Beyout Investment Group, Kuwait, Middle East
Cyberoam Gives Reliable and Constant Internet Connectivity to BIG
About Beyout Investment Group, Construction and Contracting

Beyout Investment Group (BIG) holding, founded in 2006, came into being because of the significant progress and diversity made by Kuwait Reconstruction House (KRH) Company, which called for the restructuring of the company and distributing its activities among several companies.

Four such companies were set up for this purpose to form the newly founded parent holding group: Beyout Investment Group (BIG) holding with four subsidiaries

  • Real Estate House (REH)
  • Kuwait Resources House (KRH)
  • Kuwait Enterprises House (KEH)
  • Kuwait Building House (KBH)

Internet is one of the most vital resources for BIG because we have to have constant communication with our partners, clients and our subsidiary organizations. Most of this is done via emails

Mr. Bijoymon Sethumadhavan
Sr. Systems Engineer
Kuwait Enterprises House



“Internet is one of the most vital resources for BIG because we have to have constant communication with our partners, clients and our subsidiary organizations. Most of this is done via emails,” said Mr. Bijoymon Sethumadhavan, Sr. Systems Engineer at BIG. He wanted to secure the BIG network from all kinds of internal and external security threats as well as optimize the use of Internet by the employees. His major network security concerns were as follows:

Unreported Web Surfing

One of the main requirements of Mr. Bijoymon S. was to rein in the Internet usage of all employees in the organization. He wanted a decent reporting system to keep track of web surfing patterns of individual employees as well as the organization on the whole. He wanted to deter users from accessing unproductive, harmful and malware-laden websites which distract employees and expose the network to various cyber threats. Uploading/downloading of streaming media, which occupied precious bandwidth, also needed to be restricted.

Defenceless towards Malware and Spam

“Virus attacks in the network translate into a lot of unwelcome problems such as corrupt files, defaced web pages, PDF and design documents, loss of critical data and system crashes resulting in huge downtime,” said Mr. Bijoymon S.

Like most organizations, Spam posed a constant harassment to BIG. It gobbled up large amounts of bandwidth leaving a bare minimum for business critical applications. Employees were compelled to manually filter useful emails from heaps of spam in their inboxes which was like finding a needle in a haystack. Hence, Mr. Bijoymon S. sought an effective Anti Virus and Anti Spam solution to protect the BIG network.

Unguarded Network Perimeter

Mr. Bijoymon S. wanted to protect the BIG network from hacking, remote exploits, Denial-of-service (DoS) attacks and other unpredictable attacks. Also, he wanted to minimize the chances of unauthorized, external sources gaining visibility of the network‘s internal resources through Phishing or Pharming. Hence, he was looking for a firewall and a strong IPS solution that guarded the network at the gateway itself.

The Cyberoam Solution

After extensive market research, Mr. Bijoymon S. decided that Cyberoam was a solution that fulfilled all their requirements in a cost-effective manner. Hence, BIG purchased One (1) CR 500ia which is deployed in Bridge Mode at their Head Office in Kuwait. After Deployment, the following benefits are noted:

Identity-Based Security

Cyberoam‘s award-wining Identity-based security provides full visibility of all user activities online. Mr. Bijoymon S. integrated Cyberoam with the Active Directory (AD) Server to include all users in the database. This feature allows him to track web surfing patterns of employees based on individuals‘ or groups‘ identity which encouraged him to formulate internet usage policies based on identities rather than IP Addresses. Additionally, the automated single-sign-on (SSO) feature of Cyberoam allows transparent authentication of the end users as soon as they boot their machines.

Comprehensive Reporting

“Comprehensive Reporting is one of Cyberoam‘s most noteworthy features,” said Mr. Bijoymon S. The On-Appliance sophisticated monitoring and reporting mechanism in Cyberoam helps Mr. Bijoymon S. and his team to perform timely and accurate assessment of web usage. Availability of such detailed reports enables him to update access policies based on changing network environment. Reports include “Internet bandwidth usage”, “top accessed sites” as well as Google search reports, which enhance the visibility of users‘ online behaviour. The “traffic discovery” report helps him to identify the amount of bandwidth used by various applications.

Controlled Web Surfing

Cyberoam has a constantly updated database of millions of sites divided into 82+ categories which allows access only to those sites which are permitted by IT guidelines of the organization. The content filtering blocks all malware-laden sites, P2P, Instant Messengers, illegal audio, video, streaming media and other bandwidth-intensive download. Phishing and Pharming sites are no longer a cause of concern. Moreover, Cyberoam‘s identity-based filtering allows assigning of individual user Internet access policy, surfing quota, time limits and bandwidth restrictions.

Network Perimeter Safeguarded

Cyberoam‘s Checkmark and ICSA dual certified Firewall safeguards BIG‘s network against intruders like a dragon protecting its eggs. BIG users are given controlled access to network and internet resources, ensuring that no security loopholes are left open. With a comprehensive database of 4000+ signatures, Cyberoam‘s Intrusion Prevention System offers a second line of defence against intrusion attempts like DoS attacks, spyware attacks, spoofing, keyloggers, Trojans and more.

Security from Malware and Spam

Cyberoam‘s Checkmark Certified Anti Virus and Anti Spyware prevent entry of malware and spyware at the gateway itself ensuring clean mail traffic and safe web browsing. They provide real-time protection against constantly emerging cyber threats resulting in maximum network uptime.

Recurrent Pattern Detection (RPD) powered signature-less Anti Spam technology works instantly on deployment, with the least human intervention and is language independent. It blocks spam in any language regardless of the content, e.g. image, audio, video or zip-based spam. The Anti Spam feature is also equipped with Virus Outbreak Detection. This protects the organization against any zero day attack.

To Wind Up

Expressing his satisfaction with Cyberoam, Mr. Bijoymon S. said,” Cyberoam is a power-packed all-in-one UTM device that gives complete ROI.”