{"id":21305,"date":"2021-07-12T20:10:58","date_gmt":"2021-07-12T18:10:58","guid":{"rendered":"https://hightechsoftwarecluster.com/uncategorized/compumatica-secure-networks/"},"modified":"2021-12-02T16:38:03","modified_gmt":"2021-12-02T15:38:03","slug":"compumatica-secure-networks","status":"publish","type":"post","link":"https://hightechsoftwarecluster.com/en/members/compumatica-secure-networks/","title":{"rendered":"Compumatica secure networks"},"content":{"rendered":"
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t\n\t\t\t\t\t\t\n\t\t
\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t
\n\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t
Home | Members | Compumatica secure networks
\t\t
\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\"htsc-digibee-compumatica-secure-networks\"\t\t\t\t\t\t\t\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t

Compumatica
secure networks

\t\t
\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t
\n\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\"logo\t\t\t\t\t\t\t\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t

Old Udenseweg 29
5405 PD Uden
Netherlands

+31 (0)41 3334 668
info@compumatica.com

\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t
\n\t\t\t\t\t
\n\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t

Compumatica is a cybersecurity manufacturer in the field of encryption (network encryption, e-mail encryption) and network security (firewall's, diode technology).

The company exists since 1991, when almost nobody was working with cybersecurity. Compumatica secure networks is a fully independent private company with several offices in Europe. The customers of Compumatica are governments and companies listed in the top 500. Compumatica develops, produces and implements solutions with a high security grade without backdoors. During the development process of the solutions, security is the main focus besides simple implementation and integration, easy management and usability for the end user.

Every single product goes through a quality assurance phase in which it is subject to a long-term test. Long product life times with updates and upgrades are guaranteed for each solution. With our slogan ''Cybersecurity with a personal touch'' we point out that customers are our first priority. Do you have questions, do you need support, do you want to upgrade products to the latest solutions, or do you have special demands? We are pleased to help you!

\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t
\n\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t
\n\t\t\t\t\t
\n\t\t
\n\t\t\t\t\t
\n\t\t
\n\t\t\t\t\t
\n\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\"htsc-digibee-compumatica-secure-networks\"\t\t\t\t\t\t\t\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t
\n\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\"htsc-digibee-compumatica-secure-networks\"\t\t\t\t\t\t\t\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t
\n\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\"htsc-digibee-compumatica-secure-networks\"\t\t\t\t\t\t\t\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t
\n\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\"htsc-digibee-compumatica-secure-networks\"\t\t\t\t\t\t\t\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t
\n\t\t\t\t\t
\n\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t

Services

\t\t
\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t
\n\t\t\t\t\t
\n\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t

\n\t\t\t\t\t\n\t\t\t\t\t\tThis is the headline\n\t\t\t\t

\n\t\t\t\t\t\t\t\t\t

\n\t\t\t\t\t\tNetwork security (firewall)\n\t\t\t\t\t

\n\t\t\t\t\t\t\t
\n\t\t
\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t
\n\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t

\n\t\t\t\t\t\n\t\t\t\t\t\tThis is the headline\n\t\t\t\t

\n\t\t\t\t\t\t\t\t\t

\n\t\t\t\t\t\tNetwork segmentation (Diode)\n\t\t\t\t\t

\n\t\t\t\t\t\t\t
\n\t\t
\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t
\n\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t

\n\t\t\t\t\t\n\t\t\t\t\t\tThis is the headline\n\t\t\t\t

\n\t\t\t\t\t\t\t\t\t

\n\t\t\t\t\t\tNetwork encryption (point-to-point)\n\t\t\t\t\t

\n\t\t\t\t\t\t\t
\n\t\t
\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t
\n\t\t\t\t\t
\n\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t

\n\t\t\t\t\t\n\t\t\t\t\t\tThis is the headline\n\t\t\t\t

\n\t\t\t\t\t\t\t\t\t

\n\t\t\t\t\t\tE-mail encryption\n\t\t\t\t\t

\n\t\t\t\t\t\t\t
\n\t\t
\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t
\n\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t
\n\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t
\n\t\t\t\t\t
\n\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t

Read the latest posts

\t\t
\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t
\n\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t
\n\t\t\t\t\t
\n\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\"htsc-digibee-compumatica-secure-networks\"\t\t\t\t\t\t\t\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t
\n\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\"htsc-digibee-compumatica-secure-networks\"\t\t\t\t\t\t\t\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t
\n\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\"htsc-digibee-compumatica-secure-networks\"\t\t\t\t\t\t\t\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t
\n\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\"htsc-digibee-compumatica-secure-networks\"\t\t\t\t\t\t\t\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t
\n\t\t\t\t\t
\n\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t
\n
\t\t
\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t
\n\t\t\t\t\t
\n\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t

