How Procon Mining Uses Threat Intelligence to Keep Their Network Safe

Imagine your office was several miles below the surface earth, underneath an unimaginable weight of stone and metals relying on your team and technology to keep you safe above all else. Feeling safe in this environment requires countless hours of planning and preparation to anticipate the countless variables that can change instantly. In an environment like this you need to be able to trust the men and women working with you.

In this challenging environment, the Network and Security personnel needed to find a provider who wouldn’t compromise on the quality or configuration of the tools put in place to protect the network and ultimately their people.

Designed by Global Consulting firms the Procon IT infrastructure required 24/7 expert surveillance for Cyber Security threats and a team of professionals who could apply changes without risking downtime. The team wanted to bring in cutting edge technology and round-the-clock service with five goals in mind:

  • Maintain uptime of all CyberSecurity systems while advancing configuration and features continuously
  • Provide threat intelligence and automatic prevention of any CyberSecurity threat to network traffic, devices, applications or data
  • Support sophisticated network policies
  • Provide advice and reports to management personnel on the state of security
  • Supply the systems and upgrades necessary to achieve this task within service

I’m very proud of the maturity level at which Procon operates their CyberSecurity practise. It really enables our team to shine when a customer requires a high skill level and cutting edge tools for their service. It let’s you know how valuable the work really is
- Adam Mansour, CTO, IntelliGO Networks.
As they evaluated the services and possible solutions, they found that most vendors provided 2 or 3 of the services required. Most companies they found either sold some of the technology or provided a consulting service. With IntelliGO Networks, they found a company and technologies that matched the goals and objectives with a holistic approach that combined all systems and processes into one cohesive offering.

With the ability to dynamically react to threats in their environment and the confidence to apply changes to complex policies the network and security team can focus on enabling their staff instead of worrying about Cyber Threats.

Demo IntelliGO Network Access Control? Click: Request Demo

Social Media Updates
Wed May 17 14:54:15 +0000 2017
Wed May 17 13:47:48 +0000 2017

How our customers can protect themselves from WannaCry Ransomeware attack:
Sat May 13 18:29:59 +0000 2017

Ransomware WannaCry now hits 99 Countries! over 75,000 Cases!
Sat May 13 18:28:34 +0000 2017

Largest Cyber Attack in History NSA Vulnerability leads to Ransomeware across dozens of organizations…
Sat May 13 18:25:15 +0000 2017

IntelliGO MSS Platform Version 6.0 Unveiling at GISEC 2017 in Dubai FREE TICKET GIVEAWAY :
Sat May 13 18:19:53 +0000 2017

Happy Holidays to Everyone from IntelliGO Networks. This year our card helps test your Malware Defenses (Safely) ->
Wed Dec 21 14:33:50 +0000 2016
Fri Dec 09 05:40:17 +0000 2016
Fri Dec 09 05:33:08 +0000 2016
Wed Nov 30 20:58:30 +0000 2016

Time is running out Join us This Tuesday, Nov 29th 11:30 AM @ Culinaria Mississauga Register:…
Mon Nov 28 00:51:50 +0000 2016
Thu Nov 17 05:00:23 +0000 2016
Thu Nov 17 04:52:31 +0000 2016

Join IntelliGO & Palo Alto Networks Advanced Endpoint Prevention Event Nov 29th 11:30 AM @ Culinaria Mississauga…
Thu Nov 10 18:54:59 +0000 2016
Tue Oct 25 01:25:39 +0000 2016
Mon Oct 24 19:50:46 +0000 2016
Mon Oct 24 18:15:00 +0000 2016
Mon Oct 24 18:14:38 +0000 2016
Mon Oct 24 18:13:57 +0000 2016
Mon Oct 24 18:13:12 +0000 2016

From Goblin Panda to Flying Kitten: the latest online security threats -
Fri Feb 13 15:45:15 +0000 2015

Hackers can get into most 'connected cars' -
Thu Feb 12 20:28:56 +0000 2015