The Genuine Gemstone Company (GemsTV), United Kingdom, Europe
Cyberoam Optimizes Traffic Flow in the GemsTV Network
About The Genuine Gemstone Company, Online Shopping
The Genuine Gemstone Company, popularly known as GemsTV, is a family owned
jeweller that specialises in creating exquisite fine jewellery with gemstones uncovered
from some of the remotest locations on earth. They work primarily with small-scale
artisanal miners, controlling the delicate art of cutting and polishing the gems and then
creating breath-taking designs and collections which they sell directly to the consumer
and trade alike, at very competitive prices.
Our whole business is Internetbased
Mr. Andrew Smith
“Our whole business is Internet-based”, said Mr. Andrew Smith, Director at GemsTV.
They host a high-traffic website in their internal server and most of their transactions
take place through the website. Uninterrupted Internet connectivity and highly secured
transactions were their “Need of the Day”.
Unmanaged Network Load
The GemsTV network typically remained quite congested mainly because of high traffic generated by their website. “We had Vigor 3300 deployed in our network back then. It was just not able to handle all the traffic”, said Mr. Smith. Furthermore, a lot of bandwidth was fruitlessly utilized by employees‘ unproductive surfing and upload/download of streaming media like music, videos, etc., multiplying their woes times ten.
No Bars on Internet Usage
Due to lack of any filtering facility, there were practically no restrictions on the Internet Usage by employees. Employees tend to get tempted by social networking, gaming and other entertaining websites as a result of which their work suffered. Also, at certain unfortunate times employees unknowingly opened up the network to malware by surfing malicious websites or downloading malware-ridden applications which represented an added layer of threat.
The Cyberoam Solution
Mr. Smith scoured the market looking at a number of security solutions including Cisco,
Draytek, SonicWall and NetScreen. Cyberoam Partners, Central IT Solutions,
introduced him to Cyberoam. “After looking into Cyberoam specifications, and the cost
at which all of it was being offered to us, we didn‘t bother looking any further”, said Mr.
Smith. They bought One (1) CR50ia and deployed it in Gateway Mode at their Head
Office in Redditch, Worcestershire.
Identity Based Security
Identity forms the basis upon which security policies in Cyberoam are defined. This identity-based security protects against insider threats by giving full visibility of user activities in the network. It is like monitoring exactly “Who is Doing What”. Mr. Smith integrated Cyberoam with an external Active Directory (AD) Server to take full advantage of Cyberoam‘s identity-based security. “The incorporation of identity into security policies is one of the best features of Cyberoam”, said Mr. Smith.
Mr. Smith has placed Cyberoam‘s ICSA and Checkmark Certified Perimeter Firewall between the Internet and GemsTV‘s network such that it filters all incoming and outgoing Internet traffic. It allows the “good traffic” to come in while the “bad traffic” is given a No Entry signal. The Perimeter Firewall is a key component of the GemsTV network security architecture. It is intended to mitigate the risks and losses associated with various forms of cyber attacks.
Network Load Managed
“Deployment of Cyberoam in our network worked wonders in sorting our bandwidth issues out”, said Mr. Smith. Cyberoam‘s Quality of Service policies allow him to allocate appropriate bandwidth to Users, Firewall Rules, Applications and Web Categories, as needs be. This gives him complete control over how much bandwidth should be used where. Also, Cyberoam allows him to control users‘ access times and volume of data transfer, giving him a further degree of control.
Internet Usage Optimized
Cyberoam‘s 82+ categories tough Web Content filtering technology optimizes the use of GemsTV‘s internet resources. Mr. Smith is able to customize identity-based web filtering policies to impose selective Internet access and surfing rights based on employees‘ working needs. Also, this feature keeps all harmful websites, malware, phishing, pharming attacks and undesirable content at bay.
Uninterrupted Remote Connectivity
Mr. Smith uses Cyberoam UTM‘s SSL VPN along with IPSec VPN to provide stable and secure access to the company‘s internal network to remote users. Users from the Branch Offices can access all internal resources like equipment login pages and RDP servers placed in the Head Office LAN in a safe, hassle-free manner. The SSL VPN allows “Anywhere, Anytime” access to mobile users to the organization‘s internal network.
To Draw a Close
“Cyberoam covered for all the hassles we faced with our previous security solution. It gives us very satisfactory performance”, said Mr. Smith.