Tata Automobile Corporation SA South Africa Africa
Cyberoam – Extending Security Cover to Tata Automobile Corporation SA (PTY) LTD
About Tata Automobile Corporation SA (PTY) LTD., Manufacturing

TATA started in South Africa in 1997 with small volumes as an introduction into, selling a 4 ton truck, the 713 - and 2 ton truck, the 509. This only took a few years to launch them into the company selling trucks of substance and durability, and importing more models just as sturdy and robust yet with really competitive pricing.

TATA is now not only a powerful force and major player in SA trucking market, but they have the dealership network to back their products fully throughout SA. TATA is also topping the scales in the market share industry and gaining a reputation of an excellent product at a respectable price.


The network covered sensitive information which was under constant threat from spyware and DoS attacks. So they needed a strong Firewall and IPS solution.

Mr. Charles van Rooyen
Financial Manager
Tata Automobile Corporation SA


Mr. Charles van Rooyen, the Financial Manager for Tata Automobile Corporation was looking for a reliable Internet security platform to protect its users. “We needed a solution which would give us highest ROI while addressing our major security concerns – all in a single box”, Mr. Charles van Rooyen said. The concerns are listed below.

Basic Perimeter Protection & IPS

Due to the multitude of personal data held in the IT systems — ranging from competitive pricing and staff payrolls to customer details — it is crucial for Tata Automobile Corporation to ensure the highest level of security internally as well as to its customers. This sensitive information was under constant threat from spyware, and DoS attacks and many more. It was also significant to put a stop to any incident of communication loss or data tampering due to eavesdropping attacks from outsiders. So they needed a strong Firewall and IPS solution to fight against these attacks.

Controlling Malware and Spam Incidence

For Tata Automobile Corporation, a routine virus attack in the network, especially in a blended form, would translate into a lot of uninvited problems – corrupt files, and huge downtime. The spam problem was even more serious as a large number of unwanted mails with subject lines such as pharmaceutical adverts, lottery would crash the server.

Watching Website Access

The organisation sought to keep an eye on and limit its users from accessing unproductive sites such as music, video, social networking, etc to help them in their work. Opening up access to these sites for all users resulted in bandwidth getting “choked”. They wanted a suitable content filtering solution with reporting feature for showing graphs and traffic results on specific sites accessed by staff.

The Cyberoam Solution

In order to address their business challenges, Tata Corporation looked into a number of security products including Fortinet. However, after seeing a trial demo of Cyberoam by Complete Enterprise Solution, they took the decision of replacing the existing Fortinet device at the head office with a Cyberoam CR50ia “accelerator” series UTM appliance. The appliance was deployed in gateway mode.

The business benefits were as follows:

  • Identity-based Security

    Cyberoam UTM not only retained essential features of the previous Fortinet solution, but also delivered unexpected value additions such as the award-winning identity-based security feature which provides full visibility of user activities in the network.

    To elaborate, after integrating Cyberoam into the Tata Automobile Corporation network infrastructure, Mr. Charles van Rooyen used its Active Directory Services (ADS) to include all Tata Automobile Corporation Internet users in the database and implemented Single-sign-on functionality so their online activities could be further monitored.

  • The Barricade of Fire – Firewall

    Cyberoam firewall is ICSA and Checkmark certified - provides granular access controls over Internet traffic and the network resources. This helps to determine if a data packet should be permitted or discarded through the firewall to the internal LAN.

    Mr. Charles van Rooyen used default IPS policies from the firewall rule to protect the network from DoS and spoofing attacks and other exploits. He also used IPS to protect their network, customer’s information, dealer’s information, their price list, and other confidential data from intrusion attempts.

    With a comprehensive database of 3000+ IPS signatures, Mr. Charles van Rooyen now feels that the organizations data is well protected from several variants of spyware attacks, spoofing and DoS attacks in addition to keyloggers, Trojans and more. Cyberoam’s hardnosed promise to security and protection aided them perk up their network efficiency and performance.

  • Virus & Spam Protection

    Cyberoam’s gateway anti virus and anti spyware features lookout all the web and mail traffic – SMTP, IMAP, POP3, HTTP, HTTPS and FTP protocols and make sure that no malware or spyware creeps through the edge. Additionally, the anti-virus blocks attachments for specified file types such as executables, media files, PDF, zipped files etc. before these blended threats can demolish the network.

    Recurrent Pattern Detection (RPD) powered signature-less anti spam technology works instantly on deployment, with the least human intervention and is language independent. It blocks spam in any language regardless of the content, e.g. image, audio, video or zip-based spam. The anti spam feature is also equipped with Virus Outbreak Detection. This protects the organization against any zero day attack.

  • Web Filtering

    Cyberoam’s Web filtering solution, with more than eighty two (82) categories ensured that the staff does not access pornography, violence and other harmful content on the Web. Cyberoam blocks the pop-ups and the phishing sites. All the harmful Trojans, cookies and scripts sites were also safely out of bounds for the employees.

    Additionally, Cyberoam also filtrates the handling of HTTPS based sites with the help of its keyword and URL filtering techniques as well as Signature based detection technique.

    Mr. Charles van Rooyen commended Cyberoam as an excellent Web Filtering solution that does not compromise on needs of staff. He added that they were happy with their judgment of deploying Cyberoam UTM appliances for Tata Automobile Corporation.

  • Useful Reporting

    Cyberoam’s reporting feature gives overview of what the users are up to in the network, including blocked sites visited, time spent on each site. According to Mr. Charles van Rooyen, this has led to increased productivity as the staff knows that they are being monitored or restricted from accessing blocked sites.

    Mr. Charles van Rooyen adds, “We are indeed very satisfied with this reporting module. Gaining easy visibility into applications with user name, source, destination, period and extent of usage, enabling to zero in on rogue users and systems easily is the biggest highlight of Cyberoam UTM.”