CDO-Foodsphere, Philippines
Cyberoam UTM Proves to be Productivity Promoting Security Solution for CDO-FoodSphere
About CDO-Foodsphere, FMCG

CDO-Foodsphere Inc. is committed to spreading authentic, yet distinct taste of Filipino food in Philippines and wherever a Filipino resides throughout the world. They are one of the country's largest meat processors, and are now in the global market through their canned meat products.

What was started as a hobby by Mrs. Corazon Dayro Ong in 1975, has now flourished into CDO-Foodsphere, Inc. After 33 years, CDO Karne Norte, CDO Bibbo! Hotdog, CDO Meat Loaf, CDO Hamburger Patties, CDO Holiday Ham are some of the named brands enjoyed by the Filipino family. CDO has a global presence spanning across Australia, United Arab Emirates, Papua New Guinea, United States and Canada, among others.

The organization was looking for an Internet Security solution to reign-in the uncontrolled surfing by its employees.




Internet is a business enabler resource. We wish to promote healthy and productive surfing habits and regulate the bandwidth usage across our organization. We also needed protection against Internet based blended threats.

Mr. Leonides Tolentino
Sr. Manager, MIS
CDO-Foodsphere



The MIS Department at CDO-Foodsphere is responsible for the management of IT resources. With six (6) branches across the Philippines and the head office in Valenzuela City, an industrial and residential suburb of Manila; Internet is used to provide the administrative back-bone to the organization. Thus Internet is an important business tool which has to be used prudently.

Mr. Leonides Tolentino, Sr. Manager, MIS opined, “Internet is a business enabler resource as, it is used for both front and back end operations as well as business transactions. We wish to promote healthy and productive surfing habits. We also want to regulate the bandwidth usage across our organization.”

The organization was already using Microsoft ISA 2004 Server, with little success. ISA failed to control the employee‘s unproductive surfing. It also did not help in mitigating malware and spam onslaught from the internet. In other words, the organization felt its perimeter was exposed to internet based vulnerabilities.

The Cyberoam Solution

The organization was cautious and did an extensive market survey and a few Proof-ofConcept tests to find out the most appropriate solution to fulfill their demands. In the process, they approached Netplay Inc., the Cyberoam distributor in Philippines, for suggestions. CDO-Foodsphere was advised to try out Cyberoam.

Today CDO-Foodsphere has one (1) CR 250i in their head office and six (6) CR 25i appliances in their Internet enabled branch offices. All the appliances are fully loaded with all the security features that the organization needed. To gain maximum advantage from Cyberoam‘s Identity aware features, Mr. Tolentino integrated it with the organization‘s Active Directory and implemented Automated Single Sign-ON. The hassle-free login and authentication process are totally transparent and un-interruptive to the end user.

Cyberoam‘s Checkmark certified identity aware Content Filtering solution enables the senior manager, and the administrator for Cyberoam, to reign-in all unproductive and harmful Internet surfing. He is able to assign surfing rights to match the professional profile of the employee. Whenever needed, Cyberoam‘s On-Appliance reports provided him with the user‘s identity. The information about the actual person using an IP Address can be easily gleaned from the reports.

The comprehensive content filtering capacity of Cyberoam is powered by 82+ categories strong database of 44 million URLs. It can also control HTTPS based websites thus eliminating any security loopholes. Cyberoam has customizable message for its block page. This helps the organization to educate the end user about the company‘s Internet policy. Top 10, Web Surfing and Data Transfer categories of reports, helps Mr. Tolentino quickly zero-in on the potential policy violators.

Cyberoam‘s ICSA and Checkmark certified Enterprise class firewall has a unique feature: Layer 8. This technology enables unified, identity-based control by the administrator over virus and spam scanning, intrusion prevention, content filtering and bandwidth policies. Cyberoam‘s Identity based firewall also takes the user‘s identity in its ambit. So now the CDO-Foodsphere designs policies keeping real employee groups in focus, rather than inflexible IP Address based policies. “Unified control over the appliance and the use of identity in Cyberoam are responsible for swinging the final purchase decision in its favor,” Mr. Tolentino commented.

