{"id":8886,"date":"2020-03-26T05:14:14","date_gmt":"2020-03-26T09:14:14","guid":{"rendered":"https:\/\/ptp.cloud\/?p=8886"},"modified":"2025-06-16T01:46:33","modified_gmt":"2025-06-16T05:46:33","slug":"vulnerability-management","status":"publish","type":"post","link":"https:\/\/ptp.cloud\/vulnerability-management\/","title":{"rendered":"Vulnerability Management"},"content":{"rendered":"[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px|||||&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row column_structure=&#8221;2_5,3_5&#8243; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#e5f5ff&#8221; width=&#8221;96%&#8221; width_tablet=&#8221;96%&#8221; width_phone=&#8221;96%&#8221; width_last_edited=&#8221;on|desktop&#8221; custom_margin=&#8221;28px|auto||auto||&#8221; custom_padding=&#8221;34px|24px|25px|37px|false|false&#8221; border_radii=&#8221;on|13px|13px|13px|13px&#8221; border_width_all=&#8221;1px&#8221; border_color_all=&#8221;#47ddff&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/ptp.cloud\/wp-content\/uploads\/2024\/04\/PTP-Vulnerability-Management-232&#215;300.jpg&#8221; alt=&#8221;This image shows the first page of our whitepaper, %22Vulnerability Management with PeakPlus SECURE%22&#8243; title_text=&#8221;PTP-Vulnerability-Management&#8221; url=&#8221;https:\/\/ptp.cloud\/wp-content\/uploads\/2024\/08\/PTP-Vulnerability-Management.pdf&#8221; url_new_window=&#8221;on&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; box_shadow_style=&#8221;preset2&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; header_2_font_size=&#8221;23px&#8221; custom_padding=&#8221;|0px||||&#8221; global_colors_info=&#8221;{}&#8221;]\n<h2>Elevate Your Security with Vulnerability Management: An Introduction to PeakPlus SECURE<\/h2>\n<p>Stay a step ahead of the threats with PTP&#8217;s Vulnerability Management, a crucial component of our PeakPlus\u2122 SECURE suite. This service is designed to continuously scan and identify vulnerabilities within your environment, ensuring compliance with standards like PCI DSS 11.2. Unlike traditional tools that often overwhelm with data, our solution delivers actionable insights through user-friendly dashboards and reports, tailored for every level from executives to admins. With PTP, you gain access to an expert team ready to guide your remediation efforts, turning vulnerability management into a strategic advantage for your business.<\/p>\n[\/et_pb_text][et_pb_button button_url=&#8221;https:\/\/ptp.cloud\/wp-content\/uploads\/2024\/08\/PTP-Vulnerability-Management.pdf&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;Download Now&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_color=&#8221;#ffffff&#8221; button_bg_color=&#8221;#2f348d&#8221; button_border_color=&#8221;#2f348d&#8221; button_font=&#8221;Ubuntu||||||||&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_4,3_4&#8243; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;41px||10px|||&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/11\/peak-plus-secure-logo.png&#8221; title_text=&#8221;aws-seal&#8221; url=&#8221;https:\/\/ptp.cloud\/services\/secops\/managed-security\/&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; width=&#8221;100%&#8221; custom_padding=&#8221;|0px||||&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;3_4&#8243; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]\n<p>In the modern cybersecurity landscape, vulnerability management plays a crucial role in protecting your business from threats. By identifying and remediating security vulnerabilities, you can reduce the risk of data loss and ensure compliance with industry standards. Pinnacle Technology Partners (PTP) offers the PeakPlus SECURE Vulnerability Management solution, designed to help businesses stay ahead of threats and maintain a robust security posture.<\/p>\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px|||||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]\n<p><strong>The Importance of Vulnerability Management<\/strong><br \/>Vulnerability management is the ongoing process of scanning your environment for security weaknesses and addressing them before they lead to data breaches or other security incidents. It&#8217;s a critical component of compliance with standards like PCI DSS 11.2 and should be integrated into a comprehensive security strategy\u200b\u200b.<\/p>\n<p>By implementing vulnerability management, you can take a proactive approach to security, identifying vulnerabilities before adversaries do. This ongoing process ensures that you are continuously monitoring for potential risks and addressing them promptly to protect your business.<\/p>\n<p><strong>What Makes <a href=\"https:\/\/ptp.cloud\/services\/secops\/managed-security\/\">PeakPlus SECURE<\/a> Different?