{"id":8892,"date":"2020-03-26T05:18:35","date_gmt":"2020-03-26T09:18:35","guid":{"rendered":"https:\/\/ptp.cloud\/?p=8892"},"modified":"2025-06-16T01:42:12","modified_gmt":"2025-06-16T05:42:12","slug":"security-assessment","status":"publish","type":"post","link":"https:\/\/ptp.cloud\/security-assessment\/","title":{"rendered":"Security Assessment"},"content":{"rendered":"[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px||0px|||&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row column_structure=&#8221;2_5,3_5&#8243; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#e5f5ff&#8221; width=&#8221;98%&#8221; width_tablet=&#8221;98%&#8221; width_phone=&#8221;98%&#8221; width_last_edited=&#8221;on|desktop&#8221; custom_padding=&#8221;28px|41px|25px|37px|false|false&#8221; border_radii=&#8221;on|13px|13px|13px|13px&#8221; border_width_all=&#8221;1px&#8221; border_color_all=&#8221;#47ddff&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/ptp.cloud\/wp-content\/uploads\/2024\/04\/PTP-Security-Assessment-232&#215;300.jpg&#8221; alt=&#8221;This is the cover page of our whitepaper, %22Security Assessment with PeakPlus SECURE%22&#8243; title_text=&#8221;PTP-Security-Assessment&#8221; url=&#8221;https:\/\/ptp.cloud\/wp-content\/uploads\/2024\/08\/PTP-Security-Assessment.pdf&#8221; url_new_window=&#8221;on&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; box_shadow_style=&#8221;preset2&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; header_2_font_size=&#8221;23px&#8221; global_colors_info=&#8221;{}&#8221;]\n<h2><strong>Secure Your Digital Horizon with PTP Security Assessment<\/strong><\/h2>\n<p>Uncover hidden threats and fortify your network with PTP&#8217;s comprehensive 14-day Security Assessment. Our PeakPlus\u2122 SECURE suite leverages the expertise of certified ethical hackers and CISSPs to provide a clear evaluation of your security landscape. Addressing challenges from blind spots to bandwidth, we offer actionable insights into improving your enterprise security strategy. Gain confidence in your security measures with our detailed assessment process, including network statistics, risk identification, and tailored recommendations. Let PTP guide you to a more secure and resilient digital environment.<\/p>\n[\/et_pb_text][et_pb_button button_url=&#8221;https:\/\/ptp.cloud\/wp-content\/uploads\/2024\/08\/PTP-Security-Assessment.pdf&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;Download Now&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_color=&#8221;#ffffff&#8221; button_bg_color=&#8221;#2f348d&#8221; button_border_color=&#8221;#2f348d&#8221; button_font=&#8221;Ubuntu||||||||&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_4,3_4&#8243; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;|auto|-17px|auto||&#8221; custom_padding=&#8221;41px|||||&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/11\/peak-plus-secure-logo.png&#8221; url=&#8221;https:\/\/ptp.cloud\/services\/secops\/managed-security\/&#8221; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;3_4&#8243; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]\n<h2>Strengthen Your Security with PTP&#8217;s Security Assessment<\/h2>\n<p>In today&#8217;s digital landscape, security threats are constantly evolving, making it challenging for businesses to stay ahead of the curve. Pinnacle Technology Partners (PTP) offers a comprehensive security assessment designed to help you identify and address vulnerabilities in your infrastructure, ensuring your sensitive data is protected.<\/p>\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]\n<p><strong>Why Security Assessments Matter<\/strong><br \/>The most dangerous threats are often the ones you can&#8217;t see. To protect your business, you need visibility into your entire infrastructure and the ability to detect threats before they cause damage. However, with the rapid pace of change in the security landscape and a shortage of skilled IT staff, maintaining a robust security posture can be daunting.<\/p>\n<p>PTP&#8217;s 14-day security assessment is the first step in creating or expanding an effective information security program. Their team of certified ethical hackers and Certified Information Systems Security Professionals (CISSPs) is uniquely qualified to deliver the clarity and solutions you need to gain confidence in your enterprise security program\u200b\u200b.<\/p>\n<p><strong>Challenges Addressed by the Security Assessment<\/strong><br \/>PTP&#8217;s security assessment is designed to address common challenges faced by businesses in today&#8217;s security landscape:<\/p>\n<ul>\n<li>Blind Spots: Limitations of current technology in detecting, preventing, and recovering from breaches.<\/li>\n<li>Visibility: The inability to protect what you can&#8217;t see; understanding asset inventory.