top of page

พวกเราคือใคร

Steltek ก่อตั้งขึ้นในปี 2000 โดยมีพันธกิจเดียว นั่นคือ การเป็นเอเจนซี่ที่ปรึกษาที่ประสบความสำเร็จ สร้างสรรค์ และแหวกแนวที่สุดในซานฟรานซิสโก เราเข้าถึงลูกค้าแต่ละรายด้วยสายตาที่สดใหม่เพื่อพัฒนากลยุทธ์ที่ปรับแต่งเฉพาะตัวและไม่เหมือนใคร

แม้ว่าเราจะเติบโตขึ้นนับตั้งแต่ก่อตั้ง แต่เรายังคงเป็นเอเจนซี่เดียวกันในหัวใจ ให้เราช่วยทำให้ความฝันของคุณเป็นจริง คุณพร้อมที่จะกำหนดแบรนด์หรือธุรกิจของคุณบนเส้นทางสู่ความสำเร็จแล้วหรือยัง? โทรหาเราวันนี้และดูว่าเราสามารถทำอะไรให้คุณได้บ้าง

AK-4-BW.png
Dave-W-BW.png
Daniel-K-BW.png

รีส ไวท์แมน

Aaron has worked in the IT industry for over 20 years. Aaron brings his leadership skills  having lead large organisations at board and enterprise level.

จอร์แดน ปาร์คเกอร์

Dave has worked in the IT Security & Networking industry for over 20 years. Dave is a versatile and highly skilled Security Architect Dave combines his interpersonal, investigative, technical and business acumen to deliver high quality outcomes.

อเล็กซ์ สมิธ

Daniel Brings over 20 years  of experience as an Software Developer/Architect/Designer. Daniel has worked extensively in startups including significant experience working in cyber security startups.

Technology Partnerships​

Our Technology partnerships empower us to deliver innovative solutions by combining our expertise with industry-leading technologies, ensuring unparalleled value and performance for our clients.​

Zero Trust

Zero Trust​​Zero Trust operates on the principle of not automatically trusting anything inside or outside the network perimeter, requiring verification of all users and devices attempting to access resources.

    

SASE

SASE, or Secure Access Service Edge, is a network architecture that combines security and networking functions into a single cloud-based service, providing secure access to applications and data from any location.

OT/IT Convergence​

Secure OT/IT convergence refers to the integration of operational technology (OT) and information technology (IT) systems in a manner that ensures robust security measures are in place to protect critical infrastructure.​

shawnanggg-vdBE638sszE-unsplash.jpg

Network Segmentation​

Network segmentation is the practice of dividing a computer network into smaller, isolated segments or subnetworks to enhance security and control traffic flow within an organization's infrastructure.​

Technology Partners

We partner with vendors who have products that we can advise on, deploy, integrate an operate in areas including.

EDR

Endpoint detection and response (EDR) is a cybersecurity solution that continuously monitors and analyses endpoint activities to detect and respond to advanced threats and malicious activities in real-time.​

kim-tunger-Yb4n-5wWakM-unsplash.jpg

    

Managed XDR

Managed Extended Detection and Response (XDR) is a cybersecurity service that combines advanced threat detection, investigation, and response capabilities across multiple security layers.​

Allowlisting​

Application allow listing is a security approach that permits only approved applications to run on a system or network, enhancing protection against unauthorized software and potential security breaches.​

modestas-urbonas-vj_9l20fzj0-unsplash.jpg

PAM

Privileged access management (PAM) is a security strategy that controls and monitors access to privileged accounts, reducing the risk of unauthorized access and potential security breaches..

©2023 โดย Steltek Pty Ltd

bottom of page