PT Mayora Indah Tbk Indonesia, Asia
Cyberoam UTM Proves to be Productivity Promoting Security Solution for Mayora
About PT Mayora Indah Tbk, FMCG

Since first established in 1977, PT Mayora Indah Tbk has been one of Indonesia’s important food companies. As a result of the country’s economic growth and the shift in social consumption pattern towards more practical products, PT Mayora boasts a rapid growth over the years.

Today, PT Mayora Indah Tbk has many product lines, such as:

  • Biscuit: Roma, Better, Slai O Lai, and Danisa
  • Candy: Kopiko, Kis, Tamarin, and Plonk
  • Wafer: Beng Beng, Astor, and Roma
  • Chocolate: Choki Choki, and Danisa
  • Health Food: Energen
  • Coffee: Torabika

To meet the ever increasing market demand, PT Mayora Indah Tbk went public through an Initial Public Offering (IPO) in 1990. A successful move that is evident from the set up of factories in Tangerang, Bekasi and Surabaya. Supported by strong and wide distribution networks, the products are available throughout Indonesia and some overseas countries such as Malaysia, Thailand, Philippines, Vietnam, Singapore, Hong Kong, Saudi Arabia, Australia, Africa, America and Italy.

Simple deployment, easy to maintain Internet security solution that would provide comprehensive audit and control over all Internet access and activity was our requirement.

Mr. Iwan Saputra
PT Mayora Indah Tbk)

Mr. Iwan Saputra, the Head of IT Technical Development at Mayora had a wish-list that every big FMCG IT Manager might have. His requirements were:

Simple Deployment

The organization wished to deploy a solution that did not entail a lot of changes in the existing network. The solution should blend seamlessly into the existing network and provide non-intrusive, business-friendly security. The solution ought to be affordable in terms of one time capital expenditure and recurring operational expenditure. It should be easy to manage, user-friendly and not demand specific expertise or knowledge.

Internet Access Control

The Jakarta-based head office and numerous branch offices spread in Indonesia involved a large number of employees. Not all employees are given Internet access. The Internet access given to a select few and that access also had to be strictly regulated.

Control over Internet-Based Applications

Only authorized Internet-based applications need to be allowed access to. All unauthorized downloads needed to be blocked. Downloads or login into all types of
P2P and other unproductive applications must be prevented.

Audited Internet Access

All Internet-based activities have to be logged. The logging and reporting should be user identity-based and not just IP Address-based, where the administrator cannot identify the actual user behind it. The reporting should be clear and should be able to provide clear visibility to the administrator about all Internet usage and surfing patterns.

The Cyberoam Solution

The organization was cautious and did an extensive market survey and a few Proof-of- Concept tests to find out the most appropriate solution to fulfill their demands. They evaluated Fortigate and Cyberoam UTMs. After careful consideration, they deployed a Cyberoam CR100i in their Jakarta-based head office.

  • Configure and Fire Solution

    To gain maximum advantage from Cyberoam’s Identity-aware content filtering feature, Mr. Saputra integrated it with the organization’s Active Directory. The hassle-free login and authentication process are totally transparent and non-intrusive to the end user. Cyberoam blended seamlessly into the existing network with minimal changes.

  • Identity-Aware Filtering

    Cyberoam’s Checkmark certified identity-aware Content Filtering solution enables the administrator to reign in all unproductive and harmful Internet surfing. He is able to assign surfing rights to match the professional profile of the employee. Whenever needed, Cyberoam’s reports provided him with the user’s identity. The information about the actual person using an IP Address can be easily gleaned from the reports.

  • Productive Internet Usage

    The comprehensive content filtering capacity of Cyberoam is powered by 82+ category strong database of 44 million URLs. It can also control HTTPS-based websites, thus eliminating any security loopholes. In addition, Cyberoam allows customizable messages for its Web pages that it blocks. This helps the organization educate the end user about the company’s Internet policy. Reports like Top 10 Web Surfing and Data Transfer categories of reports help Mr. Saputra to quickly zero-in on potential policy violators. The highlight of all these type of reports is that they actually give the user’s name directly. Hence using these kinds of reports helps the administrator to quickly locate the person who has accessed the Internet and downloaded the most.

    All unauthorized and harmful sites and downloads are blocked; so are all P2P and IM applications. All phishing and pharming sites are out of bounds.

  • To round it off

    “We find Cyberoam UTM a dependable solution. Cyberoam delivers productivitypromoting, business-friendly security,” Mr. Saputra concluded.