Green Future Innovations Inc., Philippines, Asia
Green Future Innovations Inc. Depends on Cyberoam for Total Internet Security
About Green Future Innovations Inc., Energy

Green Future Innovations Inc. (GFII) is a corporation fully committed towards a green and sustainable development. They are one of the emerging Ethanol producers in Asia. The organization is a joint venture corporation by and among Filipino, Taiwanese and Japanese partners. It is also a domestic corporation duly-registered under Philippine Laws. They build and operate a large scale bio ethanol and cogeneration plant located in San Mariano, Isabela, Philippines

GFII working for the mission of a Green Future for the entire world requires Internet for research, communication, general surfing and administrative purposes.


Internet being used as a lifeline for us, we cannot compromise on its connectivity and security. Hence, its protection from blended cyber threats was our foremost apprehension.”

Mr. Leonides V. Tolentino
AVP for IT
Green Future Innovations Inc.


Mr. Leonides V. Tolentino, the AVP for IT at GFII said, “Internet being used as a lifeline for us, we cannot compromise on its connectivity and security. Hence, being the most productive resource, its protection from blended cyber threats was our foremost apprehension”.

The network security issues faced by them were:

Unsecured Network Infrastructure

Mr. Tolentino wanted his network infrastructure to be safe from DoS, DDoS, IP Spoofing and other unpredictable network attacks. He was worried that even a single successful intrusion could lead to intolerable consequences for their business.

Un-Audited Internet Usage

General and unrestricted surfing provided an entrance for malware to enter the network. These malicious objects like Trojans, viruses, spyware etc. entered silently and quietly through surfing, Emails, downloading and VPN tunnels. Hence, Mr. Tolentino wanted to safeguard the organization’s network from such attacks that caused unnecessary nuisance such as loss of data, corrupt files and system crashes resulting into serious downtime.

The Cyberoam Solution

GFII searched the market for a good solution that could meet all their requirements without any extra peripheral devices. In their search, they found Cyberoam to be good and deployed Six (6) appliances in Gateway Mode. The models and locations of the appliances are given below.

After deploying Cyberoam in their network the positive results noticed are:

  • Secured Network Infrastructure

    Cyberoam’s Firewall is ICSA and Check Mark Level 5 Certified. It provides granular access controls over Internet traffic and network resources. Also, its Fusion technology enables administrators to create policies for multiple features through a single interface.

    With a database of 4500+ IPS signatures Cyberoam’s Intrusion Prevention System (IPS) automatically detects, blocks and drops suspicious HTTP, SMTP, POP3, FTP, IMAP, P2P and IM traffic ensuring network security. It also provides signature updating facility that updates the signatures regularly and provides zero-hour protection against latest attacks.

    Mr. Tolentino said, “Cyberoam efficiently safeguards the GFII’s network infrastructure, providing clean and attack-free network”.

  • Regulated Internet Usage

    Cyberoam’s Web Filtering solution provides a database of millions of URLs divided into 89+ categories, helping Mr. Tolentino to allow the staff to access only those websites that are authorized by the company’s policies. Moreover, the Application Filter blocks all malware-laden sites, P2P, Instant Messengers, illegal audio, video, streaming media and other bandwidth-intensive download. Cyberoam’s identity-based filtering allows administrator to create schedules and assign Internet access policies, surfing quota, time limits and bandwidth restrictions to individual user based on certain criteria. As a result, this helped GFII in increased productivity, reduced bandwidth congestion and security of network from malwares.

    Mr. Tolentino said, “Cyberoam has enabled us to control and monitor access not only at Identity level but also at Application level, minimizing the unnecessary Internet activities of the users and thus ensuring increased productivity and reduced bandwidth problems”.

  • Spam and Malicious Objects Blocked at the Gateway

    Cyberoam’s Check Mark Level 5 certified Gateway Anti-Virus and Anti-Spyware solution offers web, Email and IM security against malware, including viruses, worms, Trojans, spyware and key loggers. Email, Web and VPN traffic is also scanned for malware. It also blocks attachments for specified file types like executables, media files, password-protected files etc. before any malware affects the network.

    Cyberoam’s Gateway Anti-Spam solution provides Recurrent Pattern Detection technology that is content and language agnostic. Moreover, it provides protection against foreign characters and image-based Spam with almost no cases of false positives. Finally, its Virus Outbreak Detection (VOD) feature protects the network against real -time massive virus outbreaks.

    Mr. Tolentino said, “Cyberoam’s Anti Virus blocks all the malicious substances and Spam mails at the gateway itself, giving us a clean and secured network”.

  • User Identity Based Security

    Cyberoam UTM, with a distinct identity-based security solution protects against insider threats by giving absolute visibility into “Who is doing What?” in the network. Mr. Tolentino used Cyberoam’s Active Directory facility for monitoring the employees. This feature greatly helps him to create policies for controlling the activities based on identity of the users rather than IP Addresses. Thus it helps him to know what is going on in the network with less effort. Mr. Tolentino being impressed by this feature said, “Cyberoam’s Identity based security solution works efficiently and has considerably reduced our concerns”.

  • Secured Remote Data Transmission

    Cyberoam’s VPN bridges the geographical distances between the Head Office (HO) and the Branch Offices (BO). It ensures secure connectivity in such a way that no attacker can tamper with the data. Also, its road warrior connectivity enables the BOs to securely access the servers located at HO from anywhere and anytime. Moreover, its Threat -free Tunnelling Technology makes sure that no malware can enter the network. In addition, its VPN connection failover feature offers automatic continuous connectivity for IPSec connections across multiple ISP gateways. Mr. Tolentino said, “We are now able to securely connect our users from different sites, increasing efficiency and flexibility of GFII”.

  • User Activity Being Looked Over

    Cyberoam’s On-Appliance Reporting feature enables the company to know “Who is doing What?” across the network and remote locations. The reporting module includes features like Traffic Discovery, Internet Bandwidth Usage Monitors, Top Accessed Categories and Google Search Reports, which enhanced the visibility of a user’s online behaviour. Additionally, this feature provides 1000+ granular reports without any extra cost. Mr. Tolentino said, “Cyberoam enables us to view reports and logs at any time for audit and review”.

  • To Conclude

    Mr. Tolentino said, “Cyberoam is a good product that gets easily installed and configured. I would recommend it to all in search of a good security solution”.