Getting started with industry 4.0? Ask an Industry 4.0 Expert\n

\t\t
\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t
\n\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t
\n\t\t\t\t\t
\n\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\tDo you have any ideas about improving the performance of your company that you would like to discuss with an Industry 4.0 expert? Do you know what needs to be done in the field of digitization and the use of software to achieve your goal? And do you know who can help you elaborate this question for taking actual steps?\n\nLet us help you without any obligation and free of charge. Choose between the two buttons.
\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t
\n\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t
\n\t\t\t\t\t
\n\t\t
\n\t\t\t\t\t
\n\t\t
\n\t\t\t\t\t
\n\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t
Sign up for our newsletter and receive updates.
\t\t
\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t
\n\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t
\n\t\t\t\t\t
\n\t\t
\n\t\t\t\t
\n\t\t","protected":false},"excerpt":{"rendered":"

How Dutch Cyber Security Technology helps the industry to secure their assets.

\n","protected":false},"author":24,"featured_media":12305,"comment_status":"open","ping_status":"open","sticky":false,"template":"elementor_header_footer","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"off","neve_meta_content_width":70,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","neve_meta_reading_time":"","footnotes":""},"categories":[112,73,335,336,337,292,344,293,351,354],"tags":[232],"yoast_head":"","yoast_head_json":{"title":"Compumatica secure networks - Proud member of HTSC","description":"How Dutch Cyber Security Technology helps the industry to secure their assets. Read more about Compumatica secure networks as HTSC member.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https://hightechsoftwarecluster.com/en/members/compumatica-secure-networks/","og_locale":"en_US","og_type":"article","og_title":"Compumatica secure networks - Proud member of HTSC","og_description":"How Dutch Cyber Security Technology helps the industry to secure their assets. Read more about Compumatica secure networks as HTSC member.","og_url":"https://hightechsoftwarecluster.com/en/members/compumatica-secure-networks/","og_site_name":"HTSC","article_published_time":"2021-07-12T18:10:58+00:00","article_modified_time":"2021-12-02T15:38:03+00:00","og_image":[{"width":800,"height":800,"url":"https://hightechsoftwarecluster.com/wp-content/uploads/2021/07/htsc-digibeestje-compumatica-secure-networks.png","type":"image/png"}],"author":"High Tech Software Cluster","twitter_card":"summary_large_image","twitter_misc":{"Written by":"High Tech Software Cluster","Est. reading time":"4 minutes"},"schema":{"@context":"https://schema.org","@graph":[{"@type":"Article","@id":"https://hightechsoftwarecluster.com/en/members/compumatica-secure-networks/#article","isPartOf":{"@id":"https://hightechsoftwarecluster.com/en/members/compumatica-secure-networks/"},"author":{"name":"High Tech Software Cluster","@id":"https://hightechsoftwarecluster.com/en/#/schema/person/0bd37f8657122331a6d5abad12095fb6"},"headline":"Compumatica secure networks","datePublished":"2021-07-12T18:10:58+00:00","dateModified":"2021-12-02T15:38:03+00:00","mainEntityOfPage":{"@id":"https://hightechsoftwarecluster.com/en/members/compumatica-secure-networks/"},"wordCount":325,"commentCount":0,"publisher":{"@id":"https://hightechsoftwarecluster.com/en/#organization"},"image":{"@id":"https://hightechsoftwarecluster.com/en/members/compumatica-secure-networks/#primaryimage"},"thumbnailUrl":"https://hightechsoftwarecluster.com/wp-content/uploads/2021/07/htsc-digibeestje-compumatica-secure-networks.png","keywords":["Compumatica"],"articleSection":["Big Data","Cloud","Consultancy & Secondment","Continuous development","Cyber security","eLearning","Licensing & Certification","Members","Network & Connectivity","Quality control"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https://hightechsoftwarecluster.com/en/members/compumatica-secure-networks/#respond"]}]},{"@type":"WebPage","@id":"https://hightechsoftwarecluster.com/en/members/compumatica-secure-networks/","url":"https://hightechsoftwarecluster.com/en/members/compumatica-secure-networks/","name":"Compumatica secure networks - Proud member of