Arabian Consulting Engineering Services, Saudi Arabia, Middle East
Cyberoam Ensures Safe, Productive and Identity-based Internet Surfing in ACES
About Arabian Consulting Engineering Services, Engineering and Construction

Arabian Consulting Engineering Services (ACES) was established in 1978 in Riyadh, Saudi Arabia as a full-fledged architecture and engineering consultancy house. They provide comprehensive services in planning, design, value engineering, construction, supervision and management. Since its inception, they have been delivering creative designs and cost effective solutions to their clients from Saudi Arabia, Jordan, China, Lebanon, West Bank (Palestine) Taipei, Republic of Yemen, Ethiopia and many other countries. Each assignment entrusted to ACES is manned by a team of professional architects and engineers, encompassing all disciplines working under one roof. Their architects and engineers are attentive to clients' special needs as well as aspects unique to each project.



After introducing Cyberoam into our network, we have been able to save cost on bandwidth and increase Internet surfing speed and productivity. Cyberoam has given us the best value against money.

Mr. Kallapiran Viswanathan
Network Technician
Arabian Consulting Engineering Services


Explaining about the organization’s Network Security requirements Mr. Kallapiran Viswanathan, the Network Technician at ACES said, “We needed an affordable security solution that would help us provide User based Internet access and curb unproductive surfing habits of our employees.”

According to Mr. Viswanathan, they faced the following security issues:

Need for User based Internet access

According to Mr. Viswanathan, current corporate policies surrounding network security often neglect the most critical and weak security component: the human element. He agrees with Cyberoam’s philosophy that an organization's overall security is only as strong as its weakest link – the user. Hence, it becomes an absolute necessity to design network security policies targeting their users.

Mr. Viswanathan said, “Providing User based Internet access was a key requirement for us and the first step towards designing security policies target ing our users”.

Need for Content Filtering

The organization wanted to monitor and restrict its users from accessing unproductive sites such as Music, Video, Social networking & Streaming media. Phishing, Pharming and nasty Websites also needed to be plugged away. Content filtering was needed to protect the users from accessing futile or deceitful websites. Hence, he desired a solution that could restrain undesirable web usage as well as protect ACES’ network from the dark side of the Internet.

Mr. Viswanathan said, “We were looking for a solution with effortless content filtering feature that could protect our users from harmful, inappropriate and unproductive content on the Internet”.


The Cyberoam Solution

ACES were in search for a solution that could provide them with Identity based security at reasonable price. After a rigorous search and in-depth analysis of all the available options, they were deeply impressed with Cyberoam’s award winning Layer 8 Technology. They purchased One (1) CR 35iNG Appliance and deployed it at their Head Office in Gateway Mode.

After deploying Cyberoam in the network, the benefits that they notice are:

  • Feature-rich Firewall and User based Internet access

    In order to address the concerns of gaining visibility and controls on user activity in the network, Cyberoam’s Layer 8 Technology has been derived out of the need for a robust network security system which can include a user's human identity as part of the Firewall rule matching criteria. The ICSA and Checkmark certified Firewall provides granular access controls over Internet traffic and the network resources. The Firewall scans each data packet entering the network and as per the configured policy, decides whether it should be permitted or discarded. Moreover, all security and networking features can be centrally configured and managed from a single Firewall Rule page with complete ease. The identity-based security gives real-time visibility into the online activity of employees based on their usernames rather than IP Addresses, plotting a clear picture of who is doing what in the network.

    Mr. Viswanathan said, “Cyberoam’s Firewall Rule page is unique and feature rich. The option to configure all security features including the User based Internet access from a single page is quite innovative”.

  • Robust Web Filtering

    Cyberoam’s Check Mark Level 5 certified Content Filtering delivers comprehensive network and data security while offering web protection, maintaining employee productivity, meeting regulatory compliance and preventing data leakage.

    “With Cyberoam’s Content Filtering Solution we can tailor the web filtering policies to suit our needs,” Mr. Viswanathan said. “We can even make customized policies and quickly push them out to the users. Plus, by eliminating traffic to undesirable sites, we can free up bandwidth for legitimate office activities.”

    With a database powered with 89+ categories and more than 100 million sites, Mr. Viswanathan has matchless flexibility to configure security policies. Cyberoam also filters the usage of HTTPS based sites with the help of its keyword and URL filtering techniques as well as Signature based detection technique. Moreover, SSL traffic filtering can be applied on individual user or group of users, single URL, group of URLs or entire URL category.

  • Monitored and Controlled User Activity

    Cyberoam’s On-Appliance Reporting feature enables the company to know “Who is doing What?” across the network. It includes features like Traffic Discovery, Internet Bandwidth Usage Monitors, Top Accessed Categories and Search Engine Reports, which enhance the visibility of a user’s online behaviour. Additionally, this feature comes at no extra cost. Having 1200+ granular reports at their service, the company can keep a track of each employee and know the work tendency. On the other hand, when the employees come to know that their activities are being monitored, they work accordingly, leading to increased productivity.

  • To Conclude

    “After introducing Cyberoam into our network, we have been able to save cost on bandwidth and increase Internet surfing speed and productivity. Cyberoam has given us the best value against money”, said Mr. Viswanathan.