<\/strong><br \/>Many vulnerability scanning platforms use the Common Vulnerabilities and Exposures (CVE) database to identify security issues. However, most tools struggle with delivering information in a way that IT professionals can use to prioritize remediation actions. Compliance-focused reports might meet audit requirements but often fail to provide actionable insights for IT teams\u200b\u200b.<\/p>\n<p>PeakPlus SECURE addresses this gap by combining robust tools with intuitive dashboards and reporting designed for all user types\u2014from executives to administrators. This comprehensive approach allows your team to prioritize remediation effectively and make informed decisions about security.<\/p>\n<p><strong>Why Choose PeakPlus SECURE?<\/strong><br \/>Vulnerability management tools often go unused or unoptimized due to inconsistent processes or inadequate reporting. PeakPlus SECURE addresses these challenges with efficient, highly automated tools that minimize costs while empowering customers with the information they need\u200b\u200b.<\/p>\n<p>The service offers several key benefits:<\/p>\n<p>Comprehensive Scanning: Routine scanning of your environment for security vulnerabilities, providing a detailed risk score for each vulnerability.<br \/>User-Friendly Dashboards: Dashboards and reports that cater to different user types, ensuring that all stakeholders have access to relevant information.<br \/>Expert Support: An expert team of security professionals who can help interpret data and provide guidance on remediation when needed.<\/p>\n<p><a href=\"https:\/\/ptp.cloud\/services\/peakplus\/\"><strong>PeakPlus Suite of Managed Services<\/strong><\/a><br \/>In addition to vulnerability management, PTP&#8217;s PeakPlus suite offers a range of managed services to support your business&#8217;s cloud and network infrastructure:<\/p>\n<p><a href=\"https:\/\/ptp.cloud\/services\/netops\/managed-networks\/\">PeakPlus MANAGE<\/a>: Managed network and data center services.<br \/><a href=\"https:\/\/ptp.cloud\/services\/finops\/cloud-optimization-and-management\/\">PeakPlus CONTROL<\/a>: Cloud management services.<\/p>\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]\n<span class=\"et_bloom_bottom_trigger\"><\/span>","protected":false},"excerpt":{"rendered":"<p>Elevate Your Security with Vulnerability Management: An Introduction to PeakPlus SECURE Stay a step ahead of the threats with PTP&#8217;s Vulnerability Management, a crucial component of our PeakPlus\u2122 SECURE suite. This service is designed to continuously scan and identify vulnerabilities within your environment, ensuring compliance with standards like PCI DSS 11.2. Unlike traditional tools that [&hellip;]<\/p>\n","protected":false},"author":445,"featured_media":16879,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[178,10],"tags":[],"table_tags":[],"class_list":["post-8886","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-datasheets-archive","category-secops-archive"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.1.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Vulnerability Management | PTP News<\/title>\n<meta name=\"description\" content=\"Discover how our Vulnerability Management solutions protect your IT infrastructure with proactive strategies and advanced threat intelligence.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ptp.cloud\/vulnerability-management\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vulnerability Management | PTP News\" \/>\n<meta property=\"og:description\" content=\"Discover how our Vulnerability Management solutions protect your IT infrastructure with proactive strategies and advanced threat intelligence.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ptp.cloud\/vulnerability-management\/\" \/>\n<meta property=\"og:site_name\" content=\"PTP | Cloud Experts | Biotech Enablers\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PTPCloud\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-26T09:14:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-16T05:46:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/03\/vulnerability-management-life-sciences-cybersecurity.