Preview

Hero Honda

Good Essays
Open Document
Open Document
1407 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Hero Honda
Unified Threat Management

Case Study

Organization
Hero Honda, New Delhi

Hero Honda, New Delhi

Industry
Automobile

Hero Honda Motors Selects Cyberoam for
Reliable and Cost-effective Network Protection
Background
In April, 1984 Hero Cycles, India and Honda Motor Company, Japan inked a joint venture and the world's single largest motorcycle company was born.
Hero Honda Motors Limited (HHML) is the World No. 1 two wheeler company and one of Honda Motor Company's most successful joint ventures, globally.
HHML's performance was nothing less than a revolution on two-wheels. Hero
Honda has sold over 15 million motorcycles and has consistently shown a double digit growth since its inception. Today, every second, a motorcycle sold in the country is a Hero Honda.
In two decades, Hero Honda has built two world-class manufacturing facilities at Dharuhera and Gurgaon in Haryana. These facilities now churn out over 3.5 million motorbikes per year.

"Cyberoam's maximizes
Return Over Investment.
We are fully satisfied with
Cyberoam Unified Threat
Management solution.”

Mr. Avnesh Jain
(Sr. Manager, Information
Systems, HHML)

The Challenge
“Our external mail server forwards the corporate mails to the internal mail server that is deployed in our LAN over SMTP. The internal mail server is a central mail repository from where all the employees pop their individual mails.
We have ISP level security which consists of a firewall, spam filter and antivirus,” Mr. Avnesh Jain (Sr. Manager, Information Systems, HHML) informed.
“However, we soon found that ISP level security was inadequate.”
HHML faced Internet access and security issues related to:
• Spam mails
• Malware attacks originating from mail and Web
• Web filtering
• Bandwidth choking
“HHML received around 26000 mails per day, which translated to almost 1GB of storage space. Out of these at least 70% were spam. That was around
18500 spam mails per day. The ISP was able to filter

You May Also Find These Documents Helpful

  • Powerful Essays

    robust hardware based firewall. Having an intranet is a key feature that will enable the…

    • 4187 Words
    • 22 Pages
    Powerful Essays
  • Good Essays

    RLOT2 Task 2 B rev 1

    • 569 Words
    • 2 Pages

    Defense in Depth provides the university several layers of protection. Starting at the endpoints, host intrusion protection (HIPS), should be installed on each Device. Properly installed, HIPS will not permit the installation of unauthorized programs. This was the root cause of the (D)DoS recently experienced. At the routers access control lists (ACLs) must be put in place to allow only traffic with a legitimate protocol and destination. Between the routers and the endpoint a firewall solution must be put in place. The firewall must be configured to allow only allowed protocols and port numbers to communicate with specific destinations. Between the firewall and endpoint a (D)DoS a detection tool (such as Arbor’s Prevail) must be put in place. This measure not only allows for quick detection of (D)DoS it also permits the automatic mitigation of the…

    • 569 Words
    • 2 Pages
    Good Essays
  • Good Essays

    A level of security is the IP stateful firewall a security appliance that is used to filter IP packets and block unwanted IP, TCP, and UDP packet types from entering and leaving the network.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Pros not using the internet could prevent a wide variety of viruses and the company is only allowed to use their company accounts to send out emails to customers.…

    • 313 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Given the network security applications and countermeasures in the first column of the table below, explore answers to the following questions:…

    • 299 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    • Apply strict security monitoring controls for intruustion detection and prevention. Monitor for inbound IP traffic anomalies and malicious-intent traffic. Block traffic right away if malicious…

    • 447 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Cis 105 Security Systems

    • 465 Words
    • 2 Pages

    The all-in-one computer security systems are effective in a way that it protects one’s computer from all the threats previously mentioned, spyware, viruses, and identity theft all-in-one package without the user having to worry about anything. An included feature is filter protection for any incoming and outgoing email for any virus and spam threats. Another threat that these all-in-one computer security systems are effective is they help protect one’s computer from hackers, and come with a built-in firewall that helps keeps all these threats away. These security systems are automatically scan for any threats and notify the user of any threats are detected. These all-in-one security systems are automatically updated without the user having to worry whether or not they have the latest information. An included feature that the Norton 360 comes with that are beneficial for individual users is the identify protection that securely keeps login and personal information safe, “guards against…

