The K Hotel Bahrain, Middle East
Cyberoam Ensures Secure Internet Connectivity for K Hotel, Bahrain
About K Hotel – Bahrain, Hospitality
The K Hotel Bahrain, established in 2010, is a four star deluxe hotel in the posh neighbourhood of Juffair in Manama, Bahrain. It consists of 237 luxurious, contemporary rooms and suites and offers services and amenities like 5-star hotels in lower and affordable 4-star rates.
The K Hotel Bahrain is another premier hotel among Gulf Hotels Group portfolio of hotels. Gulf Hotels Group BSC, established in 1967, is a public limited liability company which has under its wing various properties like:
- Ocean Paradise Zanzibar : A beautiful resort in Zanzibar, Tanzania.
- Gulf Brands International : One of Bahrain's largest distributors
- Gulf Air : A major international airline and a leading Aviation Company
- Gulf Hotel Bahrain : The Group's first property, the first five star
and the market leader in hospitality services on the Island.
Being a four-star deluxe hotel we provide uninterrupted, high-speed Internet connection to our guests as part of the basic amenities
Mr. Syed Mohammed Ilyas,
IT Manager K Hotel,
Mr. Syed Mohammed Ilyas, IT Manager at K Hotel, was looking for an Internet security solution as part of their basic network setup during the inception of the hotel. "Being a four-star deluxe hotel we provide uninterrupted, high-speed Internet connection to our guests as part of the basic amenities", said Mr. Ilyas. Apart from that, Internet is used for regular hotel administration purposes. Mr. Ilyas wanted to safeguard the K hotel network against various threats that the network would be exposed to while connected to the Internet.
Unguarded Network Perimeter
The K Hotel network needed an effective defence mechanism against hacking, remote exploits, Denial-of-service (DoS) attacks and other unpredictable attacks. Also, chances of unauthorized, external sources gaining visibility of the network's internal resources through Phishing or Pharming needed to be minimized.
Irresponsible Web Surfing
Mr. Ilyas wanted an efficient and hassle-free content filtering solution that would rein in the web surfing activities of employees. "We have noticed that employees tend to get very much distracted by social networking, gaming and other such entertaining websites", he said. A certain amount of restriction also needed to be put on Internet surfing by guests. Illicit websites, such as those hosting pornographic or violent content, needed to be completely corked to protect their guests and avoid any legal repercussions as a result of irresponsible surfing by a guest.
Malware and Spam Threat
Mr, Ilyas wanted to keep away from any sort of malware attacks in the network as they translate into a lot of unwelcome problems such as corrupt files, defaced web pages, PDF and design documents, loss of critical data and system crashes resulting in huge downtime.
Also, he wanted to put up a "No Entry" board for any sort of unsolicited Spam. Spam not only drains a network's email resources, it also brings with it the threat of blended threats through viruses, worms and other forms of malware.
The Cyberoam Solution
Mr. Ilyas scoured the market for a suitable security solution. After looking into a number of products, including Cisco solutions, he found what he was looking for in Cyberoam. "We incorporated Cyberoam as part of our basic network setup right at its inception. Thus, we safeguarded our network even before it became live", said Mr. Ilyas. They setup One (1) CR 100ia in their network in Gateway Mode. Cyberoam started showing the following benefits immediately after its installation.
- Network Perimeter Guarded
Cyberoam's ICSA and Checkmark certified firewall provides granular access controls over Internet traffic and network resources. Users are given controlled access to network and internet resources, ensuring that no security loopholes are left open.
With a comprehensive database of 3000+ signatures, Cyberoam's Intrusion Prevention System protects K Hotel's network from several variants of spyware attacks, spoofing and DoS attacks in addition to keyloggers, Trojans and more.
- Identity-based Security
Cyberoam's award-wining Identity-based security provides full visibility of all user activities online. Mr. Ilyas integrated Cyberoam with the Active Directory (AD) Server to include all users in the database. This feature allows him to track web surfing patterns of employees based on individuals' or groups' identity which encouraged him to formulate Internet usage policies based on identities rather than IP Addresses.
- Web Surfing Controlled
Cyberoam has a constantly updated database of millions of sites divided into 82+ categories which allows access only to those sites which are permitted by IT guidelines of the hotel. The content filtering blocks all malware-laden sites, P2P, Instant Messengers, illegal audio, video, streaming media and other bandwidth-intensive download. Phishing and Pharming sites are no longer a cause of concern. Moreover, Cyberoam's identity-based filtering allows assigning of individual user Internet access policy, surfing quota, time limits and bandwidth restrictions.
- Malware Corked at Gateway
Cyberoam's Checkmark Certified Anti Virus and Anti Spyware prevent entry of malware and spyware at the gateway itself ensuring clean mail traffic and safe web browsing. They provide real-time protection against constantly emerging cyber threats resulting in maximum network uptime.
Recurrent Pattern Detection (RPD) powered signature-less Anti Spam technology works instantly on deployment, with the least human intervention and is language independent. It blocks spam in any language regardless of the content, e.g. image, audio, video or zip-based spam. The Anti Spam feature is also equipped with Virus Outbreak Detection. This protects the hotel against any zero day attack.
- Business Continuity Upheld
Cyberoam UTM's SSL VPN solution provides "Anywhere, Any Time, Any Device" VPN connectivity. Hence, it provides stable and secure access to the company's network to remote users. Cyberoam ensures that users can connect securely from any location and use the resources. Threat-free Tunneling technology in the VPN ensures that all the traffic is encrypted and scanned for malware.
- Continuous Business Connectivity
As K Hotel has two ISP links, Mr. Ilyas uses Cyberoam's Multi-Link Management to handle both links effectively. The Automated Load Balancing feature distributes the traffic between the two ISP links. In case of a link failure, the Automatic Link Failover feature automatically switches the traffic to the working link. So the organization gets a transparent multilink management with no human interference and 100% Internet uptime.
- To Round It Upstrong
"We are very much impressed with Cyberoam's performance. So much that we are already planning to buy another one for a future project. We will definitely recommend it to others as well", said Mr. Ilyas.