Piedmont Plastics, United States of America
Cyberoam Replaces Cisco to provide Comprehensive Network Security to Piedmont Plastics
About Piedmont Plastics, Manufacturing

Piedmont Plastics is one of most respected North American distributor and converter of basic plastic shapes and films. They intend to achieve even greater heights while maintaining the highest level of integrity in all aspects of their activities, and in a manner that promotes an enjoyable and profitable working environment for their customers, employees and suppliers.

Piedmont Plastics is committed to continuous improvement. They invest in quality materials, advanced technology systems, training, and industry requirements. Their distribution, fabrication, and film conversion centers are ISO 9001:2008 Registered.

We wanted a Network Security solution that would also provide us visibility of the entire network.

Marc Klinger
Chief Information Officer
Piedmont Plastics

Explaining about the organization’s Network Security requirements Marc Klinger, Chief Information Officer at Piedmont Plastics said, “We needed a network security solution that would guard our network periphery from all kinds of intrusion attacks while providing a complete picture of all the activities happening in the network.”

Unguarded Network Perimeter

How good are locked offices and buildings when the computers holding the confidential information are open to everyone on the network? In a time when most businesses contain confidential data that can be possibly targeted by attacks from external entities, it becomes very important to have a strong line of defense at the Gateway. Piedmont Plastics contains public servers, such as E-Mail and Web, which are exposed to outside world in order to satisfy business activities. Klinger wanted a solution that would control the entire Internet traffic and establish clear-cut boundaries between the internal networks and the outside world.

Spam Issues

Despite using a dedicated spam filter solution, there was no significant reduction in the number of spam hitting the Piedmont Plastics’ mail server. In addition, on several occasions a legitimate mail was categorized as a spam. Klinger wanted a solution that would on one hand, provide best-in-class spam filtering feature and on the other hand, be straightforward and easy to administer.

Control over Web and Application usage

According to Klinger, the down side of having your business heavily dependent on the Internet is when it is used for unproductive purposes. The uncontrolled and unmonitored usage of web and applications is highly undesirable for any organization. Hence, Klinger was looking for a solution that would provide him with effortless content filtering. He wanted the web categorisation to be simple and straightforward so that the administrator could adjust the settings without the need to rely on external support.

Network Visibility Concerns

According to Klinger, Logging and Reporting must be an integral feature for any UTM solution. “We wanted a Network Security solution that would also provide us visibility of the entire network, be it any kind of network intrusion att empts, top accessed applications/websites, top users etc.”, said Klinger.

The Cyberoam Solution

Having been dissatisfied with Cisco ASA because it introduced a lot of complexity in the network, demanded high operational expenditure and overheads, Piedmont Plastics was in search of a solution that could provide them with better services with ease of administration. After searching the market for a solution that would take care of their all above requirements, Piedmont Plastics purchased Two (2) CR 750ia.
They deployed both the appliances at their Head Office in Gateway Mode and work as a HA Cluster.
After deploying Cyberoam in the network, the benefits that they notice are:

  • Perimeter Level Protection

    Cyberoam’s ICSA and Checkmark-certified firewall offers stateful and deep-packet inspection to provide granular access control over Internet and network resources. Piedmont Plastics operates the Firewall between the Internet and the organization’s network to establish a secure environment for the organization’s computers and network resources. This Firewall governs how the Internet traffic is filtered, to mitigate the risks and losses associated with security threats to the company’s network.

    Cyberoam’s Intrusion Prevention System (IPS) feature delivers a strong line of defense at the network perimeter, through 4500+ updated signatures against hackers, remote exploits, backdoor activity and other zero hour attacks. Klinger used default IPS policies to protect Piedmont Plastics’ corporate network from DoS, spoofing attacks and other exploits.

  • Spam Filtering

    Cyberoam’s Anti Spam technology powered by Recurrent Pattern Detection (RPD), works instantly on deployment, with the least human intervention. It provides Spam detection rate of over 98% and a false positive rate of 1 in 1 million. In addition, it blocks spam in any language regardless of the content. It is also equipped with Virus Outbreak Detection, protecting the organization’s network against any zero day attack. “Thanks to Cyberoam’s Anti Spam solution, the Spam mails are now miles away from user’s inbox. In addition, its impressive false positive rate ensures that no legitimate mail is ever categorized as a spam”, said Klinger.

  • Web and Application Filtering

    Cyberoam’s Web filtering database has more than 100 million sites neatly grouped into more than 89 categories. With an option to bind User identity and time schedule to a Web Filter policy, he has granular control and unparalleled flexibility in implementing the organization’s strict policy of content accessed over the Internet.

  • Complete Network Visibility with Cyberoam iView

    Klinger says, “Cyberoam’s Identity-based reporting is its key feature. The granular control and visibility, deep down to the user level helps us a great deal in the making of many of our network security policies.” The Reporting Module includes many useful features that enhance the visibility of a User’s online behavior. Some of the key features include 4-eye Authentication, Traffic Discovery, Internet Bandwidth Usage Monitoring, and Top Accessed Categories.

  • To Conclude

    “Cyberoam provides the best Return over Investment. We achieved all the benefits we expected from the product, with more ease of administration compared to our previous solution”, said Klinger.