top of page
concept-person-suffering-from-cybersickness-technology-addiction.jpg

About

Your trusted cybersecurity partner since 2001

Since 2001, Teckel Technologies has been dedicated to providing cutting-edge cybersecurity solutions to businesses in Quebec. With over 25 years of experience in cybersecurity, network architecture and application security, our team of three expert leaders is dedicated to ensuring the optimal protection of your data and systems. We offer a proactive and personalized approach to meet the unique needs of each client.

Your safety, our priority.

A comprehensive approach to your safety.

At Teckel Technologies, we have developed a meticulous process to ensure the security of your data and systems. From initial analysis to continuous optimization, we support you every step of the way to ensure optimal protection and increased productivity.

Our process

We begin with a comprehensive analysis of your cybersecurity needs, identifying vulnerabilities and areas for improvement.

Analysis

1

We deploy necessary security measures and provide ongoing support to maintain the protection of your data.

Deployment and support

3

We develop a customized security plan for your business, integrating solutions tailored to your specific challenges.

Comprehensive security plan

2

We optimize your systems to improve their productivity, guaranteeing effective and sustainable cybersecurity.

Optimization and productivity

4

In addition to core training, we offer coaching sessions for IT teams, focusing on advanced security skills, incident management, and cyber threat response. We tailor our programs to different skill levels and ensure that participants leave the training with practical knowledge they can apply immediately.

With Teckel Technologies, you can strengthen your organization’s resilience by equipping your employees with the skills needed to prevent and respond to cyber threats. Our approach is focused on education, ensuring that each member of your team is a strong link in your company’s security chain.

PRO SERVICE.jpg

Train your teams in cybersecurity best practices.

Talk to an expert to arrange a training session tailored to your needs.

Subscribe to our newsletter

Be the first to receive the

latest news and updates.

Our Added Value

At Teckel Technologies, we follow meticulous procedures, supervised by top experts. Our approach is characterized by:

Quick
Response

We respond quickly to your cybersecurity needs, ensuring fast and effective protection.

Personalized Support

We offer personalized support, ensuring close collaboration and a deep understanding of your specific challenges.

Accessible Approach

Our team is easily accessible and always ready to assist you, making collaboration simple and seamless.

Extensive Experience

With a wealth of experience in the field of cybersecurity, we bring proven solutions to your challenges.

Coaching and Training

We offer coaching and training sessions for you and your team to improve your cybersecurity skills and ensure ongoing protection.

Academic Direction

Our management is composed of three university professors, bringing high-level academic expertise and knowledge at the cutting edge of cybersecurity research.

Our team

The Teckel Technologies team brings together passionate experts in cybersecurity, project management, and technological innovation. Each member, with their unique skills, works together to ensure the security and success of our customers through reliable and efficient solutions.

M. Eng., MBA, Technical Director, Network Security Architect and Engineer

Hector Bustillo

Hector.jpg

As a key network security architect, Hector ensures that security devices are aligned with the organization's compliance objectives.

MGP, MCSD, PMP, Project Manager, Application Security Manager

Thierry Giroux Watchful

Thierry.jpg

Thierry oversees ongoing IT projects and ensures that application security is maintained at every stage of development.

Information Security Analyst

Jonathan Bouchard Powley

John.jpg

John analyzes security data and works with teams to implement strategies that protect the organization's sensitive access and information.

Security Governance Analyst

Breem Hribar

Breem.JPG

Oversees security measures within organizations. Collaborates with IT teams to develop strategies for cybersecurity efforts. Writes policies, rules and regulations regarding cybersecurity decisions.

Security Analyst

Gabriel Debussche

Gabriel.jpg

Gabriel manages security solutions, organizes information protection efforts, and trains teams on new cybersecurity measures.

Head of Administration and Marketing, Scrum Master

Lelaña Hudson

Lelana.JPG

Lelaña oversees human resources and marketing initiatives, while ensuring the organization's legal and financial compliance.

bottom of page