How Procon Mining Uses Threat Intelligence to Keep Their Network Safe

Imagine your office was several miles below the surface earth, underneath an unimaginable weight of stone and metals relying on your team and technology to keep you safe above all else. Feeling safe in this environment requires countless hours of planning and preparation to anticipate the countless variables that can change instantly. In an environment like this you need to be able to trust the men and women working with you.

In this challenging environment, the Network and Security personnel needed to find a provider who wouldn’t compromise on the quality or configuration of the tools put in place to protect the network and ultimately their people.

Designed by Global Consulting firms the Procon IT infrastructure required 24/7 expert surveillance for Cyber Security threats and a team of professionals who could apply changes without risking downtime. The team wanted to bring in cutting edge technology and round-the-clock service with five goals in mind:

  • Maintain uptime of all CyberSecurity systems while advancing configuration and features continuously
  • Provide threat intelligence and automatic prevention of any CyberSecurity threat to network traffic, devices, applications or data
  • Support sophisticated network policies
  • Provide advice and reports to management personnel on the state of security
  • Supply the systems and upgrades necessary to achieve this task within service

I’m very proud of the maturity level at which Procon operates their CyberSecurity practise. It really enables our team to shine when a customer requires a high skill level and cutting edge tools for their service. It let’s you know how valuable the work really is
- Adam Mansour, CTO, IntelliGO Networks.
As they evaluated the services and possible solutions, they found that most vendors provided 2 or 3 of the services required. Most companies they found either sold some of the technology or provided a consulting service. With IntelliGO Networks, they found a company and technologies that matched the goals and objectives with a holistic approach that combined all systems and processes into one cohesive offering.

With the ability to dynamically react to threats in their environment and the confidence to apply changes to complex policies the network and security team can focus on enabling their staff instead of worrying about Cyber Threats.

Demo IntelliGO Network Access Control? Click: Request Demo

Social Media Updates

Happy Holidays to Everyone from IntelliGO Networks. This year our card helps test your Malware Defenses (Safely) ->
Wed Dec 21 14:33:50 +0000 2016
Fri Dec 09 05:40:17 +0000 2016
Fri Dec 09 05:33:08 +0000 2016
Wed Nov 30 20:58:30 +0000 2016

Time is running out Join us This Tuesday, Nov 29th 11:30 AM @ Culinaria Mississauga Register:…
Mon Nov 28 00:51:50 +0000 2016
Thu Nov 17 05:00:23 +0000 2016
Thu Nov 17 04:52:31 +0000 2016

Join IntelliGO & Palo Alto Networks Advanced Endpoint Prevention Event Nov 29th 11:30 AM @ Culinaria Mississauga…
Thu Nov 10 18:54:59 +0000 2016
Tue Oct 25 01:25:39 +0000 2016
Mon Oct 24 19:50:46 +0000 2016
Mon Oct 24 18:15:00 +0000 2016
Mon Oct 24 18:14:38 +0000 2016
Mon Oct 24 18:13:57 +0000 2016
Mon Oct 24 18:13:12 +0000 2016

From Goblin Panda to Flying Kitten: the latest online security threats -
Fri Feb 13 15:45:15 +0000 2015

Hackers can get into most 'connected cars' -
Thu Feb 12 20:28:56 +0000 2015

Why You Need to Improve Your POS System Security -
Thu Feb 12 15:00:16 +0000 2015

Fake WhatsApp for Web Spams the Internet, heaven for cyber criminals -
Wed Feb 11 21:00:14 +0000 2015

Hackers Don't Need Sophisticated Attacks If You Leave Your Door Unlocked -
Wed Feb 11 17:45:09 +0000 2015