Cyberoam UTM Proves to be Productivity Promoting Security
Solution for CDO-FoodSphere
About CDO-Foodsphere, FMCG
CDO-Foodsphere Inc. is committed to spreading authentic, yet distinct taste of Filipino
food in Philippines and wherever a Filipino resides throughout the world. They are one
of the country's largest meat processors, and are now in the global market through their
canned meat products.
What was started as a hobby by Mrs. Corazon Dayro Ong in 1975, has now flourished
into CDO-Foodsphere, Inc. After 33 years, CDO Karne Norte, CDO Bibbo! Hotdog,
CDO Meat Loaf, CDO Hamburger Patties, CDO Holiday Ham are some of the named
brands enjoyed by the Filipino family. CDO has a global presence spanning across
Australia, United Arab Emirates, Papua New Guinea, United States and Canada,
The organization was looking for an Internet Security solution to reign-in the
uncontrolled surfing by its employees.
Internet is a business enabler
resource. We wish to promote
healthy and productive surfing
habits and regulate the
bandwidth usage across our
organization. We also needed
protection against Internet
based blended threats.
Mr. Leonides Tolentino
Sr. Manager, MIS
The MIS Department at CDO-Foodsphere is responsible for the management of IT
resources. With six (6) branches across the Philippines and the head office in
Valenzuela City, an industrial and residential suburb of Manila; Internet is used to
provide the administrative back-bone to the organization. Thus Internet is an important
business tool which has to be used prudently.
Mr. Leonides Tolentino, Sr. Manager, MIS opined, “Internet is a business enabler
resource as, it is used for both front and back end operations as well as business
transactions. We wish to promote healthy and productive surfing habits. We also want
to regulate the bandwidth usage across our organization.”
The organization was already using Microsoft ISA 2004 Server, with little success. ISA
failed to control the employee‘s unproductive surfing. It also did not help in mitigating
malware and spam onslaught from the internet. In other words, the organization felt its
perimeter was exposed to internet based vulnerabilities.
The Cyberoam Solution
The organization was cautious and did an extensive market survey and a few Proof-ofConcept tests to find out the most appropriate solution to fulfill their demands. In the
process, they approached Netplay Inc., the Cyberoam distributor in Philippines, for
suggestions. CDO-Foodsphere was advised to try out Cyberoam.
Today CDO-Foodsphere has one (1) CR 250i in their head office and six (6) CR 25i
appliances in their Internet enabled branch offices. All the appliances are fully loaded
with all the security features that the organization needed. To gain maximum
advantage from Cyberoam‘s Identity aware features, Mr. Tolentino integrated it with the
organization‘s Active Directory and implemented Automated Single Sign-ON. The
hassle-free login and authentication process are totally transparent and un-interruptive
to the end user.
Cyberoam‘s Checkmark certified identity aware Content Filtering solution enables the
senior manager, and the administrator for Cyberoam, to reign-in all unproductive and
harmful Internet surfing. He is able to assign surfing rights to match the professional
profile of the employee. Whenever needed, Cyberoam‘s On-Appliance reports
provided him with the user‘s identity. The information about the actual person using
an IP Address can be easily gleaned from the reports.
The comprehensive content filtering capacity of Cyberoam is powered by 82+
categories strong database of 44 million URLs. It can also control HTTPS based
websites thus eliminating any security loopholes. Cyberoam has customizable
message for its block page. This helps the organization to educate the end user about
the company‘s Internet policy. Top 10, Web Surfing and Data Transfer categories of
reports, helps Mr. Tolentino quickly zero-in on the potential policy violators.
Cyberoam‘s ICSA and Checkmark certified Enterprise class firewall has a unique
feature: Layer 8. This technology enables unified, identity-based control by the
administrator over virus and spam scanning, intrusion prevention, content filtering and
bandwidth policies. Cyberoam‘s Identity based firewall also takes the user‘s identity in
its ambit. So now the CDO-Foodsphere designs policies keeping real employee
groups in focus, rather than inflexible IP Address based policies. “Unified control over
the appliance and the use of identity in Cyberoam are responsible for swinging the
final purchase decision in its favor,” Mr. Tolentino commented.