    • 465 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It/205 Dq 1

    • 369 Words
    • 2 Pages

    Ensuring proper level of security is important for a business because it is crucial to the operations. The business must protect the valuable asset, confidential information pertaining to trade secrets, financial data, product development, business strategy, and customer’s information. Inadequate security could result in legal liability and demise of business. Strong security and control can result in an increase of employee productivity and lower operational costs. Some tools available to prevent breaches are firewalls, intrusion detection, and antivirus software.…

    • 369 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Ing Life

    • 572 Words
    • 3 Pages

    Securing Internet connection a variety of overlapping security mechanisms will be equipped to guarantee the security of the Internet connection. Common mechanisms include: firewalls, packet filters, physical security, audit logs, authentication and authorization. At the same time, technicians also need to implement packet filters to prevent the Internet routers from the DoS attacks. DoS attacks…

    • 572 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Harley davidson

    • 3827 Words
    • 16 Pages

    Harley-Davidson had ever employed a chief marketing officer. Yet why did such a strong brand…

    • 3827 Words
    • 16 Pages
    Good Essays
  • Good Essays

    Honda case

    • 640 Words
    • 2 Pages

    Honda faced many obstacles in its early days. In 1950 it was almost driven into extinction. However, the company always made a breakthrough with its new technology developments. In order to prevent such threat of extinction from happening again, Fujisawa, Honda’s partner, strongly encouraged the company to always stay on top with its technology and keep lower price to compete with so many competitors in Japan as well as the U.S.…

    • 640 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Victory Motorcycles

    • 7073 Words
    • 29 Pages

    “Victory Motorcycles is a motorcycle manufacturer based in Spirit Lake, Iowa, United States, which began production of its vehicles in 1998. Its parent company, Polaris Industries, created the firm following the modern success of Harley-Davidson. Victory’s motorcycles are designed to compete directly with Harley Davidson and similar American-style motorcycle brands, with V-twin engines and touring, sport-touring, and cruiser configurations. The first Victory, the V92C, was announced in 1997 and began selling in 1998. Victory has been modestly profitable since 2002.”…

    • 7073 Words
    • 29 Pages
    Better Essays
  • Good Essays

    Hero Honda Demerger

    • 267 Words
    • 2 Pages

    A 26-year-old partnership between Japan’s Honda Motor and India’s Hero Group ended on Thursday. Announcing the break-up of joint venture company Hero Honda Motors Ltd (HHML), Pawan Munjal cited changing market dynamics coupled with ambitions of growing beyond India as the two compelling reasons for the split.…

    • 267 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Investment Decisions Analysis Company: Hero Honda Motors Ltd. |Balance sheet | | | | | | | | |YEAR |Mar’ 10 |Mar’ 09 |Mar’ 08 |Mar’ 07 |Mar’ 06 | | | |Fixed assets | |Gross block |2,750.98 |2,516.27 |1,938.78 |1,800.63 |1,471.97 | |Less : revaluation reserve |- |- |- |- |- | |Less : accumulated depreciation |1,092.20 |942.56 |782.52 |635.10 |522.60 | |Net block |1,658.78 |1,573.71 |1,156.26 |1,165.53 |949.37 | |Capital work-in-progress |48.14 |120.54 |408.49 |189.92 |44.19 | |Investments |3,925.71 |3,368.75 |2,566.82 |1,973.87 |2,061.89 | |Net current assets | |Current assets, loans & advances |2,890.46 |1,022.14…

    • 852 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Hero Honda Motors (India) Ltd. is the World's biggest manufacturer of motorcycles (by quantity). Starting as a bicycle company, it set up a 50/50 joint venture, set up in 1984 with Honda Japan, to manufacture and sell motorcycles in India. Honda brought in the technological know-how, and Hero the India presence, and the local manufacturing ability.…

    • 7212 Words
    • 29 Pages
    Good Essays

Related Topics