Yokogawa India Ltd., India, Asia
Cyberoam proves to be more effective for Yokogawa than top security vendors
About Yokogawa India Ltd., Electronics and Software

From being primarily a provider of Process Automation Systems and Products, Yokogawa India Limited (YIL) is today positioned as a Comprehensive Solutions Provider of Enterprise Technology Solutions (ETS). Established in 1987, YIL has created the state of art global engineering center and manufacturing center in Bangalore. They have a strong marketing and service network across India. They also have a breadth of competencies to meet the technological requirement of the Indian Process Industry. They excel in turnkey project execution in Process Automation and Enterprise Integration, with core competencies in Design and Engineering of Process Control Systems, Implementation of Extended Enterprise Applications and more.

After introducing Cyberoam into our network, we have been able to save cost on bandwidth and increase Internet surfing speed and productivity.
Cyberoam has given us more value against money than the leading security vendors combined.

Mr. Manoj Kumar
Deputy Manager - IT
Yokogawa India Ltd.

Highlighting the need for replacing their existing CheckPoint solution, Mr. Manoj Kumar, the Deputy Manager - IT at Yokogawa said, “We need to provide Internet access to our users for business purposes and to ensure speed and security of content. The existing Checkpoint system was not effective at addressing our business challenges”.

According to Mr. Kumar, the issues that they faced were:

Need for Web and Application Filtering

Mr. Kumar desired to ensure that the users at Yokogawa use the Internet for productive, work-related activities only. He wanted to prevent users from accessing unproductive, harmful and malware-laden websites which can expose the company’s network to cyber threats. One of the most important vectors of worry was the productivity. The productivity might be affected while spending precious time in unproductive surfing and downloading. “Restricting uploading/downloading of streaming media, which occupied precious bandwidth, was our main concern”, Mr. Kumar said.

User Accountability Issues

Mr. Kumar desired that each and every network activity of all the users should be properly accounted, irrespective of the way or the device they use to connect to the network. “The need for us was deployment of a proper user accountability solution which could log and monitor the entire browsing pattern of a user”, said Mr. Kumar.

Virus and Malware Threat

Unrestricted and unmonitored surfing often provides an entrance for Malware to enter the network. These malicious objects like Trojans, Viruses, and Spyware etc. enters the network quietly and often takes a blended form, like infecting the network through email attachments. Often, these attacks have the potential to cost an organization a great deal of time, money and productivity of their employees.

The Cyberoam Solution

After having dissatisfactory experience with major security products including CheckPoint, FortiGate and SonicWALL, Yokogawa was looking for a product that could solve their business challenges more effectively. After a thorough evaluation, they were impressed with Cyberoam’s award -winning Layer 8 technology. They purchased One (1) CR 2500iNG appliance and deployed it at their office in Bangalore, India in Gateway Mode.

After deploying Cyberoam in the network, the benefits that they notice are:

  • Seamless AD Integration

    Cyberoam’s Active Directory integration feature allows the appliance to map users and groups from ADS with Cyberoam for the purpose of authentication. This enables the appliance to identify network users transparently. Cyberoam communicates with Windows Directory Services to authenticate users based on groups, domains and organizational units. Mr. Kumar uses Cyberoam’s AD authentication along with Local authentication to provide Identity-based security for around 1,500 users.

    Mr. Kumar said, “Thanks to Cyberoam’s AD Integration feature, mapping users between our AD Server and the Cyberoam appliance is now a piece of cake. Unlike CheckPoint, Cyberoam’s AD Integration feature just works”.

  • Identity-based Authentication, Authorization, and Audit

    Cyberoam’s Layer 8 Technology allows Mr. Kumar to design identity-based policies, which extends throughout the network, irrespective of the device used by the employees to connect to the network. Cyberoam Security appliances offer identity-based AAA (Authentication, Authorization, and Audit) allowing control and visibility of who is connected to your network, using what device and what they are accessing.

  • Safe, Productive Surfing Unleashed

    Cyberoam’s Checkmark Certified Web and Application Filtering feature allows Mr. Kumar to instantly block undesirable web sites and application, and enforce acceptable usage policies on all employees. Cyberoam blocks all unauthorized uploads/downloads, P2P applications, pirated audio and video streaming using a Content Filtering database of more than 100 million websites, categorized into 89+ categories. Moreover, the feature is coupled with Bandwidth Management feature, which ensures bandwidth availability and data transfer limit based on duration and schedule of access for specific web categories and applications. Cyberoam delivers comprehensive control and visibility over more than 2,000 applications.

    Unlike age-old port-based classification mechanism, Cyberoam classifies applications based on their risk level, characteristics and technology, offering granular controls. This stops sophisticated application-layer threats right at the network perimeter, ensuring Application Security. Mr. Kumar said, “Not only Cyberoam helps us block unproductive/harmful content, it also provides us granular Bandwidth Management at individual Website and Application level”.

  • Gateway Anti Virus

    Cyberoam’s Checkmark Certified Anti Virus and Anti Spyware prevent entry of Malware and Spyware at the entrance itself ensuring clean Mail (SMTP, IMAP and POP3) and Web (HTTP, HTTPS, FTP) traffic. They provide real-time protection against constantly emerging cyber threats resulting in maximum network uptime. It also blocks attachments for specified file types like executables, media files, password-protected files etc. before any Malware affects the network.

  • Superior Reporting

    Cyberoam network security appliances deliver in-depth reporting over the appliance, eliminating the need for an independent reporting solution and minimizing the resultant security investment and operational expense. Over 1200 in-depth reports offer real-time visibility into user and network activities over dual dashboards – Security dashboard and Traffic dashboard. This in turn yields Yokogawa with high security, optimal network performance and helps them meet regulatory compliance requirements. “When it comes to On-appliance Reporting, no one comes close to what Cyberoam offers”, Mr. Kumar said.

  • To Conclude

    Mr. Kumar said, “After introducing Cyberoam into our network, we have been able to save cost on bandwidth and increase Internet surfing speed and productivity. Cyberoam has given us more value against money than the leading security vendors combined”.