Green Future Innovations Inc., Philippines, Asia
Green Future Innovations Inc. Depends on Cyberoam for Total Internet Security
About Green Future Innovations Inc., Energy
Green Future Innovations Inc. (GFII) is a
corporation fully committed towards a
green and sustainable development. They
are one of the emerging Ethanol
producers in Asia. The organization is a
joint venture corporation by and among
Filipino, Taiwanese and Japanese
partners. It is also a domestic corporation
duly-registered under Philippine Laws.
They build and operate a large scale bio
ethanol and cogeneration plant located in
San Mariano, Isabela, Philippines
GFII working for the mission of a Green
Future for the entire world requires
Internet for research, communication,
general surfing and administrative
Internet being used as a lifeline for us, we cannot compromise on its connectivity and security. Hence, its protection from blended cyber threats was our foremost apprehension.”
Mr. Leonides V. Tolentino
AVP for IT
Green Future Innovations Inc.
Mr. Leonides V. Tolentino, the AVP for IT at GFII said, “Internet being used as a
lifeline for us, we cannot compromise on its connectivity and security. Hence, being
the most productive resource, its protection from blended cyber threats was our
The network security issues faced by them were:
Unsecured Network Infrastructure
Mr. Tolentino wanted his network infrastructure to be safe from DoS, DDoS, IP
Spoofing and other unpredictable network attacks. He was worried that even a single
successful intrusion could lead to intolerable consequences for their business.
Un-Audited Internet Usage
General and unrestricted surfing provided an entrance for malware to enter the
network. These malicious objects like Trojans, viruses, spyware etc. entered silently
and quietly through surfing, Emails, downloading and VPN tunnels. Hence, Mr.
Tolentino wanted to safeguard the organization’s network from such attacks that
caused unnecessary nuisance such as loss of data, corrupt files and system crashes
resulting into serious downtime.
The Cyberoam Solution
GFII searched the market for a good solution that could meet all their requirements
without any extra peripheral devices. In their search, they found Cyberoam to be
good and deployed Six (6) appliances in Gateway Mode. The models and locations
of the appliances are given below.
After deploying Cyberoam in their network the
positive results noticed are:
- Secured Network Infrastructure
Cyberoam’s Firewall is ICSA and Check Mark
Level 5 Certified. It provides granular access
controls over Internet traffic and network
resources. Also, its Fusion technology enables
administrators to create policies for multiple
features through a single interface.
With a database of 4500+ IPS signatures
Cyberoam’s Intrusion Prevention System (IPS)
automatically detects, blocks and drops
suspicious HTTP, SMTP, POP3, FTP, IMAP,
P2P and IM traffic ensuring network security. It
also provides signature updating facility that
updates the signatures regularly and provides
zero-hour protection against latest attacks.
Mr. Tolentino said, “Cyberoam efficiently
safeguards the GFII’s network infrastructure,
providing clean and attack-free network”.
- Regulated Internet Usage
Cyberoam’s Web Filtering solution provides a
database of millions of URLs divided into 89+
categories, helping Mr. Tolentino to allow the
staff to access only those websites that are
authorized by the company’s policies.
Moreover, the Application Filter blocks all
malware-laden sites, P2P, Instant Messengers,
illegal audio, video, streaming media and other
bandwidth-intensive download. Cyberoam’s
identity-based filtering allows administrator to
create schedules and assign Internet access
policies, surfing quota, time limits and
bandwidth restrictions to individual user based
on certain criteria. As a result, this helped GFII
in increased productivity, reduced bandwidth
congestion and security of network from
Mr. Tolentino said, “Cyberoam has enabled us
to control and monitor access not only at
Identity level but also at Application level,
minimizing the unnecessary Internet activities
of the users and thus ensuring increased
productivity and reduced bandwidth problems”.
- Spam and Malicious Objects Blocked
at the Gateway
Cyberoam’s Check Mark Level 5 certified
Gateway Anti-Virus and Anti-Spyware solution
offers web, Email and IM security against
malware, including viruses, worms, Trojans,
spyware and key loggers. Email, Web and VPN
traffic is also scanned for malware. It also
blocks attachments for specified file types like
executables, media files, password-protected
files etc. before any malware affects the
Cyberoam’s Gateway Anti-Spam solution
provides Recurrent Pattern Detection
technology that is content and language
agnostic. Moreover, it provides protection
against foreign characters and image-based
Spam with almost no cases of false positives.
Finally, its Virus Outbreak Detection (VOD)
feature protects the network against real -time
massive virus outbreaks.
Mr. Tolentino said, “Cyberoam’s Anti Virus
blocks all the malicious substances and Spam
mails at the gateway itself, giving us a clean
and secured network”.
- User Identity Based Security
Cyberoam UTM, with a distinct identity-based
security solution protects against insider threats
by giving absolute visibility into “Who is doing
What?” in the network. Mr. Tolentino used
Cyberoam’s Active Directory facility for
monitoring the employees. This feature greatly
helps him to create policies for controlling the
activities based on identity of the users rather
than IP Addresses. Thus it helps him to know
what is going on in the network with less effort.
Mr. Tolentino being impressed by this feature
said, “Cyberoam’s Identity based security
solution works efficiently and has considerably
reduced our concerns”.
- Secured Remote Data Transmission
Cyberoam’s VPN bridges the geographical
distances between the Head Office (HO) and
the Branch Offices (BO). It ensures secure
connectivity in such a way that no attacker can
tamper with the data. Also, its road warrior
connectivity enables the BOs to securely
access the servers located at HO from
anywhere and anytime. Moreover, its Threat -free Tunnelling Technology makes sure that no
malware can enter the network. In addition, its
VPN connection failover feature offers
automatic continuous connectivity for IPSec
connections across multiple ISP gateways. Mr.
Tolentino said, “We are now able to securely
connect our users from different sites,
increasing efficiency and flexibility of GFII”.
- User Activity Being Looked Over
Cyberoam’s On-Appliance Reporting feature
enables the company to know “Who is doing
What?” across the network and remote
locations. The reporting module includes
features like Traffic Discovery, Internet
Bandwidth Usage Monitors, Top Accessed
Categories and Google Search Reports, which
enhanced the visibility of a user’s online
behaviour. Additionally, this feature provides
1000+ granular reports without any extra cost.
Mr. Tolentino said, “Cyberoam enables us to
view reports and logs at any time for audit and
- To Conclude
Mr. Tolentino said, “Cyberoam is a good product that gets easily installed and configured. I
would recommend it to all in search of a good security solution”.