Beyout Investment Group, Kuwait, Middle East
Cyberoam Gives Reliable and Constant Internet Connectivity to BIG
About Beyout Investment Group, Construction and Contracting
Beyout Investment Group (BIG) holding, founded in 2006, came into being because of
the significant progress and diversity made by Kuwait Reconstruction House (KRH)
Company, which called for the restructuring of the company and distributing its activities
among several companies.
Internet is one of the most vital resources for BIG because we have to have constant communication with our partners, clients and our subsidiary organizations. Most of this is done via emails
Mr. Bijoymon Sethumadhavan
Sr. Systems Engineer
Kuwait Enterprises House
“Internet is one of the most vital resources for BIG because we have to have constant communication with our partners, clients and our subsidiary organizations. Most of this is done via emails,” said Mr. Bijoymon Sethumadhavan, Sr. Systems Engineer at BIG. He wanted to secure the BIG network from all kinds of internal and external security threats as well as optimize the use of Internet by the employees. His major network security concerns were as follows:
Unreported Web Surfing
One of the main requirements of Mr. Bijoymon S. was to rein in the Internet usage of all employees in the organization. He wanted a decent reporting system to keep track of web surfing patterns of individual employees as well as the organization on the whole. He wanted to deter users from accessing unproductive, harmful and malware-laden websites which distract employees and expose the network to various cyber threats. Uploading/downloading of streaming media, which occupied precious bandwidth, also needed to be restricted.
Defenceless towards Malware and Spam
“Virus attacks in the network translate into a lot of unwelcome problems such as corrupt
files, defaced web pages, PDF and design documents, loss of critical data and system
crashes resulting in huge downtime,” said Mr. Bijoymon S.
Unguarded Network Perimeter
Mr. Bijoymon S. wanted to protect the BIG network from hacking, remote exploits, Denial-of-service (DoS) attacks and other unpredictable attacks. Also, he wanted to minimize the chances of unauthorized, external sources gaining visibility of the network‘s internal resources through Phishing or Pharming. Hence, he was looking for a firewall and a strong IPS solution that guarded the network at the gateway itself.
The Cyberoam Solution
After extensive market research, Mr. Bijoymon S. decided that Cyberoam was a solution that fulfilled all their requirements in a cost-effective manner. Hence, BIG purchased One (1) CR 500ia which is deployed in Bridge Mode at their Head Office in Kuwait. After Deployment, the following benefits are noted:
Cyberoam‘s award-wining Identity-based security provides full visibility of all user activities online. Mr. Bijoymon S. integrated Cyberoam with the Active Directory (AD) Server to include all users in the database. This feature allows him to track web surfing patterns of employees based on individuals‘ or groups‘ identity which encouraged him to formulate internet usage policies based on identities rather than IP Addresses. Additionally, the automated single-sign-on (SSO) feature of Cyberoam allows transparent authentication of the end users as soon as they boot their machines.
“Comprehensive Reporting is one of Cyberoam‘s most noteworthy features,” said Mr. Bijoymon S. The On-Appliance sophisticated monitoring and reporting mechanism in Cyberoam helps Mr. Bijoymon S. and his team to perform timely and accurate assessment of web usage. Availability of such detailed reports enables him to update access policies based on changing network environment. Reports include “Internet bandwidth usage”, “top accessed sites” as well as Google search reports, which enhance the visibility of users‘ online behaviour. The “traffic discovery” report helps him to identify the amount of bandwidth used by various applications.
Controlled Web Surfing
Cyberoam has a constantly updated database of millions of sites divided into 82+ categories which allows access only to those sites which are permitted by IT guidelines of the organization. The content filtering blocks all malware-laden sites, P2P, Instant Messengers, illegal audio, video, streaming media and other bandwidth-intensive download. Phishing and Pharming sites are no longer a cause of concern. Moreover, Cyberoam‘s identity-based filtering allows assigning of individual user Internet access policy, surfing quota, time limits and bandwidth restrictions.
Network Perimeter Safeguarded
Cyberoam‘s Checkmark and ICSA dual certified Firewall safeguards BIG‘s network against intruders like a dragon protecting its eggs. BIG users are given controlled access to network and internet resources, ensuring that no security loopholes are left open. With a comprehensive database of 4000+ signatures, Cyberoam‘s Intrusion Prevention System offers a second line of defence against intrusion attempts like DoS attacks, spyware attacks, spoofing, keyloggers, Trojans and more.
Security from Malware and Spam
Cyberoam‘s Checkmark Certified Anti Virus and Anti Spyware prevent entry of malware
and spyware at the gateway itself ensuring clean mail traffic and safe web browsing.
They provide real-time protection against constantly emerging cyber threats resulting in
maximum network uptime.
To Wind Up
Expressing his satisfaction with Cyberoam, Mr. Bijoymon S. said,” Cyberoam is a power-packed all-in-one UTM device that gives complete ROI.”