Cyberoam CaseStudy on Siyaram Silk Mills Ltd

Transcription

Cyberoam CaseStudy on Siyaram Silk Mills Ltd
Unified Threat Management
Case Study
Organization
Siyaram Silk Mills Ltd
Siyaram Silk Mills Ltd, Lower Parel, Mumbai
Industry
Textile Industry
Cyberoam UTM Forms an Integral Part of Siyaram's
Futuristic Security Landscape
Background
Siyaram Silk Mills Limited promoted by the Siyaram Poddar Group, started
operations on the 29th of June 1978. Since then the company has expanded,
diversified and integrated its facilities substantially. Siyaram's presently has facilities
for manufacturing and marketing of Suiting, Shirting, Texturising, Dyeing yarn and
ready-made garments. In its more recent foray, the company has ventured into the
retail industry.
Siyaram's is home to some of the country's leading textile brands which include:
Siyaram, MistAir, J.Hampstead, Oxemberg, Miniature Featherz and MSD.
We have deployed eighteen
(18) Cyberoam UTM
appliances across six main
locations and other remote
sites. The primary reasons
for choosing Cyberoam are
its intuitive interface and
identity based reporting,
which the other solutions
lack,”
Mr. Ananthakrishnan
(Head-IT, Siyaram's)
The Challenge
Like every fast progressing company, Siyaram's decided to take up a major
modernization drive. Under the drive they decided to revamp the existing network to
cater to the present and futuristic needs. An enterprise-wide secure IT environment
was an integral part of the new network landscape.
The new futuristic network landscape had a few important inherent considerations.
Siyaram's production and corporate infrastructure is spread over six different
locations. Remotely located nation-wide branch offices also form an important
auxiliary network, which has to be secured to the mainstream. Mr. Ananthakrishnan
(Head-IT, Siyaram's) wanted a fully redundant network which can provide round-theclock connectivity to the six main locations and other remote offices. The remote
locations are connected to the main network through leased lines with VSAT
(Satellite) providing backup to the leased line.. Moreover, for the remote locations, the
failover deployment would be such that in case of the leased line failure, the total
traffic would be redirected through the, hitherto passive, VSAT link. Security over the
distributed network is highly demanding.
“With organizational growth, the number of locations and Internet users multiplied.
However, not everyone required a World Wide Web connection. Our aim is selective
Internet access to achieve effective and productive information dissemination,” said
Mr. Ananthakrishnan.
Siyaram's adopted Active Directory Service (ADS) as a backbone for the entire
organization. Apart from the other needs stated above, they needed a UTM that
would cater to three primary requirements, viz,
1.
Neutralize virus and malware threats
2.
Manage various levels of access using identity
3.
Link bandwidth management using identity-based services
Cyberoam Solution
“We went through a very detailed evaluation process where in we actually put UTMs
from three vendors to detailed and rigorous testing in a live user environment for a
period of one month each. Based on these detailed tests, we zeroed in on Cyberoam
UTM. We have deployed eighteen (18) Cyberoam UTM appliances across the six
www.cyberoam.com
Unified Threat Management
“The results of
Cyberoam's anti-virus and
anti-spam are
encouraging, even in face
of image-based spam.”
Case Study
locations and other remote sites on a High-Availability mode. We chose Cyberoam
CR500i for the central location, Cyberoam CR250i for the DR site and Cyberoam
CR50i appliances to provide perimeter security to branch offices and remote
locations. The primary reasons for choosing Cyberoam are its intuitive interface and
identity based reporting, which the other solutions lack,” Mr. Ananthakrishnan said
Cyberoam's Firewall page provided centralized access and management to all the
security services. This facility simplifies the process of policy creation, irrespective to
the security service. Coupled with extremely user-friendly interface, Mr.
Ananthakrishnan found the complex task of UTM management, simplified resulting
into less training investment.
Cyberoam allows remote management of its Web Admin Console (GUI) over Secure
HTTP. This ensures that the distributed appliances can be managed remotely without
on-site deployment of a skilled person.
“Cyberoam UTM uses Kaspersky Antivirus, which is one of the leading anti-virus
vendors. The results are quite encouraging,” Mr. Ananthakrishnan said. As
Cyberoam scanned the Web and the mail traffic for malware and virus, the possibility
of infection creeping in through the gateway is effectively mitigated.
“Cyberoam allows group
based granular rule
creation, which can be
further fine-tuned to an
individual user's level. So
you can have a different
group policy and a
different user based
policy.”
The image based spam capture is also providing encouraging results.
The in-house URL based filtering database of Cyberoam is very impressive. It helps
protect against spyware and other malware by preventing the users from accessing
such sites. Apart from porn and P2P sites, it also has categories to block Phishing and
frauds.
“We have divided our users into different groups based on their professional
responsibilities,” Mr. Ananthakrishnan said. The groups have profile-based access to
the Internet, eg. HR is the only group with access to jobs' sites. Moreover, as a part of
the corporate policy, no user is allowed to access Porn, Instant Messaging, streaming
and downloading. Because of lack of filtering and access management earlier, the
highest bandwidth hoggers were the stock market sites, which now has been
restricted to be accessed by only the Securities Dept.
.
While describing Cyberoam's superior identity-based policy management, Mr.
Anantkrishanan said, “One of the major advantages of Cyberoam is that it allows
group based rule creation, which can be further fine-tuned to an individual user's
level. So you can have a different group policy and a different granular user-based
policy.” Cyberoam's Identity based policies and reporting also helps him to keep a
direct track and control over the end user's online activities.
Siyaram's is also in the process of implementing SAP. To facilitate this
implementation, Cyberoam helped them split and prioritize the total available
bandwidth among service, group and users, respectively. Cyberoam's multilink
manager made sure that the organization always had a live Internet link, providing
round the clock connectivity.
Visit: www.cyberoam.com
Contact: [email protected]
www.cyberoam.com
USA India -
Tel: +1-978-465-8400, Fax: +1-978-293-0200
Tel: +91-79-66065606, Fax: +91-79-26407640
Elitecore Product