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Mai Hiraoka\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PTPCloud\" \/>\n<meta name=\"twitter:site\" content=\"@PTPCloud\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mai Hiraoka\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ptp.cloud\/vulnerability-management\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ptp.cloud\/vulnerability-management\/\"},\"author\":{\"name\":\"Mai Hiraoka\",\"@id\":\"https:\/\/ptp.cloud\/#\/schema\/person\/d306a15db3b78f40bef20f1fafd81aa2\"},\"headline\":\"Vulnerability Management\",\"datePublished\":\"2020-03-26T09:14:14+00:00\",\"dateModified\":\"2025-06-16T05:46:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ptp.cloud\/vulnerability-management\/\"},\"wordCount\":929,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/ptp.cloud\/#organization\"},\"image\":{\"@id\":\"https:\/\/ptp.cloud\/vulnerability-management\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/03\/vulnerability-management-life-sciences-cybersecurity.jpg\",\"articleSection\":[\"Datasheets\",\"SecOps\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/ptp.cloud\/vulnerability-management\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ptp.cloud\/vulnerability-management\/\",\"url\":\"https:\/\/ptp.cloud\/vulnerability-management\/\",\"name\":\"Vulnerability Management | PTP News\",\"isPartOf\":{\"@id\":\"https:\/\/ptp.cloud\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ptp.cloud\/vulnerability-management\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ptp.cloud\/vulnerability-management\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/03\/vulnerability-management-life-sciences-cybersecurity.jpg\",\"datePublished\":\"2020-03-26T09:14:14+00:00\",\"dateModified\":\"2025-06-16T05:46:33+00:00\",\"description\":\"Discover how our Vulnerability Management solutions protect your IT infrastructure with proactive strategies and advanced threat intelligence.\",\"breadcrumb\":{\"@id\":\"https:\/\/ptp.cloud\/vulnerability-management\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ptp.cloud\/vulnerability-management\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ptp.cloud\/vulnerability-management\/#primaryimage\",\"url\":\"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/03\/vulnerability-management-life-sciences-cybersecurity.jpg\",\"contentUrl\":\"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/03\/vulnerability-management-life-sciences-cybersecurity.jpg\",\"width\":1200,\"height\":675},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ptp.cloud\/vulnerability-management\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/ptp.cloud\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vulnerability Management\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ptp.cloud\/#website\",\"url\":\"https:\/\/ptp.cloud\/\",\"name\":\"PTP | Cloud Experts | Biotech Enablers\",\"description\":\"Helping innovative life sciences companies to get treatments to market faster.\",\"publisher\":{\"@id\":\"https:\/\/ptp.cloud\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ptp.cloud\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ptp.cloud\/#organization\",\"name\":\"Pinnacle Technology Partners\",\"alternateName\":\"PTP\",\"url\":\"https:\/\/ptp.cloud\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ptp.cloud\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ptp.cloud\/wp-content\/uploads\/2021\/08\/ptp_logo.png\",\"contentUrl\":\"https:\/\/ptp.cloud\/wp-content\/uploads\/2021\/08\/ptp_logo.png\",\"width\":409,\"height\":181,\"caption\":\"Pinnacle Technology Partners\"},\"image\":{\"@id\":\"https:\/\/ptp.cloud\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PTPCloud\",\"https:\/\/x.com\/PTPCloud\",\"https:\/\/www.linkedin.com\/company\/pinnacletechpartners\",\"https:\/\/www.youtube.com\/@ptp4766\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/ptp.cloud\/#\/schema\/person\/d306a15db3b78f40bef20f1fafd81aa2\",\"name\":\"Mai Hiraoka\",\"sameAs\":[\"https:\/\/ptpcloud.mystagingwebsite.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vulnerability Management | PTP News","description":"Discover how our Vulnerability Management solutions protect your IT infrastructure with proactive strategies and advanced threat intelligence.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ptp.cloud\/vulnerability-management\/","og_locale":"en_US","og_type":"article","og_title":"Vulnerability Management | PTP News","og_description":"Discover how our Vulnerability Management solutions protect your IT infrastructure with proactive strategies and advanced threat intelligence.","og_url":"https:\/\/ptp.cloud\/vulnerability-management\/","og_site_name":"PTP | Cloud Experts | Biotech Enablers","article_publisher":"https:\/\/www.facebook.com\/PTPCloud","article_published_time":"2020-03-26T09:14:14+00:00","article_modified_time":"2025-06-16T05:46:33+00:00","og_image":[{"width":1200,"height":675,"url":"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/03\/vulnerability-management-life-sciences-cybersecurity.jpg","type":"image\/jpeg"}],"author":"Mai Hiraoka","twitter_card":"summary_large_image","twitter_creator":"@PTPCloud","twitter_site":"@PTPCloud","twitter_misc":{"Written by":"Mai