• Introducing Other World Computing (OWC)
  • Introducing Other World Computing (OWC)
  • Introducing CADI 2.5
  • Introducing CADI 2.5
  • Introducing CADI 2.5
  • Introducing CADI 2.5
  • Cyber Security Experts
  • Backup and Disaster Recovery
  • EndPoint Detection and Response
  • Managed Service Provider
  • Wireless Protection
  • Virtualization
  • Professional Consultations
  • Remote Assistance
  • Founded in August 2005 with a vision to systematically change the IT approach and support within Trinidad and Tobago.
  • We specialize in many different areas including Email Archiving Systems, Document Management Systems, EndPoint Protection Solutions, Backup Solutions, Remote Management, Cyber Security Solutions, Virtualization and Multi Factor Authentication.

Introducing CADI 2.5

  • What is CADI?

    What is CADI?

    The Ideal Solution looking at all aspects of your IT Infrastructure.

    Createx Active Defense Infrastructure or CADI is a revolutionary solution designed and implemented by Createx System Works Ltd. for businesses who are open to new & emerging threats. Using enterprise solutions and products supported by our partner and alliance networks we are able to create a solutions for all markets (Small, Mid -Size, Large companies).

  • Modules


    CADI includes various modules
    1. Service Level Agreements (Active Support System)
    2. An Enterprise Security Appliance (Includes Firewalls, VPN, Spam, Web Control, Internet Redundancy, Site to Site Remote Connections, etc.)
    3. Wireless Security
    4. 2 Factor Authentication (2FA)
    5. Endpoint Security (Antiviral, Ransomware, Web, Device Control etc.)
    6. Cloud Backup Solutions (3-2-1 Backups with 256 Bit SSL Encryption)
    7. Disaster Recovery (DR) Systems
    8. Document Management Systems (DMS)
    9. Virtualization
    10. Remote Monitoring & Management (RMM)
    11. ICT (Information & Communication Technologies) Policy Creation and Development
    12. Infrastructure Creation, Development and Documentation

  • RMM


    CADI with RMM (Add-on)
    1. Dashboard Notifications

    2. RealTime Alerts

    3. Patch Management

    4. Reporting

    Call for more details.

  • Pricing


    Quotation Required, Prices may vary depending on the organization’s size and requirements. Call for more details.

Sophos Intercept X

  • What is Intercept X?

    What is Intercept X?

    Sophos Intercept X Hightlights
    1. The #1 rated malware detection engine, driven by deep learning
    2. Exploit prevention stops the techniques attackers use to control vulnerable software
    3. Active adversary mitigation prevents persistence on machine
    4. Root cause analysis lets you see what the malware did and where it came from
    5. Ransomware specific prevention technology
    6. Intercept X augments your existing antivirus deployment. Intercept X Advanced replaces your existing endpoint security by combining modern techniques with foundational approaches.

    Sophos Intercept X stops the widest range of attacks with a unique combination of deep learning malware detection, exploit prevention, anti-ransomware, and more.

  • What is Intercept X with EDR?

    What is Intercept X with EDR?

    Intelligent Endpoint Detection and Response (EDR)

    The first EDR designed for security analysts and IT administrators

    Intercept X Advanced with XDR allows you to ask any question about what has happened in the past, and what is happening now on your endpoints. Hunt threats to detect active adversaries, or leverage for IT operations to maintain IT security hygiene. When an issue is found remotely respond with precision. By starting with the strongest protection, Intercept X stops breaches before they start. It cuts down the number of items to investigate and saves you time.

    1. The strongest protection combined with powerful EDR
    2. Add expertise, not headcount
    3. Built for IT operations and threat hunting
  • What is Intercept X with XDR?

    What is Intercept X with XDR?