Checkmark certified Cyberoam‘s anti-virus and anti-spam features are also Identity
aware. Cyberoam‘s antivirus solution, with industry‘s best malware detection rates,
secures the Web browsing and files transferred over Internet. Similarly Cyberoam‘s
anti-spam feature blocks all the spam mails from entering CDO-Foodsphere‘s
network. Recurrent Pattern Detections (RPD) powered signature-less anti-spam
technology works instantly on deployment, with least human intervention and is
language independent. The spam filter does not require any training or learning mode
like other similar filters. So it blocks any spam, in any language, regardless of its
content, e.g. like image, audio, video or zip based spam. On top of it, Virus Outbreak
Detection feature secures CDO-Foodsphere network against any Zero Day mail based
Cyberoam‘s intrusion protection feature guards CDO-Foodsphere‘s network against
Denial-of-Service attacks. Checkmark certified IPS is equipped with IPS Policy Tuner
feature that lets Mr. Tolentino tune the IPS policies to match his business
requirements. While other products have blanket policies, such flexibility ensures that
the security is transparent and non-obtrusive.
The bandwidth management feature gives Mr. Tolentino enough flexibility to configure
user and service based bandwidth usage limits. This ensures optimal usage of
Internet bandwidth across the organization.
“We find Cyberoam UTM a dependable solution. It amply takes care of our primary
productivity need. En route, it also bridges security our to productivity requirements.
Cyberoam is productivity promoting, business friendly security,” Mr. Tolentino
The business benefits were as follows:
- Identity-based Security
Cyberoam UTM delivered unexpected value additions such as the award-winning identity-based
security feature which provides full visibility of user activities in the network. To elaborate, after
integrating Cyberoam into the CBFS network infrastructure, CBFS used its Active Directory
Services (ADS) to include all CBFS Internet users in the database so their online activities could
be further monitored.
- Firewall and Intrusion Prevention
Cyberoam firewall is ICSA and Checkmark certified - provides granular access controls over
Internet traffic and the network resources. Coupled with Intrusion Prevention module, Cyberoam
UTM can counter any Denial of Service attack. Mr. Yarobi now felt the network is secure.
- Gateway level Antivirus & Anti-Spam
Cyberoam‘s gateway anti virus pickets all the web and mail traffic - SMTP, IMAP, POP3, HTTP,
HTTPS and FTP-o-HTTP protocols and makes sure that no malware or spyware creeps through
the boundary and the network is fully safe and sound against malware including root-kits, viruses,
worms, Trojans, spyware, backdoors, key-loggers and more.
Each and every file going through gateway is scanned against antivirus engine that is powered by
more than 4 million signatures. Furthermore, the anti-virus rakes over more than 40 formats of
compressed files and even freezes attachments for specified file types such as executables,
media files, PDF, zipped files etc. before these blended threats can sabotage the network.
“The SPAM killer also helped our mail server to distinguish the unwanted mails and give great
relief to the users”, said Mr. Yarobi. Recurrent Pattern Detection (RPD) powered signature-less
anti spam technology works instantly on deployment, with the least human intervention and is
language independent. It blocks spam in any language regardless of the content, e.g. image,
audio, video or zip-based spam. The anti spam feature is also equipped with Virus Outbreak
Detection. This protects the organization against any zero day attack.
This saves a lot of bandwidth & protects students from viruses, phishing, and spyware threats.
- Bandwidth Management
Cyberoam solution allowed user based limit on bandwidth, access time and volume data transfer.
“I can now prioritize the organization‘s bandwidth usage as per business requirements with more
effective controls on which user consumes how much bandwidth (upload and download limits)
during any time of the day”, said. Mr. Yarobi. This helped the college in controlling the user
behavior on the Internet.
- Enhanced Reporting
Cost-free On-appliance comprehensive reporting is one of Cyberoam's most significant features.
Reports include „Internet bandwidth usage‘, „top accessed sites‘, Google search reports and
many more, which enhance the visibility of users‘ online behaviour. The „traffic discovery‘ report
helps the administrator identify the amount of bandwidth used by various applications.
In simpler words, I can say that Cyberoam UTM is just like a power packed box of large number
of security features.” said. Mr. Yarobi.