<\/li>\n<li>Context: Understanding how current applications and datasets are used by the user community.<\/li>\n<li>Noise: The overwhelming volume of vendor offerings and the difficulty in identifying their unique features.<\/li>\n<li>Bandwidth: Combating the IT talent shortage while doing more with fewer resources\u200b.<\/li>\n<\/ul>\n<p><strong>Security Assessment Goals and Benefits<\/strong><br \/>The security assessment from PTP provides several key benefits:<\/p>\n<ul>\n<li>Understand Your Security State: Gain a clear understanding of your current security posture and network foundation.<\/li>\n<li>Identify Areas for Improvement: Find areas where your enterprise security strategy can be improved.<\/li>\n<li>Guidance and Education: Receive expert guidance on various security technologies and their features\/benefits.<\/li>\n<li>Adoption Planning and Governance: Get assistance with planning and implementing security strategies.<\/li>\n<li>Increased Confidence: Ensure your security tools are audited and inspected for effectiveness.<\/li>\n<li>Extra Help: Access additional resources to support your security needs\u200b\u200b.<br \/><strong><\/strong><\/li>\n<\/ul>\n<p><strong>Assessment Methodology and Deliverables<\/strong><br \/>PTP&#8217;s security assessment follows a structured methodology to ensure a thorough evaluation of your infrastructure:<\/p>\n<ul>\n<li>Kick-off Call: Discuss the assessment process and define network elements for scoping.<\/li>\n<li>Assessment Tool Deployment: Deploy the assessment tool to review network statistics, SMB risk, unauthorized hosts, DNS malware or data loss, Telnet risks, remote access breaches, and high-risk country activity.<\/li>\n<li>Comprehensive Report: After a 14-day assessment period, receive a comprehensive report detailing the findings.<\/li>\n<li>Findings Review Meeting: Discuss the findings and receive actionable recommendations\u200b.<br \/><strong><\/strong><\/li>\n<\/ul>\n<p><a href=\"https:\/\/ptp.cloud\/services\/peakplus\/\"><strong>PTP&#8217;s PeakPlus Suite<\/strong><\/a><br \/>In addition to the security assessment, PTP offers a suite of managed services to support your business&#8217;s cloud and network infrastructure:<\/p>\n<p><a href=\"https:\/\/ptp.cloud\/services\/netops\/managed-networks\/\">PeakPlus MANAGE<\/a>: Managed network and data center services.<br \/><a href=\"https:\/\/ptp.cloud\/services\/secops\/managed-security\/\">PeakPlus SECURE<\/a>: Managed security services.<br \/><a href=\"https:\/\/ptp.cloud\/services\/finops\/cloud-optimization-and-management\/\">PeakPlus CONTROL<\/a>: Cloud management services.<\/p>\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]\n<span class=\"et_bloom_bottom_trigger\"><\/span>","protected":false},"excerpt":{"rendered":"<p>Secure Your Digital Horizon with PTP Security Assessment Uncover hidden threats and fortify your network with PTP&#8217;s comprehensive 14-day Security Assessment. Our PeakPlus\u2122 SECURE suite leverages the expertise of certified ethical hackers and CISSPs to provide a clear evaluation of your security landscape. Addressing challenges from blind spots to bandwidth, we offer actionable insights into [&hellip;]<\/p>\n","protected":false},"author":445,"featured_media":16876,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[178,10],"tags":[],"table_tags":[],"class_list":["post-8892","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-datasheets-archive","category-secops-archive"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.1.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Security Assessment - PTP | Cloud Experts | Biotech Enablers<\/title>\n<meta name=\"description\" content=\"Strengthen your network with PTP&#039;s 14-day Security Assessment and expert insights for an enhanced enterprise security strategy.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ptp.cloud\/security-assessment\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Assessment - PTP | Cloud Experts | Biotech Enablers\" \/>\n<meta property=\"og:description\" content=\"Strengthen your network with PTP&#039;s 14-day Security Assessment and expert insights for an enhanced enterprise security strategy.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ptp.cloud\/security-assessment\/\" \/>\n<meta property=\"og:site_name\" content=\"PTP | Cloud Experts | Biotech Enablers\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PTPCloud\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-26T09:18:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-16T05:42:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/03\/security-assessment-life-sciences-it-compliance.