DUBAIB AND SULAIM COMPANY, Saudi Arabia Asia
Cyberoam Helps out DUBAIB AND SULAIM COMPANY to have a Secure Network
About DUBAIB AND SULAIM COMPANY (DSCO), Engineering and Construction

DUBAIB AND SULAIM COMPANY (DSCO) is registered under Commercial Registration No. 2051002986/Khobar to engage in the Construction, Installation, Maintenance and Operation of Telecommunications Systems and Electrical Distribution Networks.

DSCO specializes in the Design, Engineering, and Implementation of Telecommunications and Electrical Systems. DSCO is totally qualified to provide fully integrated Turnkey Systems. These Systems can be tailored to individual Customer Specifications. Specific Systems can be designed to operate independently, or as part of an existing network.

DSCO provides Systems and Network Design, Engineering, Construction, Installation, Testing and Personnel Training, Operations and Maintenance.




The network covered sensitive information which was under constant threat from external entities. So they needed a strong Firewall.

Mustafa M, AL-Tayar
IT Manager
DUBAIB &
SULAIM COMPANY (DSCO)



The IT Manager, at DSCO, Mr. Mustafa Mohammed Al-Tayar outlined the basic requirements saying, “Internet is one of the most business critical resources for our organization.”

The company was facing the following security and connectivity challenges related to its business activities.

Safeguarding the Network Periphery

The DSCO network basically comprised of design, construction and project with no focused gateway security sketch. The company contains the contract document and other client sensitive information and data that can be possibly targeted by attacks from external entities and outside access attempts. The organization, therefore, needed a gateway firewall to put a stop to all such activities.

Spam Control

Like other organizations throughout the world, DSCO faced the growing threat of spam. Spam occupied a staggering 80 per cent of email stored on DSCO servers.

The associated costs of spam were not only escalating but also impacting users‘ productivity, consuming IT resources and placing a strain on DSCO in house IT engineers.

Throttled Bandwidth - Sharing Internet

Internet access was given by default to everyone in DSCO. Company‘s mail access was given to everyone but selected employees & specific departments were given access to specific Websites. Some users required access to certain sites such as music, video, social networking, youtube etc to help them in their work. Opening up access to these sites for all users resulted in bandwidth getting “choked”. So they defined security and bandwidth management policies after taking the user‘s identity and professional profile into account. Bandwidth needs to be managed and prioritized to achieve maximum business advantage. They wanted to ensure fruitful use of bandwidth.

The Cyberoam Solution

After hunting the market for the right solution, DSCO purchased two (2) units of Cyberoam CR100ia enterprise-class UTM appliance, which was soon deployed in gateway mode at their Head Office in Al-Khobar.

After deploying the solution, the following benefits were noted::

  • Complete Perimeter Security

    Cyberoam‘s corporate firewall offered DSCO stateful and deep-packet inspection capability to provide granular access control over Internet and network resources. Using this feature the administrator is now able to make identity-based security rules, offering instant visibility and dynamic controls over security breaches. This has enabled DSCO to achieve high degree of granular controls over the user‘s surfing behavior.

  • Comprehensive Protection from Spam

    Cyberoam‘s Gateway Anti-Spam solution has a spam catch rate of over 98% and sucks up a huge segment of junk mails at DSCO with its IP reputation filters before they strike the mail servers. Subsequently, Cyberoam‘s RPD-based content-agnostic anti-spam solution blocks spam in any language regardless of the content, e.g. image, audio, video or zip-based spam. The anti-spam feature is also equipped with Virus Outbreak Detection. This protects the organization against any zero day attack.

  • Browsing Check Accomplished

    By customizing user identity-based policies, the administrator provides selective Internet access and surfing rights based on the user‘s working needs. “I can now prioritize the organization‘s bandwidth usage as per business requirements with more effective controls on which user consumes how much bandwidth (upload and download limits) during any time of the day”, said. Mr. Al-Tayar. This helped the organization in controlling the user behavior on the Internet.

  • To Wrap it Up

    “Cyberoam has turned up very useful for our organization. It has aided us to accomplish what we desired.” Mr. Al-Tayar concluded.