St. Joseph's College of Engineering &Technology, India, South Asia
Cyberoam Safeguards SJCET’s Network with its UTM Features
About St. Joseph's College of Engineering &Technology, Education

St. Joseph's College of Engineering and Technology (SJCET), Palai was established in 2002. From its very inception, SJCET has earned a reputation as a "College with a difference". The college offers four B-Tech courses - Mechanical Engineering, Electronics & Communication Engineering, Computer Science Engineering and Applied Electronics & Instrumentation Engineering.

The college aims to provide an education that works – an education that helps the students in ensuring a challenging and satisfying career after the course. SJCET is one among the top five self-financing engineering colleges in Kerala, as identified by the Alumni Association of NIT Calicut for the information of the public. SJCET is also one among top ten Engineering Colleges in Kerala, where percentage pass is always more than 80%.


Cyberoam provides granular control over web and application usage. Its Web and Application signatures, in particular, are very comprehensive.

Mr. Krishnakumar C
System and Network
Administrator
St. Joseph's College of
Engineering & Technology


SJCET, the pioneer of engineering education in Kerala, is committed to developing an environment of academic freedom in which cutting-edge research and learning is highly promoted. However, when it comes to usage of the Internet, the college has a responsibility to protect its students and staff from the Net’ s harmful and unproductive side.

Mr. Krishnakumar C, the System and Network Administrator at SJCET said, “We needed a total security solution that could guard the college network from Viruses and Spywares and provide us with complete control over web and application usage in the network.”

According to Mr. Krishnakumar, they faced the following security issues:

Need for Web and Application Filtering

The students and staff at SJCET rely heavily on the Internet for research and other academic purposes. Mr. Krishnakumar wanted to provide a disciplined Internet access to all users. Some productive websites and applications need to be always available to the students in a secure way. At the same time, unproductive and harmful websites and applications, and undesired upload/download etc. needed to be blocked.

To summarize, the need was for a solution that could provide granular visibility, control and security over the websites and applications accessed in the college network. Mr. Krishnakumar said, “Having complete visibility, security and control over the applications running in the university network was on high priority.”

User Accountability Issues

SJCET did not have a proper user accountability solution in place, which could monitor the entire browsing history of a user. With a rise in the Bring Your Own Device (BYOD), gone are the days where all the users used a single entry point to connect to the network. The introduction of hand-held devices like cell phones, tablets etc. complicated the matter further. Mr. Krishnakumar worryingly quoted, “We wanted a solution that could provide us with efficient accountability of a student’s Internet activities, irrespective of the device they use to connect to the college network”.

Virus and Malware Threats

“Being connected to the Internet for academic purposes, it becomes necessary for the college to provide the students with a safe and secure environment to work in ”, said Mr. Krishnakumar. He was looking for a solution that would block all kinds of Viruses and Malware at the Gateway itself. He wanted the solution to identify and cover all possible entry points that could possibly lead to the college network being infected with such threats.

The Cyberoam Solution

Having been dissatisfied with FortiGate’s performance, SJCET was in search of a solution that could provide them with better security services. After searching the market for a suitable product, they purchased One (1) CR 1000ia Appliance and deployed it in the college network in Gateway Mode.

After deploying Cyberoam in the network, the benefits that they notice are:

  • Disciplined Web and Application usage

    Cyberoam’s web filtering database has more than 100 million sites neatly grouped into more than 89 categories. The Identity based security approach enables Mr. Krishnakumar to have granular control and unparalleled flexibility in implementing the college’s policy of content accessed over the Internet.

    Cyberoam delivers comprehensive control and visibility over more than 2,000 applications. It controls unauthorized application usage while supporting business-critical applications. Cyberoam Firewall blocks games and tunneling software that result in malware entry.

    Mr. Krishnakumar says, “Cyberoam’s Identity-based security policies help us to have full control over the content accessed through the network.”

  • User Accountability Concerns Addressed

    Cyberoam UTM offers secure identity-based AAA (Authentication, Authorization, and Audit) allowing control and visibility of who is connected to your network, using what device and what they are accessing.

    Cyberoam’s unique Layer 8 Technology allows network administrators to design identity-based policies, which extends throughout the network. This allows Mr. Krishnakumar to design user based security policies to control accessing of websites/applications. These policies can be schedule based and you can configure amount of data transfer and bandwidth allocated per user.

    “Thanks to Cyberoam, not only do we now have complete knowledge of a user’s online activities, but we also have complete control over it”, said Mr. Krishnakumar.

  • Virus Free Network

    Cyberoam’s Check Mark Level 5 certified Gateway Anti-Virus is tightly integrated with IPS, Web Filtering and Anti-Spam modules, securing organizations against blended attacks and maintaining high levels of security. With the Virus detection rate of 99.5%, it ensures that no Malware or Spyware passes through the network edge. Additionally, it blocks upload/download or attachments for specified file types such as executables, media files, PDF, zipped files etc. ensuring data leakage prevention of confidential information.

  • Optimum use of Network Bandwidth

    Cyberoam’s bandwidth management feature gives Mr. Krishnakumar enough flexibility to configure User, Web Categories, Applications and Application Categories based bandwidth usage limits. This ensures optimal usage of Internet bandwidth across the organization. Mr. Krishnakumar says, “The best thing about Cyberoam’s Bandwidth Management feature is that it helps us in exact estimation of the college’s bandwidth requirements, which saves a lot of time and money”.

  • To Conclude

    Expressing his satisfaction, Mr. Krishnakumar said, “Cyberoam provides granular control over web and application usage. Its Web and Application signatures, in particular, are very comprehensive”.