Hiraoka","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ptp.cloud\/vulnerability-management\/#article","isPartOf":{"@id":"https:\/\/ptp.cloud\/vulnerability-management\/"},"author":{"name":"Mai Hiraoka","@id":"https:\/\/ptp.cloud\/#\/schema\/person\/d306a15db3b78f40bef20f1fafd81aa2"},"headline":"Vulnerability Management","datePublished":"2020-03-26T09:14:14+00:00","dateModified":"2025-06-16T05:46:33+00:00","mainEntityOfPage":{"@id":"https:\/\/ptp.cloud\/vulnerability-management\/"},"wordCount":929,"commentCount":0,"publisher":{"@id":"https:\/\/ptp.cloud\/#organization"},"image":{"@id":"https:\/\/ptp.cloud\/vulnerability-management\/#primaryimage"},"thumbnailUrl":"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/03\/vulnerability-management-life-sciences-cybersecurity.jpg","articleSection":["Datasheets","SecOps"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ptp.cloud\/vulnerability-management\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ptp.cloud\/vulnerability-management\/","url":"https:\/\/ptp.cloud\/vulnerability-management\/","name":"Vulnerability Management | PTP News","isPartOf":{"@id":"https:\/\/ptp.cloud\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ptp.cloud\/vulnerability-management\/#primaryimage"},"image":{"@id":"https:\/\/ptp.cloud\/vulnerability-management\/#primaryimage"},"thumbnailUrl":"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/03\/vulnerability-management-life-sciences-cybersecurity.jpg","datePublished":"2020-03-26T09:14:14+00:00","dateModified":"2025-06-16T05:46:33+00:00","description":"Discover how our Vulnerability Management solutions protect your IT infrastructure with proactive strategies and advanced threat intelligence.","breadcrumb":{"@id":"https:\/\/ptp.cloud\/vulnerability-management\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ptp.cloud\/vulnerability-management\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ptp.cloud\/vulnerability-management\/#primaryimage","url":"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/03\/vulnerability-management-life-sciences-cybersecurity.jpg","contentUrl":"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/03\/vulnerability-management-life-sciences-cybersecurity.jpg","width":1200,"height":675},{"@type":"BreadcrumbList","@id":"https:\/\/ptp.cloud\/vulnerability-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ptp.cloud\/"},{"@type":"ListItem","position":2,"name":"Vulnerability Management"}]},{"@type":"WebSite","@id":"https:\/\/ptp.cloud\/#website","url":"https:\/\/ptp.cloud\/","name":"PTP | Cloud Experts | Biotech Enablers","description":"Helping innovative life sciences companies to get treatments to market faster.","publisher":{"@id":"https:\/\/ptp.cloud\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ptp.cloud\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/ptp.cloud\/#organization","name":"Pinnacle Technology Partners","alternateName":"PTP","url":"https:\/\/ptp.cloud\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ptp.cloud\/#\/schema\/logo\/image\/","url":"https:\/\/ptp.cloud\/wp-content\/uploads\/2021\/08\/ptp_logo.png","contentUrl":"https:\/\/ptp.cloud\/wp-content\/uploads\/2021\/08\/ptp_logo.png","width":409,"height":181,"caption":"Pinnacle Technology Partners"},"image":{"@id":"https:\/\/ptp.cloud\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PTPCloud","https:\/\/x.com\/PTPCloud","https:\/\/www.linkedin.com\/company\/pinnacletechpartners","https:\/\/www.youtube.com\/@ptp4766"]},{"@type":"Person","@id":"https:\/\/ptp.cloud\/#\/schema\/person\/d306a15db3b78f40bef20f1fafd81aa2","name":"Mai Hiraoka","sameAs":["https:\/\/ptpcloud.mystagingwebsite.com"]}]}},"jetpack_featured_media_url":"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/03\/vulnerability-management-life-sciences-cybersecurity.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/posts\/8886","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/users\/445"}],"replies":[{"embeddable":true,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/comments?post=8886"}],"version-history":[{"count":1,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/posts\/8886\/revisions"}],"predecessor-version":[{"id":16880,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/posts\/8886\/revisions\/16880"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/media\/16879"}],"wp:attachment":[{"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/media?parent=8886"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/categories?post=8886"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/tags?post=8886"},{"taxonomy":"table_tags","embeddable":true,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/table_tags?post=8886"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}