from PTP:\u00a0 Elements, Results and Value"}]},{"@type":"WebSite","@id":"https:\/\/ptp.cloud\/#website","url":"https:\/\/ptp.cloud\/","name":"PTP | Cloud Experts | Biotech Enablers","description":"Helping innovative life sciences companies to get treatments to market faster.","publisher":{"@id":"https:\/\/ptp.cloud\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ptp.cloud\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/ptp.cloud\/#organization","name":"Pinnacle Technology Partners","alternateName":"PTP","url":"https:\/\/ptp.cloud\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ptp.cloud\/#\/schema\/logo\/image\/","url":"https:\/\/ptp.cloud\/wp-content\/uploads\/2021\/08\/ptp_logo.png","contentUrl":"https:\/\/ptp.cloud\/wp-content\/uploads\/2021\/08\/ptp_logo.png","width":409,"height":181,"caption":"Pinnacle Technology Partners"},"image":{"@id":"https:\/\/ptp.cloud\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PTPCloud","https:\/\/x.com\/PTPCloud","https:\/\/www.linkedin.com\/company\/pinnacletechpartners","https:\/\/www.youtube.com\/@ptp4766"]},{"@type":"Person","@id":"https:\/\/ptp.cloud\/#\/schema\/person\/9164cae6fb27fb76f79e048d8dd2d8ab","name":"Gary Derheim"}]}},"jetpack_featured_media_url":"https:\/\/ptp.cloud\/wp-content\/uploads\/2022\/01\/Security-Assessment-from-PTP-Elements-Results-and-Value.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/posts\/5804","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/comments?post=5804"}],"version-history":[{"count":1,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/posts\/5804\/revisions"}],"predecessor-version":[{"id":16843,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/posts\/5804\/revisions\/16843"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/media\/16842"}],"wp:attachment":[{"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/media?parent=5804"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/categories?post=5804"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/tags?post=5804"},{"taxonomy":"table_tags","embeddable":true,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/table_tags?post=5804"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}