PT Mayora Indah Tbk Indonesia, Asia
Cyberoam UTM Proves to be Productivity Promoting Security Solution for Mayora
About PT Mayora Indah Tbk, FMCG
Since first established in 1977, PT Mayora Indah Tbk has been one of Indonesia’s
important food companies. As a result of the country’s economic growth and the shift in
social consumption pattern towards more practical products, PT Mayora boasts a rapid
growth over the years.
To meet the ever increasing market demand, PT Mayora Indah Tbk went public through an Initial Public Offering (IPO) in 1990. A successful move that is evident from the set up of factories in Tangerang, Bekasi and Surabaya. Supported by strong and wide distribution networks, the products are available throughout Indonesia and some overseas countries such as Malaysia, Thailand, Philippines, Vietnam, Singapore, Hong Kong, Saudi Arabia, Australia, Africa, America and Italy.
Simple deployment, easy to maintain Internet security solution that would provide comprehensive audit and control over all Internet access and activity was our requirement.
Mr. Iwan Saputra
PT Mayora Indah Tbk)
Mr. Iwan Saputra, the Head of IT Technical Development at Mayora had a wish-list that every big FMCG IT Manager might have. His requirements were:
The organization wished to deploy a solution that did not entail a lot of changes in the existing network. The solution should blend seamlessly into the existing network and provide non-intrusive, business-friendly security. The solution ought to be affordable in terms of one time capital expenditure and recurring operational expenditure. It should be easy to manage, user-friendly and not demand specific expertise or knowledge.
Internet Access Control
The Jakarta-based head office and numerous branch offices spread in Indonesia involved a large number of employees. Not all employees are given Internet access. The Internet access given to a select few and that access also had to be strictly regulated.
Control over Internet-Based Applications
Only authorized Internet-based applications need to be allowed access to. All
unauthorized downloads needed to be blocked. Downloads or login into all types of
Audited Internet Access
All Internet-based activities have to be logged. The logging and reporting should be user identity-based and not just IP Address-based, where the administrator cannot identify the actual user behind it. The reporting should be clear and should be able to provide clear visibility to the administrator about all Internet usage and surfing patterns.
The Cyberoam Solution
The organization was cautious and did an extensive market survey and a few Proof-of- Concept tests to find out the most appropriate solution to fulfill their demands. They evaluated Fortigate and Cyberoam UTMs. After careful consideration, they deployed a Cyberoam CR100i in their Jakarta-based head office.