Kingshoe Manufacturing Sdn Bhd Malaysia, Asia
Cyberoam Provides Secure Drive to Kingshoe Manufacturing Sdn Bhd
About Kingshoe Manufacturing Sdn Bhd, Retail

Established since 1968, Kingshoe Manufacturing was set up to fill the niche for industrial shoes in the growing economies of Asia and the world. Today, it is a market leader, capturing an impressive 40 per cent of the Asia market share.

With operations in full swing in Batam - Indonesia, Malaysia and Singapore, the company has turned its latest automation and robotics towards meeting customers’ requirements. As these requirements no longer revolve just on the safety aspects, King's has began to emphasize the creative yet functional design in safety shoes, a trend unheard of until now.

Kingshoe Manufacturing has captured the imagination of many of today’s new generation of industries. Today, King's shoes are worn proudly, for both its protective function and being in sync with the life and trends of today and for tomorrow.

Kingshoe Manufacturing Sdn Bhd contract documents and sensitive servers are under constant threat from spyware, and DoS attacks. So they were in need of Gateway firewall solution for protection of their entire network.

Mr. Chee Keong Seng,
MIS Senior Executive,
Kingshoe Manufacturing Sdn Bhd

Mr. Chee Keong Seng, the MIS Senior Executive at Kingshoe Manufacturing was looking for a reliable Internet security platform to protect its users. “We needed a solution which would give us highest ROI while taking in hand our major security concerns – all in a solitary box”, Mr. Seng said.

The concerns are listed below.

Shielding the Network Edge

The Kingshoe Manufacturing network basically comprised of business secrets, confidential data ,client sensitive information and data that can be possibly targeted by attacks from external entities and outside access attempts. Hence, Mr. Seng wanted a solution that would control the entire Internet traffic and provide a level of protection from network-based attacks by allowing good traffic and denying bad traffic as defined by a security policy.

Monitoring Website Access

The organisation wanted to block unwanted sites while enforcing productive surfing among employees and to prevent phishing and pharming.

They wanted a suitable content filtering solution with reporting feature for showing graphs and traffic results on specific sites accessed by staff when they switch computers.

VPN Connectivity

Kingshoe Manufacturing has evolved into an organization with independent networks at remote sites supporting many users. The primary challenges for Kingshoe Manufacturing were to provide access to sensitive data across a more secure and stable VPN. Internet is relied on profoundly to allow remote sites VPN access back to the office.

The Cyberoam Solution

Kingshoe Manufacturing looked into a number of security products including Fortinet in order to address their business challenges but the reporting feature of Fortinet did not fulfilled their expectations.

The search was on for an appliance which would take care of their all above requirements. So they felt that Cyberoam was the apparent choice. The organization then deployed Two (2) CR25i at their Malaysia office in Gateway mode.

The business benefits were as follows:

  • Identity based Authentication

    The automated Single Sign-On is another trait feature that Mr. Seng deployed. Using this feature, all the users transparently log in to Cyberoam when they boot up their machine. Once the user has been authenticated by Cyberoam, the UTM applies the relevant access control policy on the user, irrespective of the machine from which they have logged into the network. Identity is used in Cyberoam to encapsulate the user in a security policy that follows him wherever he or she logs into the network.

  • Total Perimeter Security

    Cyberoam’s ICSA and Checkmark-certified firewall offers stateful and deep-packet inspection to provide granular access control over Internet and network resources. Mr. Seng used default IPS policies from the firewall rule itself to protect Kingshoe’s Manufacturing corporate network from DoS & spoofing attacks and other exploits.

  • Web Security

    Cyberoam’s 82+ categories tough Web Content filtering technology kept the organisation’s internet resources effectively focused. The Content filtering feature makes sure that all P2P and Instant Messengers are blocked and that there is no breach of data. It blocks access to harmful websites, preventing malware, phishing, pharming attacks and undesirable content that could lead to legal liability and direct financial losses. Cyberoam helps manage staff access to websites, minimizing lost time on the internet, and lowering operating costs.

  • More Resilient Internet Connectivity

    The CR25i appliance deployed at the both office in Kuala Lumpur and Johor Bahru were used to ensure IPSec VPN connectivity along with the Cyberoam appliances with each other. This allowed remote office users to seamlessly access their work without any worries of breakdown in Internet traffic. Threat-free Tunneling (TFT)-driven VPN ensures that all such traffic is securely encrypted and no malware sneaks through it.

  • Superior Reporting

    Cyberoam’s reporting feature gives summary of what the users are up to in the network, including fruitless sites visited, time spent on each site. According to Mr. Seng, this has led to increased efficiency as the employees know that they are being monitored or restricted from accessing blocked sites.

    In simpler words, I can say that Cyberoam UTM is just like an array of security features.” said. Mr. Seng.