Computrek

computrek.ca

Computrek provides a wide array of innovative, practical, cost-effective solutions backed by commitment and unparalleled support to address your information management challenges. Computrek is the only independent technology solutions company in Northern Ontario that has been at the forefront of the IT industry in the North for over 35 years and has maintained its high success rate by forming trusting and mutually beneficial relationships with our clients. Our experienced staff, broad suite of partnerships, best-of-class product choices, and impeccable reputation position Computrek as a trusted business partner of choice.

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us

Events

Related News

Enterprise Security, Platform Security, Software Security

IDENTIV SIMPLIFIES CYBER-SECURE ACCESS CONTROL WITH PRIMIS

Business Wire | July 31, 2023

news image

Identiv, Inc. (NASDAQ: INVE), a global leader in digital security and identification in the Internet of Things (IoT), introduces Primis, a suite of access control solutions designed for every security need. Primis offers secure, affordable, and ready-to-use security solutions straight out of the box, streamlining access control for businesses of all sizes. The suite features Primis on-premises access control, Primis Cloud, Primis Mobile, and the EG-2 controller. By transforming ...

Read More

Data Security

WHEN SAFEGUARDING DIGITAL COMMUNICATIONS,IT SECURITY LEADERS COME ACROSS CONTINUED VULNERABILITIES

SafeGuard Cyber | July 13, 2021

news image

The only SaaS platform dedicated to managing the entire lifecycle of digital risk protection, SafeGuard Cyber, has released conclusions from a survey of 100 IT security leaders about their safeguarding digital communications and digital risk processes. The finding of the survey indicates that cybersecurity leaders recognize what is required for adequate digital risk protection. But, they are still dealing with boundaries and susceptibilities in defending these communications, such asthird-party ...

Read More

Data Security

CYBEREASON DISCOVERS GLOBAL BOTNET CAMPAIGN USING MICROSOFT EXCHANGE VULNERABILITIES

Cybereason | April 23, 2021

news image

Cybereason, the market leader in future-ready attack protection, reported today the discovery of a widespread, global campaign aimed at spreading the stealthy Prometei Botnet by attacking enterprises with a multi-stage attack to harvest computing power to mine bitcoin. To infiltrate networks, the threat actors, who tend to be Russian speakers, are exploiting previously disclosed Microsoft Exchange vulnerabilities used in the Hafnium attacks. Prometei has a sophisticated infrastruc...

Read More

Platform Security, Software Security, API Security

CEQUENCE STRENGTHENS API PROTECTION PLATFORM WITH GAME-CHANGING GENERATIVE AI AND NO-CODE SECURITY AUTOMATION

Businesswire | June 28, 2023

news image

Cequence Security, the leader in API Protection, today announced new updates to the Unified API Protection (UAP) platform that strengthen customers’ ability to discover, manage risk and protect APIs. With the latest capabilities, organizations can rapidly deploy API Security Testing with built-in generative AI automation, protect users from online fraud and operationalize security findings with low-code/no-code workflows. “We are always exploring ways to further auto...

Read More
news image

Enterprise Security, Platform Security, Software Security

IDENTIV SIMPLIFIES CYBER-SECURE ACCESS CONTROL WITH PRIMIS

Business Wire | July 31, 2023

Identiv, Inc. (NASDAQ: INVE), a global leader in digital security and identification in the Internet of Things (IoT), introduces Primis, a suite of access control solutions designed for every security need. Primis offers secure, affordable, and ready-to-use security solutions straight out of the box, streamlining access control for businesses of all sizes. The suite features Primis on-premises access control, Primis Cloud, Primis Mobile, and the EG-2 controller. By transforming ...

Read More
news image

Data Security

WHEN SAFEGUARDING DIGITAL COMMUNICATIONS,IT SECURITY LEADERS COME ACROSS CONTINUED VULNERABILITIES

SafeGuard Cyber | July 13, 2021

The only SaaS platform dedicated to managing the entire lifecycle of digital risk protection, SafeGuard Cyber, has released conclusions from a survey of 100 IT security leaders about their safeguarding digital communications and digital risk processes. The finding of the survey indicates that cybersecurity leaders recognize what is required for adequate digital risk protection. But, they are still dealing with boundaries and susceptibilities in defending these communications, such asthird-party ...

Read More
news image

Data Security

CYBEREASON DISCOVERS GLOBAL BOTNET CAMPAIGN USING MICROSOFT EXCHANGE VULNERABILITIES

Cybereason | April 23, 2021

Cybereason, the market leader in future-ready attack protection, reported today the discovery of a widespread, global campaign aimed at spreading the stealthy Prometei Botnet by attacking enterprises with a multi-stage attack to harvest computing power to mine bitcoin. To infiltrate networks, the threat actors, who tend to be Russian speakers, are exploiting previously disclosed Microsoft Exchange vulnerabilities used in the Hafnium attacks. Prometei has a sophisticated infrastruc...

Read More
news image

Platform Security, Software Security, API Security

CEQUENCE STRENGTHENS API PROTECTION PLATFORM WITH GAME-CHANGING GENERATIVE AI AND NO-CODE SECURITY AUTOMATION

Businesswire | June 28, 2023

Cequence Security, the leader in API Protection, today announced new updates to the Unified API Protection (UAP) platform that strengthen customers’ ability to discover, manage risk and protect APIs. With the latest capabilities, organizations can rapidly deploy API Security Testing with built-in generative AI automation, protect users from online fraud and operationalize security findings with low-code/no-code workflows. “We are always exploring ways to further auto...

Read More

Resources

resource image

Enterprise Security, Software Security, Cloud Security

Guide to Cloud Security Posture Management Tools

Whitepaper

resource image

Enterprise Security, Platform Security, Cloud Security

Exadata Database Service on Cloud@Customer Security Controls

Whitepaper

Events

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us