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Mai Hiraoka\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PTPCloud\" \/>\n<meta name=\"twitter:site\" content=\"@PTPCloud\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mai Hiraoka\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ptp.cloud\/security-assessment\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ptp.cloud\/security-assessment\/\"},\"author\":{\"name\":\"Mai Hiraoka\",\"@id\":\"https:\/\/ptp.cloud\/#\/schema\/person\/d306a15db3b78f40bef20f1fafd81aa2\"},\"headline\":\"Security Assessment\",\"datePublished\":\"2020-03-26T09:18:35+00:00\",\"dateModified\":\"2025-06-16T05:42:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ptp.cloud\/security-assessment\/\"},\"wordCount\":993,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/ptp.cloud\/#organization\"},\"image\":{\"@id\":\"https:\/\/ptp.cloud\/security-assessment\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/03\/security-assessment-life-sciences-it-compliance.jpg\",\"articleSection\":[\"Datasheets\",\"SecOps\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/ptp.cloud\/security-assessment\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ptp.cloud\/security-assessment\/\",\"url\":\"https:\/\/ptp.cloud\/security-assessment\/\",\"name\":\"Security Assessment - PTP | Cloud Experts | Biotech Enablers\",\"isPartOf\":{\"@id\":\"https:\/\/ptp.cloud\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ptp.cloud\/security-assessment\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ptp.cloud\/security-assessment\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/03\/security-assessment-life-sciences-it-compliance.jpg\",\"datePublished\":\"2020-03-26T09:18:35+00:00\",\"dateModified\":\"2025-06-16T05:42:12+00:00\",\"description\":\"Strengthen your network with PTP's 14-day Security Assessment and expert insights for an enhanced enterprise security strategy.\",\"breadcrumb\":{\"@id\":\"https:\/\/ptp.cloud\/security-assessment\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ptp.cloud\/security-assessment\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ptp.cloud\/security-assessment\/#primaryimage\",\"url\":\"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/03\/security-assessment-life-sciences-it-compliance.jpg\",\"contentUrl\":\"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/03\/security-assessment-life-sciences-it-compliance.jpg\",\"width\":1200,\"height\":675},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ptp.cloud\/security-assessment\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/ptp.cloud\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Assessment\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ptp.cloud\/#website\",\"url\":\"https:\/\/ptp.cloud\/\",\"name\":\"PTP | Cloud Experts | Biotech Enablers\",\"description\":\"Helping innovative life sciences companies to get treatments to market faster.\",\"publisher\":{\"@id\":\"https:\/\/ptp.cloud\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ptp.cloud\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ptp.cloud\/#organization\",\"name\":\"Pinnacle Technology Partners\",\"alternateName\":\"PTP\",\"url\":\"https:\/\/ptp.cloud\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ptp.cloud\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ptp.cloud\/wp-content\/uploads\/2021\/08\/ptp_logo.png\",\"contentUrl\":\"https:\/\/ptp.cloud\/wp-content\/uploads\/2021\/08\/ptp_logo.png\",\"width\":409,\"height\":181,\"caption\":\"Pinnacle Technology Partners\"},\"image\":{\"@id\":\"https:\/\/ptp.cloud\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PTPCloud\",\"https:\/\/x.com\/PTPCloud\",\"https:\/\/www.linkedin.com\/company\/pinnacletechpartners\",\"https:\/\/www.youtube.com\/@ptp4766\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/ptp.cloud\/#\/schema\/person\/d306a15db3b78f40bef20f1fafd81aa2\",\"name\":\"Mai Hiraoka\",\"sameAs\":[\"https:\/\/ptpcloud.mystagingwebsite.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security Assessment - PTP | Cloud Experts | Biotech Enablers","description":"Strengthen your network with PTP's 14-day Security Assessment and expert insights for an enhanced enterprise security strategy.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ptp.cloud\/security-assessment\/","og_locale":"en_US","og_type":"article","og_title":"Security Assessment - PTP | Cloud Experts | Biotech Enablers","og_description":"Strengthen your network with PTP's 14-day Security Assessment and expert insights for an enhanced enterprise security strategy.","og_url":"https:\/\/ptp.cloud\/security-assessment\/","og_site_name":"PTP | Cloud Experts | Biotech Enablers","article_publisher":"https:\/\/www.facebook.com\/PTPCloud","article_published_time":"2020-03-26T09:18:35+00:00","article_modified_time":"2025-06-16T05:42:12+00:00","og_image":[{"width":1200,"height":675,"url":"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/03\/security-assessment-life-sciences-it-compliance.jpg","type":"image\/jpeg"}],"author":"Mai