Unified Threat Management Solutions at a Food Industry

 

 Unified Threat Management Solutions  at a Food Industry

Internet Security  and Threat Mitigation at a Food  Industry

 Customer Profile

  A commercial food processing company in Canada with various ware houses is in the business of frozen food storage and delivery. The company has been in operation for 30 years. Quality of service and reliability to incoming and outgoing customers are  of paramount importance. The company had built the business on quality of service and reliability. The very existence of the company was at stake at one day.

 

 

Internet Security  and Threat Mitigation at a Food  Industry

 Customer Profile

  A commercial food processing company in Canada with various ware houses is in the business of frozen food storage and delivery. The company has been in operation for 30 years. Quality of service and reliability to incoming and outgoing customers are  of paramount importance. The company had built the business on quality of service and reliability. The very existence of the company was at stake at one day.

 Some hackers had penetrated the office computers of the company and was copying the sensitive information to a remote site in China . This has been going on for some time. No one noticed this for a month. A rash of spam emails resulted, which was filtered by  Email spam filter

The user  had no idea that their security has been compromised.  This changed when one customer received  a strange phone call and asking them to switch  food storage facility due to Canadian Food Inspection Safety Failure.

 

 The angry customers wanted to know if the certification failure is true- which of course was not.  At this point, We were called in to check the security of the company  network and it was found that indeed it was breached. One temporary employee was secretly downloading cracked movies on the phone using the Wi-Fi of the company. Some one had shared the Wi-fi password. The company had no content filtering facility. The movie was being downloaded from Russian-Ukrainian  torrent sites.

The offending employee was a temporary worker hired from a staffing agency. He is long gone from assignment- but the problem persists. Detection of the Problem and Technical Approach

 

The breach and problem was detected using Intrusion Detection system called Snort and Wireshark packet filter. Other tools were used to check Stealth mode VPN tunnels . All these are standard practice for Intrusion detection procedure for Network Breach. The intrusion detection was logged for 7 days to get a detailed report of the security problem. The log of the intrusion detection  was detailed and accurate.

 

 Remedial Solution

 Gate protect Threat management solutions

 What are the features that became effective in stopping the intrusion

 Explain the IP  tables rules

 

Customer Value Creation

 

Value proposition Fit

 The solution was cost effective and proved enormous value to the operation of the cold storage facility. The Use of Centralized Intrusion detection system means that any future security breach can be detected early. We have favored using Gate protect for economic and commercial reasons. Creating a Linux based snort and intrusion detection was possible but may have been less effective in terms of quality and  values.

 

 Yearly subscription

 The gate protect UTM requires yearly subscription for antivirus and periodic renewal. Such costs are very nominal for the customer.

 

Summary

 The solution was  robust- cost effective and scalable. We have chosen  Gate protect UTM with 4 Sablan for the solutions. Which was considered to be  effective.

 Please contact  if you have security concerns for your network. One of our engineers will be happy to discuss your requirement.

 

 References

 1.0  Practical Packet Analysis-  2nd Edition-Wireshark- ISBN  978-1593272661

2.0  The Practice of Network Security Monitoring- ISBN  978-1593275099

3.0 Snort - IDS- https://www.snort.org/

4.0 Applied Network Security Monitoring- ISBN-13: 978-0124172081

 

 

Last modified on Sunday, 18 September 2016 20:21

Login to post comments
Go to top