Solutions
We selected Eastbay I.T. Consulting Inc. because of their technical talent & capability, their project management wherewithal and most of all, their customer management & customer relationship...
chairman
"Since we have been using Eastbay I.T. Consulting Inc. as our exclusive computer training and executive coaching provider we have been extremely satisfied with their performance - as have our clients....
knightsbridge
...
Queenston Mining
Eastbay I.T. Consulting set up and installed our computers and server and they have provided ongoing technical support since 2001. Their service response is prompt and always handled in a pleasant man...
cicc
...
WGI
...
diamond_logo_horz_im_rgb
As a medium-sized private equity asset manager with no permanent IT staff, Timbercreek requires capable, reliable, cost effective computer consulting support. Eastbay I.T. Consulting Inc. has continua...
timbercreeklogo
We are a private, medium sized, owner, developer, and manager of real estate holdings in the Greater Toronto Area. Although we have no permanent I.T staff, a reliable computer system is essential to o...
browngroup
We face logistical challenges every day as the leader in polar adventures. So when we moved an office from the UK to Canada, we looked for an IT partner who met our standards of excellence. With Eastb...
quark
Eastbay I.T. Consulting Inc. has been instrumental in helping Sun Media Corp. design and implement an innovative and user-friendly customer relationship database management system that has revolutioni...
sun_media
...
antonfagasta

Security

Maintaining the security of corporate data today is more complex and critical than ever. Eastbay’s security solutions will ensure that your systems are running optimally and the proper security controls are integrated into your environment.

These services include a complete review and analysis of your current IT infrastructure and recommended solutions based on industry best practices.

E-mail defense: Comprehensive protection against spam, worms, viruses, e-mail attacks and more. Works at the network perimeter to identify, quarantine, block and strip suspect e-mail messages before they can enter the messaging infrastructure. Flexible, easy to use and requires no upfront hardware or software implementation.

Web defense: Protects customers by blocking web-based threats like spyware, key loggers, viruses and phishing attacks at the network perimeter. Allows category and content-based control over unauthorized Web surfing.

Message archiving: Allows businesses to store monitor and retrieve all inbound, outbound and internal e-mails for compliance or general storage/retrieval purposes.