Checkmark certified Cyberoam‘s anti-virus and anti-spam features are also Identity aware. Cyberoam‘s antivirus solution, with industry‘s best malware detection rates, secures the Web browsing and files transferred over Internet. Similarly Cyberoam‘s anti-spam feature blocks all the spam mails from entering CDO-Foodsphere‘s network. Recurrent Pattern Detections (RPD) powered signature-less anti-spam technology works instantly on deployment, with least human intervention and is language independent. The spam filter does not require any training or learning mode like other similar filters. So it blocks any spam, in any language, regardless of its content, e.g. like image, audio, video or zip based spam. On top of it, Virus Outbreak Detection feature secures CDO-Foodsphere network against any Zero Day mail based attack.

Cyberoam‘s intrusion protection feature guards CDO-Foodsphere‘s network against Denial-of-Service attacks. Checkmark certified IPS is equipped with IPS Policy Tuner feature that lets Mr. Tolentino tune the IPS policies to match his business requirements. While other products have blanket policies, such flexibility ensures that the security is transparent and non-obtrusive.

The bandwidth management feature gives Mr. Tolentino enough flexibility to configure user and service based bandwidth usage limits. This ensures optimal usage of Internet bandwidth across the organization.

“We find Cyberoam UTM a dependable solution. It amply takes care of our primary productivity need. En route, it also bridges security our to productivity requirements. Cyberoam is productivity promoting, business friendly security,” Mr. Tolentino concluded.

The business benefits were as follows:

  • Identity-based Security

    Cyberoam UTM delivered unexpected value additions such as the award-winning identity-based security feature which provides full visibility of user activities in the network. To elaborate, after integrating Cyberoam into the CBFS network infrastructure, CBFS used its Active Directory Services (ADS) to include all CBFS Internet users in the database so their online activities could be further monitored.

  • Firewall and Intrusion Prevention

    Cyberoam firewall is ICSA and Checkmark certified - provides granular access controls over Internet traffic and the network resources. Coupled with Intrusion Prevention module, Cyberoam UTM can counter any Denial of Service attack. Mr. Yarobi now felt the network is secure.

  • Gateway level Antivirus & Anti-Spam

    Cyberoam‘s gateway anti virus pickets all the web and mail traffic - SMTP, IMAP, POP3, HTTP, HTTPS and FTP-o-HTTP protocols and makes sure that no malware or spyware creeps through the boundary and the network is fully safe and sound against malware including root-kits, viruses, worms, Trojans, spyware, backdoors, key-loggers and more.

    Each and every file going through gateway is scanned against antivirus engine that is powered by more than 4 million signatures. Furthermore, the anti-virus rakes over more than 40 formats of compressed files and even freezes attachments for specified file types such as executables, media files, PDF, zipped files etc. before these blended threats can sabotage the network.

    “The SPAM killer also helped our mail server to distinguish the unwanted mails and give great relief to the users”, said Mr. Yarobi. Recurrent Pattern Detection (RPD) powered signature-less anti spam technology works instantly on deployment, with the least human intervention and is language independent. It blocks spam in any language regardless of the content, e.g. image, audio, video or zip-based spam. The anti spam feature is also equipped with Virus Outbreak Detection. This protects the organization against any zero day attack.

    This saves a lot of bandwidth & protects students from viruses, phishing, and spyware threats.

  • Bandwidth Management

    Cyberoam solution allowed user based limit on bandwidth, access time and volume data transfer. “I can now prioritize the organization‘s bandwidth usage as per business requirements with more effective controls on which user consumes how much bandwidth (upload and download limits) during any time of the day”, said. Mr. Yarobi. This helped the college in controlling the user behavior on the Internet.

  • Enhanced Reporting

    Cost-free On-appliance comprehensive reporting is one of Cyberoam's most significant features. Reports include „Internet bandwidth usage‘, „top accessed sites‘, Google search reports and many more, which enhance the visibility of users‘ online behaviour. The „traffic discovery‘ report helps the administrator identify the amount of bandwidth used by various applications.

    In simpler words, I can say that Cyberoam UTM is just like a power packed box of large number of security features.” said. Mr. Yarobi.