St. Joseph's College of Engineering &Technology, India, South Asia
Cyberoam Safeguards SJCET’s Network with its UTM Features
About St. Joseph's College of Engineering &Technology, Education
St. Joseph's College of Engineering and
Technology (SJCET), Palai was established in
2002. From its very inception, SJCET has
earned a reputation as a "College with a
difference". The college offers four B-Tech
courses - Mechanical Engineering, Electronics
& Communication Engineering, Computer
Science Engineering and Applied Electronics &
The college aims to provide an education that
works – an education that helps the students in
ensuring a challenging and satisfying career
after the course. SJCET is one among the top
five self-financing engineering colleges in
Kerala, as identified by the Alumni Association
of NIT Calicut for the information of the
public. SJCET is also one among top ten
Engineering Colleges in Kerala, where
percentage pass is always more than 80%.
Cyberoam provides granular control over web and application usage. Its Web and Application signatures, in particular, are very comprehensive.
Mr. Krishnakumar C
System and Network
St. Joseph's College of
Engineering & Technology
SJCET, the pioneer of engineering education in Kerala, is committed to developing an
environment of academic freedom in which cutting-edge research and learning is
highly promoted. However, when it comes to usage of the Internet, the college has a
responsibility to protect its students and staff from the Net’ s harmful and unproductive
Mr. Krishnakumar C, the System and Network Administrator at SJCET said, “We
needed a total security solution that could guard the college network from Viruses and
Spywares and provide us with complete control over web and application usage in the
According to Mr. Krishnakumar, they faced the following security issues:
Need for Web and Application Filtering
The students and staff at SJCET rely heavily on the Internet for research and other
academic purposes. Mr. Krishnakumar wanted to provide a disciplined Internet access
to all users. Some productive websites and applications need to be always available
to the students in a secure way. At the same time, unproductive and harmful websites
and applications, and undesired upload/download etc. needed to be blocked.
To summarize, the need was for a solution that could provide granular visibility,
control and security over the websites and applications accessed in the college
network. Mr. Krishnakumar said, “Having complete visibility, security and control over
the applications running in the university network was on high priority.”
User Accountability Issues
SJCET did not have a proper user accountability solution in place, which could
monitor the entire browsing history of a user. With a rise in the Bring Your Own Device
(BYOD), gone are the days where all the users used a single entry point to connect to
the network. The introduction of hand-held devices like cell phones, tablets etc.
complicated the matter further. Mr. Krishnakumar worryingly quoted, “We wanted a
solution that could provide us with efficient accountability of a student’s Internet
activities, irrespective of the device they use to connect to the college network”.
Virus and Malware Threats
“Being connected to the Internet for academic purposes, it becomes necessary for the
college to provide the students with a safe and secure environment to work in ”, said
Mr. Krishnakumar. He was looking for a solution that would block all kinds of Viruses
and Malware at the Gateway itself. He wanted the solution to identify and cover all
possible entry points that could possibly lead to the college network being infected
with such threats.
The Cyberoam Solution
Having been dissatisfied with FortiGate’s
performance, SJCET was in search of a
solution that could provide them with better
security services. After searching the market for
a suitable product, they purchased One (1) CR
1000ia Appliance and deployed it in the college
network in Gateway Mode.
After deploying Cyberoam in the network, the benefits that they notice are:
- Disciplined Web and Application usage
Cyberoam’s web filtering database has more
than 100 million sites neatly grouped into more
than 89 categories. The Identity based security
approach enables Mr. Krishnakumar to have
granular control and unparalleled flexibility in
implementing the college’s policy of content
accessed over the Internet.
Cyberoam delivers comprehensive control and
visibility over more than 2,000 applications. It
controls unauthorized application usage while
supporting business-critical applications.
Cyberoam Firewall blocks games and tunneling
software that result in malware entry.
Mr. Krishnakumar says, “Cyberoam’s Identity-based security policies help us to have full
control over the content accessed through the
- User Accountability Concerns Addressed
Cyberoam UTM offers secure identity-based
AAA (Authentication, Authorization, and Audit)
allowing control and visibility of who is
connected to your network, using what device
and what they are accessing.
Cyberoam’s unique Layer 8 Technology allows
network administrators to design identity-based
policies, which extends throughout the network.
This allows Mr. Krishnakumar to design user
based security policies to control accessing of
websites/applications. These policies can be
schedule based and you can configure amount
of data transfer and bandwidth allocated per
“Thanks to Cyberoam, not only do we now have
complete knowledge of a user’s online
activities, but we also have complete control
over it”, said Mr. Krishnakumar.
- Virus Free Network
Cyberoam’s Check Mark Level 5 certified
Gateway Anti-Virus is tightly integrated
with IPS, Web Filtering and Anti-Spam
modules, securing organizations against
blended attacks and maintaining high levels of
security. With the Virus detection rate of 99.5%,
it ensures that no Malware or Spyware passes
through the network edge. Additionally, it blocks
upload/download or attachments for specified
file types such as executables, media files,
PDF, zipped files etc. ensuring data leakage
prevention of confidential information.
- Optimum use of Network Bandwidth
Cyberoam’s bandwidth management feature
gives Mr. Krishnakumar enough flexibility to
configure User, Web Categories, Applications
and Application Categories based bandwidth
usage limits. This ensures optimal usage of
Internet bandwidth across the organization. Mr.
Krishnakumar says, “The best thing about
Cyberoam’s Bandwidth Management feature is
that it helps us in exact estimation of the
college’s bandwidth requirements, which saves
a lot of time and money”.
- To Conclude
Expressing his satisfaction, Mr. Krishnakumar said, “Cyberoam provides
granular control over web and application usage. Its Web and Application
signatures, in particular, are very comprehensive”.