Web & Email Protection
Data Backup & Protection
Security for mobile
Authentication & E-signatures
Security for Virtual Environments
Secutec was founded by Geert Baudewijns in September 2005 to meet the market’s needs for security solutions. The idea was to establish a strong link between vendors & distributors on the one hand, and professional clients on the other. The objective was to provide businesses with integrated security solutions for a fast, efficient, secure and enjoyable IT experience.
We add value to the products sold by offering complementary services. From installation to screening & monitoring to problem analysis & solving, our services cover every aspect of the security spectrum. Our support team is trained to provide fast and efficient security solutions. The members are genuine security experts, at your disposal 24 hours a day, 7 days a week.
McAfee has released a new patch of VSE, patch 5, which implements a variety of changes to how the Access protection feature of VSE operates. It has been detected that generally VSE Access Protection will stop acting as defined in its policy. What will happen when installing VSE Patch 5? Hard coded rule sets willRead more
Host Intrusion Prevention (Host IPS) 7.0 and 7.1 will reach End of Life (EOL) on December 31, 2015 Intel Security will not provide support for this version of the product or its related components beyond the end of life date. Intel Security strongly recommends that customers upgrade to the latest product version to ensure continuedRead more
Secutec services to maximize your return on investment.
We detect the weaknesses in your security architecture so you can counter them.
Installation of the acquired products by the Secutec engineers to ensure an optimal integration
We monitor your network security, so you have more time for your core business.
Learn to use the acquired products effectively.
Do you wonder how a hacker works? Ever wanted to hack yourself?
Now you can!
Knowing that the amount of unique malware samples per day increases in a very fast pace, we need to be aware of how to protect our environments even better!
After our previous courses, many participants valued this course as very interesting. They were all astonished and surprised on how easy a hacker can get access to your network!
In this training, ‘Hacking The Infrastructure’, you are starting as a blackhat hacker.