About Us
Our Agency Experts in Cyber Security & Data Management
With deep understanding of cyber security and data management, we offer unrivaled protection for your business. We preemptively counter threats, leveraging our speed and scalability to stay ahead in the digital arena.
- Understand security and compliance
- Extremely low response time
- Always ready for your growth
+
Clientsin US
+
Cyber SecurityExperts
%
Retentionrate
Our Team
At West Computers, we pride ourselves on building a collaborative and highly skilled team dedicated to securing your business. Our in-house experts, combined with strategic partnerships with industry-leading teams, ensure that your organization benefits from cutting-edge cybersecurity solutions and proactive IT management. Together, we create a seamless blend of knowledge, tools, and support that empowers your business to thrive in a secure, technology-driven environment. Whether it’s our local team or our trusted partner specialists, we are united in one mission: to protect what matters most to you.
Jack West
Ceo & founderTyler Martin
Cyber AnalystIT Technician
Bobby Schumann
Office ManagerDispatch
Expert Team We've Assembled
for Your Whole Security
Jordan Perl
Channel Account ManagerEric Cooley
Security Solutions ConsultantThomas (Mike) Prentice
Operations Solution ConsultantSOC Team
Peter Hill
Detection & Response Analyst IIZachary Sillivent
Detection Response Account manager IIRadu Candeori
MXDR AnalystNicholas Koken
MXDR LeadGavrila Mihail
MXDR Analyst IIPhillippe Mendoza
Senior Detection & Response Account ManagerDylan Jessen
Detection & Response Analyst IIEarnest VanDuyne
Detection & Response Analyst IIJacob Kennedy
Detection Response Account Manager IErik Baba
Detection Engineer IIDavid Lopez
Detection & Response Analyst IISkip Harris
Detection & Response Analyst IIIonut Motorga
MXDR Analyst IILucian Mos
MXDR DRAMDalvin Colbert
Detection & Response Analyst IIDavid Langlands
Chief Security OfficerSidney Watts
Detection & Response Analyst IIAlexandru Munteanu
MXDR Analyst IIBecome Totally Secured by
Following 3 Steps
Request a Security Consult
Schedule a discussion with our security expert to evaluate your digital environment and prepare your audit scan.
Step oneRun Your Audit Scan
Run a straightforward application on 2-5 systems in your environment to help us assess your current security landscape.
Step TwoGet Your Results & Solutions
Together, we review the audit findings and present strategic solutions tailored to your unique security needs.
Step ThreeI've witnessed firsthand the evolving cyber threats that businesses face daily. It has reinforced my belief that robust data protection isn't just a luxury—it's a necessity. Our commitment extends beyond securing networks; we're here to instill a culture of security within your organization. Each client we protect amplifies our resolve to ensure the integrity, confidentiality, and availability of your most critical digital assets. I assure you, your data's safety is our highest priority.