ETEK INTERNATIONAL CORPORATION

etek.com

Etek International Corporation is a leading Information Security solutions provider operating in Latin America, with headquarters in Miami, USA, and branch offices in Colombia and Peru and a joint venture (EtekNovared Brasil) in Brazil. Etek offers a complete range of services and technologies in the areas of consulting, education, supply, deployment, support, monitoring, management and operation of information security technologies. Etek partners with the best of breed InfoSec technology providers.. To ensure the use of best practices and standard methodologies in all its processes and management procedures, ETEK holds the ISO 9001:2000, the ISO/IEC 27001: 2005 and has been recommended for ISO 20000 (April, 2010).

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us

Events

Related News

Data Security

HITRUST I1 ASSESSMENT CONTROL SELECTION LEVERAGES SECURITY BEST PRACTICES, THREAT INTELLIGENCE

HITRUST | December 18, 2021

news image

HITRUST today announced it is addressing the need for a continuously-relevant cybersecurity assessment that aligns and incorporates best practices and leverages the latest threat intelligence to maintain applicability with information security risks and emerging cyber threats, such as ransomware. The design and selection of the controls for the HITRUST Implemented 1-year (i1) Assessment puts it in a new class of information security assessment that is threat-adaptive – designed to maintain...

Read More

Data Security, Platform Security, Software Security

SECURITY COMPASS RELEASES NEW STUDY: 2022 DEVELOPER PERSPECTIVES ON APPLICATION SECURITY

Security Compass | August 26, 2022

news image

Security Compass, a leading cybersecurity solution provider, has published the results of a research study examining developer views on application security, including the challenges and opportunities they face in their secure development efforts. The report, “2022 Developer Perspectives on Application Security,” provides a deep dive into security maturity, threats, requirements, tools, resources, and training. In order for software developers and security teams to eff...

Read More

Data Security

CYWARE ACHIEVES SOC 2 TYPE 2 COMPLIANCE FOR DATA SECURITY

Cyware | June 24, 2022

news image

Cyware, the industry's leading provider of the technology platform for building Cyber Fusion Centers for businesses and threat intelligence sharing for ISACs and ISAOs, announces the successful completion of the System and Organization Controls (SOC) 2 Type 2 Audit for the trust services criteria relevant to Security ("applicable trust services criteria") set forth in TSP section 100, Trust Services Criteria for Security, Availability, Processing Integrity, Confidentiality, and Int...

Read More

Network Threat Detection

AXONIUS INTEGRATES WITH THE NEW, ENHANCED AMAZON INSPECTOR TO DELIVER COMPREHENSIVE CYBER ASSET ATTACK SURFACE MANAGEMENT

Axonius | December 06, 2021

news image

Axonius, a leader in cybersecurity asset management, today announced an integration with the new Amazon Inspector, an automated security assessment service. The integration will enable mutual customers to better understand and manage vulnerabilities across their Amazon Web Services (AWS) infrastructure. Amazon Inspector is a vulnerability management service that continually scans AWS workloads for software vulnerabilities and unintended network exposure. The solution automatically...

Read More
news image

Data Security

HITRUST I1 ASSESSMENT CONTROL SELECTION LEVERAGES SECURITY BEST PRACTICES, THREAT INTELLIGENCE

HITRUST | December 18, 2021

HITRUST today announced it is addressing the need for a continuously-relevant cybersecurity assessment that aligns and incorporates best practices and leverages the latest threat intelligence to maintain applicability with information security risks and emerging cyber threats, such as ransomware. The design and selection of the controls for the HITRUST Implemented 1-year (i1) Assessment puts it in a new class of information security assessment that is threat-adaptive – designed to maintain...

Read More
news image

Data Security, Platform Security, Software Security

SECURITY COMPASS RELEASES NEW STUDY: 2022 DEVELOPER PERSPECTIVES ON APPLICATION SECURITY

Security Compass | August 26, 2022

Security Compass, a leading cybersecurity solution provider, has published the results of a research study examining developer views on application security, including the challenges and opportunities they face in their secure development efforts. The report, “2022 Developer Perspectives on Application Security,” provides a deep dive into security maturity, threats, requirements, tools, resources, and training. In order for software developers and security teams to eff...

Read More
news image

Data Security

CYWARE ACHIEVES SOC 2 TYPE 2 COMPLIANCE FOR DATA SECURITY

Cyware | June 24, 2022

Cyware, the industry's leading provider of the technology platform for building Cyber Fusion Centers for businesses and threat intelligence sharing for ISACs and ISAOs, announces the successful completion of the System and Organization Controls (SOC) 2 Type 2 Audit for the trust services criteria relevant to Security ("applicable trust services criteria") set forth in TSP section 100, Trust Services Criteria for Security, Availability, Processing Integrity, Confidentiality, and Int...

Read More
news image

Network Threat Detection

AXONIUS INTEGRATES WITH THE NEW, ENHANCED AMAZON INSPECTOR TO DELIVER COMPREHENSIVE CYBER ASSET ATTACK SURFACE MANAGEMENT

Axonius | December 06, 2021

Axonius, a leader in cybersecurity asset management, today announced an integration with the new Amazon Inspector, an automated security assessment service. The integration will enable mutual customers to better understand and manage vulnerabilities across their Amazon Web Services (AWS) infrastructure. Amazon Inspector is a vulnerability management service that continually scans AWS workloads for software vulnerabilities and unintended network exposure. The solution automatically...

Read More

Resources

Events

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us