    Extended Detection and Response (XDR)

    Intercept X Advanced with XDR goes beyond the endpoint, pulling in rich network, email, cloud and mobile* data sources to give you an even broader picture of your cybersecurity posture. You can quickly shift from a holistic view down into granular detail. For example:

    1. Cross reference indicators of comprise from multiple data sources to quickly identify, pinpoint and neutralize a threat
    2. Use ATP and IPS events from the firewall to investigate suspect hosts and identify unprotected devices across your estate
    3. Understand office network issues and which application is causing them
    4. Identify unmanaged, guest and IoT devices across your organization’s environment
  • What is Intercept X with MTR?

    What is Intercept X with MTR?

    Managed Threat Response (MTR)

    1. Threat Hunting – Proactive 24/7 hunting by our elite team of threat analysts. Determine the potential impact and context of threats to your business.
    2. Response – Initiates actions to remotely disrupt, contain, and neutralize threats on your behalf to stop even the most sophisticated threats
    3. Continuous Improvement – Get actionable advice for addressing the root cause of recurring incidents to stop them for occurring again
  • Pricing


    Quotation Required, Prices may vary depending on the organization’s size and requirements. Call for more details.

Cyber Security Solutions

  • Whats is Cyber Security?

    Whats is Cyber Security?

    Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes.

    Implementing effective cybersecurity measures is particularly challenging today because there are more devices than people, and attackers are becoming more innovative.
  • How can we help?

    How can we help?

    Improve your IT Infrastructure with our Cyber Security Solutions.

    Our systems work with all company sizes from Home to Enterprise Solutions. Purchase or lease anyone of our solutions. Full Integration with our previous CADI System*.

    Ask for a Demo

    For more information and pricing contact us.

    *Certain conditions may apply.

Popular Products

  • Email Archiving Systems

    Email Archiving Systems

    Archive multiple Email Accounts which are over capacity or running out of Email Storage. Secure access to Old Emails at anytime with an Enterprise storage solution. Reduce cost of email subscriptions.
  • Microsoft 365

    Microsoft 365

    Microsoft Office 365 (often called Microsoft 365 or Office 365) is a Web-based version of Microsoft’s Office suite of enterprise-grade productivity applications. Office 365 is delivered to users through the cloud and includes Exchange Online for email, SharePoint Online for collaboration, Lync Online for unified communications, and a suite of Office Web Apps, Web-based versions of the traditional Microsoft Office suite of applications. The Application may also be installed on the users computer depending on the solution choosen.

  • Createx Cloud

    Createx Cloud

    1. Perform local and offsite cloud backup in one easy step.
    2. Back up everything — disks, partitions, servers, data — to the Createx Cloud.
    3. Recover anything quickly and easily — files, folders, applications, or an entire system.
    4. Keep backups safe in Createx’s ultra-secure, Tier-IV designed & SSAE-16 compliant local data centers.
  • Sophos Intercept X

    Sophos Intercept X

    1. Intelligent Endpoint Detection
    2. Add expertise, not headcount
    3. Guided incident response
    4. End-to-End Endpoint Protection
    5. Exploit Prevention
    6. Malware Cleanup
    7. Synchronized Security
    8. Sophos Central
    Other versions available
    1. Intelligent Endpoint Detection and Response (EDR)
    2. Extended Detection and Response (XDR)
    3. Managed Threat Response (MTR)
  • Paragon Hard Disk Manager 17

    Paragon Hard Disk Manager 17

    Key Features

    1. Backup and Recovery data
    2. Migrate OS
    3. Partition disks
    4. Erase disks
  • Microsoft Corporation
  • Adobe Systems Incorporated
  • Sophos Ltd.
  • Panda Security
  • Kaspersky Lap
  • Avast Software s.r.o.
  • Acronis International GmbH
  • Virtuozzo
  • Veeam Software Group GmbH
  • Paragon Software Group
  • EaseUs
  • O&O Software GmbH
  • Novastor
  • TeamViewer GmbH
  • Royal Apps GmbH
  • Splashtop Inc.
  • Parallels IP Holdings GmBH
  • APC
  • Duo Security
  • MailStore
  • Grandstream Networks, Inc.
  • Nakivo, Inc.
  • Other World Computing (OWC)
  • TSPlus