The Prestige Estates Projects Ltd., India, Asia
Prestige Estates Projects Counts on Cyberoam UTM for Complete Internet Security
About The Prestige Estates Projects Ltd., Construction

The Prestige Estates Projects Ltd. (PEPL) owes its origin to Mr. Razack Sattar, who envisioned a success story waiting to take shape in the Retail Business in 1956 itself. Since its formation in 1986, Prestige Estates Projects has grown swiftly to become one of the leading Property Developers in South India. It helps to shape the skyline across the Residential, Commercial, Retail, Leisure and Hospitality sectors.

Being a construction company, PEPL required Internet for administration purposes, communication and research.


We had ERP Database and Web Servers in our network which needed to be secured.

Mr. Harish P.,
IT Manager
Prestige Estates Projects Ltd.


In this modern era of technology where Internet is a vital resource f or any organization continuous and secured connectivity was a prime requirement for PEPL. Mr. Harish P., the IT Manager of PEPL said, “We had ERP Database and Web Servers in our network which needed to be secured”.The issues related to their network security which Harish found were:

Risky and Unproductive Browsing

Harish said, “We had often noticed that Internet was inappropriately used for uploading and downloading music, videos and games, for accessing social networking sites like Facebook, Twitter etc. and also for surfing”. This affected productivity and bandwidth was unacceptably utilized. Hence he said, “Blocking unnecessary websites and applications became a matter of concern for us”.


Malware Intimidation

Malware in the form of Trojans, spywares, worms and other viruses, that entered the network through web surfing and emails, posed a constant threat for the company. Hence, Harish wanted to keep the company network safe from all sorts of malware attacks that led to undesirable trouble such as loss of data, corrupt files and system crashes resulting in network failure.


Unblocked Spam

Being worried with the amount of Spam mails, Harish quoted, “Out of the total number of mails received, a startling 48% was Spam. This was shocking and alarming!” This consumed bandwidth and led employees to read and delete mails individually which was a tedious and time consuming job. Some emails were such that tempted the employees to click malicious links ultimately leading to hassles for the organization and the employee. This led to an intolerable loss of productivity for the company.


Insecure Data Transmission

Many employees of the company accessed the ERP servers, database servers and desktops located at the head office remotely. Hence, secure Virtual Priva te Network (VPN) connectivity between the head office and the branch office was a topic of anxiety for Harish. Additionally, the usage of leased lines also increased the cost.


The Cyberoam Solution

In order to deal with the challenges, PEPL considered and had demos of many products like Fortigate, Cisco and Checkpoint. But they were not satisfied and after having a demo of Cyberoam they found the answers to all their problems. They decided to purchase One (1) CR 750ia appliance and deployed it at Bangalore Head Office in Gateway Mode. After deploying Cyberoam they found following advantages:

  • Firewall – A Strong Wall of Fire

    To protect against network attacks like DoS, IP Spoofing etc. Cyberoam’s Firewall provides deep packet inspection for network based security. It is ICSA and Checkmark certified providing granular access controls over Internet traffic and network resources.

    With a database of 4000+ IPS signatures Cyberoam’s Intrusion Prevention System (IPS) automatically detects, blocks and drops the suspicious mail and web traffic ensuring total network security.

    Harish said, “Cyberoam’s Firewall and IPS efficiently prevents the malicious traffic from entering the network, providing a clean and attack-free network”.

  • Layer 8 Security: Protecting the Human Layer

    Cyberoam secures the weakest link in any network: the User. It is like, in addition to the seven layers of the OSI model. Cyberoam extends its protection to the 8th Layer. i.e. the Human Layer. Harish said, “For authentication, Cyberoam is integrated with the company’s Active Directory server. Once the employee is authenticated by it, the UTM applies the relevant access control policy on him, irrespective of the machine from which he has logged into the network”. Thus Harish gets complete visibility of all the user activities online. He also said, “Cyberoam’s Identity based security solution helps us to keep a track of the employees with less effort”.

  • Safe and Productive Browsing

    Cyberoam’s Web and Application Filtering solution offers one of the most comprehensive URL databases with millions of URLs classified into 82+ categories that blocks access to harmful websites related to pornography, racism and violence. Hence, in order to crack the dilemma of uncontrolled surfing in the organization, Harish configured this feature which selectively blocks the web access of employees without affecting productivity. PEPL users are now able to access only those websites and applications that are authorized according to the norms of the organization. Also, Cyberoam’s identity-based filtering helps Harish to create schedules and assign Internet access policies, surfing quota, time limits and bandwidth restrictions to individual employees based on specific criteria.

  • Malware and Spam Corked at the Gateway Itself

    Cyberoam’s Checkmark Certified Anti-Virus and Anti-Spyware solution provides the company with web, E- mail and Instant Messaging security against malware like worms, Trojans, viruses and spyware. It also scans the web, mail and VPN traffic to ensure that no malware sneaks into the network.

    Cyberoam’s Gateway Anti-Spam solution provides Recurrent Pattern Detection technology that is content and language independent. Moreover, it provide s protection against foreign characters and image-based Spam with almost no cases of false positives. Finally, its Virus Outbreak Detection (VOD) feature protects the network against real-time massive virus outbreaks.

    Harish said, “Cyberoam’s Anti-Virus and Anti-Spam solution solved one of our most critical problems, assuring no loopholes in security are left out”.

  • Secured Data Transmission

    Cyberoam’s VPN bridges the geographical distances between the head office and the remote user, and the branch offices. It ensures secure connectivity in such a way that no attacker can tamper with the data. Also, its Threat-free Tunnelling Technology makes sure that no malware can enter the network.

    Moreover, its SSL VPN solution provides Anywhere, Anytime and Any Device VPN connectivity that enables the remote users to securely access the resources from anywhere.

    Harish said, “Cyberoam’s VPN is an unfailing and secure solution, providing nonstop and speedy connectivity from anywhere and anytime, reducing leased line cost to a great extent”.

  • Bandwidth under Control

    Cyberoam provides identity-based bandwidth allocation which prioritizes business-critical applications, ensuring smooth business continuity. Moreover, it helps Harish to create schedules and policies based on the designation and need of the employees.

    This controls the time in which the staff can have access to the Internet and limiting the volume of data which an employee can upload, download or both.

    Harish said, “Cyberoam’s Bandwidth Management enables us to take decision and calculate how much bandwidth is required for each one in the company”.

  • User Activity Monitored

    “Comprehensive On-Appliance Reporting is one of Cyberoam’s most momentous features,” said Harish. The reporting module includes features like Traffic Discovery, Internet Bandwidth Usage Monitors, Top Accessed Categories and Google Search Reports, which enhanced the visibility of a user’s online behaviour. Additionally, this feature comes at no extra cost.

  • To Conclude

    Being happy with the product, Harish said, “Almost all problems are resolved after deploying Cyberoam in our network. This shows how efficient a solution it is”. .”