The Prestige Estates Projects Ltd., India, Asia
Prestige Estates Projects Counts on Cyberoam UTM for Complete Internet Security
About The Prestige Estates Projects Ltd., Construction
The Prestige Estates Projects Ltd. (PEPL)
owes its origin to Mr. Razack Sattar, who
envisioned a success story waiting to take
shape in the Retail Business in 1956 itself.
Since its formation in 1986, Prestige
Estates Projects has grown swiftly to
become one of the leading Property
Developers in South India. It helps to
shape the skyline across the Residential,
Commercial, Retail, Leisure and
Being a construction company, PEPL
required Internet for administration
purposes, communication and research.
We had ERP Database and Web Servers in our network which needed to be secured.
Mr. Harish P.,
Prestige Estates Projects Ltd.
In this modern era of technology where Internet is a vital resource f or any
organization continuous and secured connectivity was a prime requirement for
PEPL. Mr. Harish P., the IT Manager of PEPL said, “We had ERP Database and
Web Servers in our network which needed to be secured”.The issues related to their network security which Harish found were:
Risky and Unproductive Browsing
Harish said, “We had often noticed that Internet was inappropriately used for
uploading and downloading music, videos and games, for accessing social
networking sites like Facebook, Twitter etc. and also for surfing”. This affected
productivity and bandwidth was unacceptably utilized. Hence he said, “Blocking
unnecessary websites and applications became a matter of concern for us”.
Malware in the form of Trojans, spywares, worms and other viruses, that entered the
network through web surfing and emails, posed a constant threat for the company.
Hence, Harish wanted to keep the company network safe from all sorts of malware
attacks that led to undesirable trouble such as loss of data, corrupt files and system
crashes resulting in network failure.
Being worried with the amount of Spam mails, Harish quoted, “Out of the total
number of mails received, a startling 48% was Spam. This was shocking and
alarming!” This consumed bandwidth and led employees to read and delete mails
individually which was a tedious and time consuming job. Some emails were such
that tempted the employees to click malicious links ultimately leading to hassles for
the organization and the employee. This led to an intolerable loss of productivity for
Insecure Data Transmission
Many employees of the company accessed the ERP servers, database servers and
desktops located at the head office remotely. Hence, secure Virtual Priva te Network
(VPN) connectivity between the head office and the branch office was a topic of
anxiety for Harish. Additionally, the usage of leased lines also increased the cost.
The Cyberoam Solution
In order to deal with the challenges, PEPL
considered and had demos of many products
like Fortigate, Cisco and Checkpoint. But they
were not satisfied and after having a demo of
Cyberoam they found the answers to all their
problems. They decided to purchase One (1)
CR 750ia appliance and deployed it at
Bangalore Head Office in Gateway Mode.
After deploying Cyberoam they found following
- Firewall – A Strong Wall of Fire
To protect against network attacks like DoS, IP
Spoofing etc. Cyberoam’s Firewall provides
deep packet inspection for network based
security. It is ICSA and Checkmark certified
providing granular access controls over Internet
traffic and network resources.
With a database of 4000+ IPS signatures
Cyberoam’s Intrusion Prevention System (IPS)
automatically detects, blocks and drops the
suspicious mail and web traffic ensuring total
Harish said, “Cyberoam’s Firewall and IPS
efficiently prevents the malicious traffic from
entering the network, providing a clean and
- Layer 8 Security: Protecting the
Cyberoam secures the weakest link in any
network: the User. It is like, in addition to the
seven layers of the OSI model. Cyberoam
extends its protection to the 8th Layer. i.e. the
Human Layer. Harish said, “For authentication,
Cyberoam is integrated with the company’s
Active Directory server. Once the employee is
authenticated by it, the UTM applies the
relevant access control policy on him,
irrespective of the machine from which he has
logged into the network”. Thus Harish gets
complete visibility of all the user activities
online. He also said, “Cyberoam’s Identity
based security solution helps us to keep a track
of the employees with less effort”.
- Safe and Productive Browsing
Cyberoam’s Web and Application Filtering
solution offers one of the most comprehensive
URL databases with millions of URLs classified
into 82+ categories that blocks access to
harmful websites related to pornography,
racism and violence. Hence, in order to crack
the dilemma of uncontrolled surfing in the
organization, Harish configured this feature
which selectively blocks the web access of
employees without affecting productivity. PEPL
users are now able to access only those
websites and applications that are authorized
according to the norms of the organization.
Also, Cyberoam’s identity-based filtering helps
Harish to create schedules and assign Internet
access policies, surfing quota, time limits and
bandwidth restrictions to individual employees
based on specific criteria.
- Malware and Spam Corked at the
Cyberoam’s Checkmark Certified Anti-Virus
and Anti-Spyware solution provides the
company with web, E- mail and Instant
Messaging security against malware like
worms, Trojans, viruses and spyware. It also
scans the web, mail and VPN traffic to ensure
that no malware sneaks into the network.
Cyberoam’s Gateway Anti-Spam solution
provides Recurrent Pattern Detection
technology that is content and language
independent. Moreover, it provide s protection
against foreign characters and image-based
Spam with almost no cases of false positives.
Finally, its Virus Outbreak Detection (VOD)
feature protects the network against real-time
massive virus outbreaks.
Harish said, “Cyberoam’s Anti-Virus and Anti-Spam solution solved one of our most critical
problems, assuring no loopholes in security are
- Secured Data Transmission
Cyberoam’s VPN bridges the geographical
distances between the head office and the
remote user, and the branch offices. It ensures
secure connectivity in such a way that no
attacker can tamper with the data. Also, its
Threat-free Tunnelling Technology makes sure
that no malware can enter the network.
Moreover, its SSL VPN solution provides
Anywhere, Anytime and Any Device VPN
connectivity that enables the remote users to
securely access the resources from anywhere.
Harish said, “Cyberoam’s VPN is an unfailing
and secure solution, providing nonstop and
speedy connectivity from anywhere and
anytime, reducing leased line cost to a great
- Bandwidth under Control
Cyberoam provides identity-based bandwidth
allocation which prioritizes business-critical
applications, ensuring smooth business
continuity. Moreover, it helps Harish to create
schedules and policies based on the
designation and need of the employees.
This controls the time in which the staff can
have access to the Internet and limiting the
volume of data which an employee can upload,
download or both.
Harish said, “Cyberoam’s Bandwidth
Management enables us to take decision and
calculate how much bandwidth is required for
each one in the company”.
- User Activity Monitored
“Comprehensive On-Appliance Reporting is
one of Cyberoam’s most momentous features,”
said Harish. The reporting module includes
features like Traffic Discovery, Internet
Bandwidth Usage Monitors, Top Accessed
Categories and Google Search Reports, which
enhanced the visibility of a user’s online
behaviour. Additionally, this feature comes at
no extra cost.
- To Conclude
Being happy with the product, Harish said, “Almost all problems are resolved after
deploying Cyberoam in our network. This shows how efficient a solution it is”.