HTSC","isPartOf":{"@id":"https://hightechsoftwarecluster.com/en/#website"},"primaryImageOfPage":{"@id":"https://hightechsoftwarecluster.com/en/members/compumatica-secure-networks/#primaryimage"},"image":{"@id":"https://hightechsoftwarecluster.com/en/members/compumatica-secure-networks/#primaryimage"},"thumbnailUrl":"https://hightechsoftwarecluster.com/wp-content/uploads/2021/07/htsc-digibeestje-compumatica-secure-networks.png","datePublished":"2021-07-12T18:10:58+00:00","dateModified":"2021-12-02T15:38:03+00:00","description":"How Dutch Cyber Security Technology helps the industry to secure their assets. Read more about Compumatica secure networks as HTSC member.","breadcrumb":{"@id":"https://hightechsoftwarecluster.com/en/members/compumatica-secure-networks/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https://hightechsoftwarecluster.com/en/members/compumatica-secure-networks/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https://hightechsoftwarecluster.com/en/members/compumatica-secure-networks/#primaryimage","url":"https://hightechsoftwarecluster.com/wp-content/uploads/2021/07/htsc-digibeestje-compumatica-secure-networks.png","contentUrl":"https://hightechsoftwarecluster.com/wp-content/uploads/2021/07/htsc-digibeestje-compumatica-secure-networks.png","width":800,"height":800},{"@type":"BreadcrumbList","@id":"https://hightechsoftwarecluster.com/en/members/compumatica-secure-networks/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https://hightechsoftwarecluster.com/en/"},{"@type":"ListItem","position":2,"name":"Members","item":"https://hightechsoftwarecluster.com/en/category/members/"},{"@type":"ListItem","position":3,"name":"Compumatica secure networks"}]},{"@type":"WebSite","@id":"https://hightechsoftwarecluster.com/en/#website","url":"https://hightechsoftwarecluster.com/en/","name":"HTSC","description":"High Tech Software Cluster","publisher":{"@id":"https://hightechsoftwarecluster.com/en/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https://hightechsoftwarecluster.com/en/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https://hightechsoftwarecluster.com/en/#organization","name":"High Tech Software Cluster - HTSC","url":"https://hightechsoftwarecluster.com/en/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https://hightechsoftwarecluster.com/en/#/schema/logo/image/","url":"https://hightechsoftwarecluster.com/wp-content/uploads/2021/06/cropped-logo-htsc-def.png","contentUrl":"https://hightechsoftwarecluster.com/wp-content/uploads/2021/06/cropped-logo-htsc-def.png","width":100,"height":56,"caption":"High Tech Software Cluster - HTSC"},"image":{"@id":"https://hightechsoftwarecluster.com/en/#/schema/logo/image/"}},{"@type":"Person","@id":"https://hightechsoftwarecluster.com/en/#/schema/person/0bd37f8657122331a6d5abad12095fb6","name":"High Tech Software Cluster","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https://hightechsoftwarecluster.com/en/#/schema/person/image/","url":"https://secure.gravatar.com/avatar/4d9de5afe34d34f3abd0f1aa805f5dd2?s=96&d=mm&r=g","contentUrl":"https://secure.gravatar.com/avatar/4d9de5afe34d34f3abd0f1aa805f5dd2?s=96&d=mm&r=g","caption":"High Tech Software Cluster"},"sameAs":["https://hightechsoftwarecluster.com/"],"url":"https://hightechsoftwarecluster.com/en/author/hightechsoftwarecluster/"}]}},"_links":{"self":[{"href":"https://hightechsoftwarecluster.com/en/wp-json/wp/v2/posts/21305"}],"collection":[{"href":"https://hightechsoftwarecluster.com/en/wp-json/wp/v2/posts"}],"about":[{"href":"https://hightechsoftwarecluster.com/en/wp-json/wp/v2/types/post"}],"author":[{"embeddable":true,"href":"https://hightechsoftwarecluster.com/en/wp-json/wp/v2/users/24"}],"replies":[{"embeddable":true,"href":"https://hightechsoftwarecluster.com/en/wp-json/wp/v2/comments?post=21305"}],"version-history":[{"count":3,"href":"https://hightechsoftwarecluster.com/en/wp-json/wp/v2/posts/21305/revisions"}],"predecessor-version":[{"id":30317,"href":"https://hightechsoftwarecluster.com/en/wp-json/wp/v2/posts/21305/revisions/30317"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://hightechsoftwarecluster.com/en/wp-json/wp/v2/media/12305"}],"wp:attachment":[{"href":"https://hightechsoftwarecluster.com/en/wp-json/wp/v2/media?parent=21305"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://hightechsoftwarecluster.com/en/wp-json/wp/v2/categories?post=21305"},{"taxonomy":"post_tag","embeddable":true,"href":"https://hightechsoftwarecluster.com/en/wp-json/wp/v2/tags?post=21305"}],"curies":[{"name":"wp","href":"https://api.w.org/{rel}","templated":true}]}}