Hiraoka","twitter_card":"summary_large_image","twitter_creator":"@PTPCloud","twitter_site":"@PTPCloud","twitter_misc":{"Written by":"Mai Hiraoka","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ptp.cloud\/security-assessment\/#article","isPartOf":{"@id":"https:\/\/ptp.cloud\/security-assessment\/"},"author":{"name":"Mai Hiraoka","@id":"https:\/\/ptp.cloud\/#\/schema\/person\/d306a15db3b78f40bef20f1fafd81aa2"},"headline":"Security Assessment","datePublished":"2020-03-26T09:18:35+00:00","dateModified":"2025-06-16T05:42:12+00:00","mainEntityOfPage":{"@id":"https:\/\/ptp.cloud\/security-assessment\/"},"wordCount":993,"commentCount":0,"publisher":{"@id":"https:\/\/ptp.cloud\/#organization"},"image":{"@id":"https:\/\/ptp.cloud\/security-assessment\/#primaryimage"},"thumbnailUrl":"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/03\/security-assessment-life-sciences-it-compliance.jpg","articleSection":["Datasheets","SecOps"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ptp.cloud\/security-assessment\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ptp.cloud\/security-assessment\/","url":"https:\/\/ptp.cloud\/security-assessment\/","name":"Security Assessment - PTP | Cloud Experts | Biotech Enablers","isPartOf":{"@id":"https:\/\/ptp.cloud\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ptp.cloud\/security-assessment\/#primaryimage"},"image":{"@id":"https:\/\/ptp.cloud\/security-assessment\/#primaryimage"},"thumbnailUrl":"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/03\/security-assessment-life-sciences-it-compliance.jpg","datePublished":"2020-03-26T09:18:35+00:00","dateModified":"2025-06-16T05:42:12+00:00","description":"Strengthen your network with PTP's 14-day Security Assessment and expert insights for an enhanced enterprise security strategy.","breadcrumb":{"@id":"https:\/\/ptp.cloud\/security-assessment\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ptp.cloud\/security-assessment\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ptp.cloud\/security-assessment\/#primaryimage","url":"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/03\/security-assessment-life-sciences-it-compliance.jpg","contentUrl":"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/03\/security-assessment-life-sciences-it-compliance.jpg","width":1200,"height":675},{"@type":"BreadcrumbList","@id":"https:\/\/ptp.cloud\/security-assessment\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ptp.cloud\/"},{"@type":"ListItem","position":2,"name":"Security Assessment"}]},{"@type":"WebSite","@id":"https:\/\/ptp.cloud\/#website","url":"https:\/\/ptp.cloud\/","name":"PTP | Cloud Experts | Biotech Enablers","description":"Helping innovative life sciences companies to get treatments to market faster.","publisher":{"@id":"https:\/\/ptp.cloud\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ptp.cloud\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/ptp.cloud\/#organization","name":"Pinnacle Technology Partners","alternateName":"PTP","url":"https:\/\/ptp.cloud\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ptp.cloud\/#\/schema\/logo\/image\/","url":"https:\/\/ptp.cloud\/wp-content\/uploads\/2021\/08\/ptp_logo.png","contentUrl":"https:\/\/ptp.cloud\/wp-content\/uploads\/2021\/08\/ptp_logo.png","width":409,"height":181,"caption":"Pinnacle Technology Partners"},"image":{"@id":"https:\/\/ptp.cloud\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PTPCloud","https:\/\/x.com\/PTPCloud","https:\/\/www.linkedin.com\/company\/pinnacletechpartners","https:\/\/www.youtube.com\/@ptp4766"]},{"@type":"Person","@id":"https:\/\/ptp.cloud\/#\/schema\/person\/d306a15db3b78f40bef20f1fafd81aa2","name":"Mai Hiraoka","sameAs":["https:\/\/ptpcloud.mystagingwebsite.com"]}]}},"jetpack_featured_media_url":"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/03\/security-assessment-life-sciences-it-compliance.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/posts\/8892","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/users\/445"}],"replies":[{"embeddable":true,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/comments?post=8892"}],"version-history":[{"count":1,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/posts\/8892\/revisions"}],"predecessor-version":[{"id":16877,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/posts\/8892\/revisions\/16877"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/media\/16876"}],"wp:attachment":[{"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/media?parent=8892"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/categories?post=8892"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/tags?post=8892"},{"taxonomy":"table_tags","embeddable":true,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/table_tags?post=8892"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}