since 1999

Logo TresW

Dedicated to Cyber Security

Learn more about us

Just because security is serious doesn’t mean it has to be complex
Security Solutions
We protect our customers against today's attacks, and prepare them for the threats of tomorrow.
Network Protection

Protect your networks with the best UTM solutions and level 8 firewalls against threats, intrusions, unauthorized applications, data leaks, malware, and much more.

Human Protection

Protect humans anywhere and with any device. Anti-malware, email and internet protection, data encryption, device control, information leak prevention, with per-human licenses, not per device.

Device Protection

Protect critical business data and ensure human productivity on any mobile device or PDA platform.

Server Protection

Protect your servers with the latest anti-ransomware technology, in addition to usual malware.

Wireless Protection

Provide wireless coverage for your headquarters and offices, while implementing filters to ensure safe browsing for both employees and visitors. Administered from the cloud or locally.

Data Encryption safeguard bitlocker filevault

Encrypt your data and allow simple and secure human collaboration while protecting your information against sophisticated attacks and comply with the new European General Data Protection Regulations.

Protections in Progress


How to comply with the new legislation?

GDPR (General Data Protection Regulation) is the new legal framework in the European Union that will replace the current Data Protection Directive. To learn more, download the document or simply contact us.

Continue reading

Managed Services

The world of IT services is constantly changing. Our processes and procedures guarantee a continuity of your business.

K33p-Aliv3 – Your personal IT Department

Whether you have a team of IT professionals who need security back up, or your IT person is doing double duty as branch manager – TresW has your back. We ensure the security, support and maintenance without any of the headaches through our K33p-Aliv3 program.

I'd like to read more


We provide solutions in TIER IV classified Data Centers and high security bunkers both in Tenerife and Gran Canaria, as well as onsite systems.

Data Recovery

Data recovery of any support and operating system (hard disks, RAID systems, mobile, cards, tablets, etc.) assuring the continuity of your work with guarantee and confidentiality.


Annual technical inquiries


Incidents solved

Our First Level Support Team (FLST) is the primary contact for our clients. We solve situations without diverting to manufacturers 90% of the time. The other 10%, well, we'll take care of that too!
19 September, 2017 in HASH, IT Security, Log, Sophos UTM

Extract HASH & Logs from Sophos UTM

Continuing with our blog entries on Sophos UTM logs, in this knowledge base article we will address the issue of extracting web logs as if it were for a company... Read More
4 September, 2017 in GDPR

GDPR: Are you ready?

In May 2018, the new General Data Protection Regulation of the European Union comes into effect. In the simplest way, we want to detail some aspects of this new directive,... Read More
10 April, 2017 in Log, Sophos UTM

Sophos UTM Log Copy

how to copy logs from sophos utm appliance

Read More

Platinum Solutions Partner

Best Trajectory Award 2016
SMB Partner of the Year Award 2011
Award for Excellence 2008