Comyn Ching (Solray) Swansea United Kingdom
Cyberoam Secures the Internet for Solray
About Comyn Ching (Solray) , Manufacturing
Comyn Ching (Solray), the UK's leading name in radiant heating offers practical, reliable and costeffective
solutions for today's most demanding buildings. The Solray design incorporates
waterway grids within flat panels, which can be manufactured from a range of materials. The
panels are formed into a variety of shapes to create unobtrusive and aesthetically attractive
heating and cooling systems. These panels can also be supplied in a range of finishes to blend
into or enhance any building interior. The panels can be positioned on walls, placed within
suspended ceilings, or even installed within the floor itself.
Solray has completed several design and construction projects for applications such as airports,
hospitals, schools & colleges, theatres, prisons or secure units. Their out-of-the-way placement
and stout construction makes Solray the most prominent choice in today’s market.
We needed a solution that
could protect our internal
resources from any
unauthorised and malicious
access, either from the Internet
or from any internal user. We
were also looking for a solution
that would control unproductive
Mr. Simon Turne
Group Financial Controller
Comyn Ching (Solray)
The Solray network basically comprised of design, construction and project with no focused
gateway security sketch. The company contains the contract document and other client sensitive
information and data that can be possibly targeted by attacks from external entities and outside
access attempts. The organization, therefore, needed a gateway firewall to regulate user
authentication and access control.
Shelter against Intrusions and Misuse
On the Internet, network intruders are sophisticated navigators. They come from outside the
enterprise, attacking Internet connections, altering Web pages, and launching denial-of-service attacks. Intrusion attempts can also originate from inside the network, launched by sophisticated
assaults that can circumvent or pass through firewalls, transmitting confidential information, or
illegally modifying network access privileges. Mr. Turner was concerned about protecting data
assets in the LAN such as confidential customer data, drawings, billing records and more from
external entities. Therefore, they needed a solution which would be competent at seeing off these
According to Simon Turner, Group Financial Controller at Solray, “We needed a solution that
would control unproductive and harmful surfing”. The company was facing the following security
and connectivity challenges related to its business activities.
Controlling Malware & Spam Numbers
In the absence of gateway anti-virus, users surfing the Web (HTTP), transferring files (FTP) and
exchanging mail (SMTP, POP3, IMAP) were constantly exposed to the danger of malware
infestation. These malware attacks which often took a blended form through email attachments,
PDF, design documents etc had the potential to alter constructive files and demolish significant
data. Simple day-to-day activities were often hampered when such malware did infiltrate the
system. As a result the productivity suffered as the IT department had to interfere to rectify the
A perimeter level anti-virus solution was required that would protect the network, scan and clean
any malware or spyware over Web mail and scan all Web traffic to ensure the contents were safe.
Controlling Surfing Patterns
The company wanted to keep an eye on and limit its users from accessing non-productive sites
such as Facebook, Twitter and Myspace. Opening up access to these sites for all users resulted
in bandwidth getting “choked”. “We wanted the solution to ensure that precious bandwidth is not
used up on downloads of audio, video and streaming media and bogus applications like Yahoo
Messenger, Skype, MSN and instead, diverted to more productive use”, Mr. Turner said. He
believes that Internet access is a resource that should not be wasted and so every user’s
bandwidth usage ought to be distributed and monitored using content filtering. They needed
strong web filtering solutions which could control all Internet access and give informative reports
on Internet usage.
The Cyberoam Solution
After hunting the market for the right solution, Solray purchased a Cyberoam CR25i
Unified Threat Management (UTM) appliance, which was soon deployed in gateway mode at the
Swansea Factory, U.K. After deploying the solution, the following benefits were noted:
- User Integration
Cyberoam UTM adds up to a unique identity-based security solution which protects against
insider threats by giving absolute visibility into “Who is doing What” in the network and allows
creation of user identity-based policies. Mr. Turner used Cyberoam’s Active Directory (AD) facility
to achieve the task of integrating Solray’s users in the network through a wizard to trade in users.
Furthermore, the automated single-sign-on (SSO) feature of Cyberoam allows transparent
authentication of the end users as soon as they boot their machines.
- Complete Perimeter Security
Cyberoam’s corporate firewall offered Solray stateful and deep-packet inspection capability to
provide granular access control over Internet and network resources. Using this feature the
administrator is now able to make identity-based security rules, offering instant visibility and
dynamic controls over security breaches. This has enabled Solray to achieve a high degree of
granular controls over the user’s surfing behavior.
- Barricading Intrusions
Mr. Turner used default IPS policies from the firewall rule to protect Solray’s corporate network
from DoS and spoofing attacks and other exploits. He also used IPS to protect their network, LAN
and mail server from these intrusion attempts.
With a comprehensive database of 3000+ IPS signatures, Mr. Turner now feels that the
company’s data is well protected from several variants of spyware attacks, spoofing and DoS
attacks in addition to keyloggers, Trojans and more. Cyberoam’s promise of security and
protection aided them to increase their network efficiency and performance.
- The Latest Protection from Virus & Spam
Cyberoam UTM significantly reduced the high incidence of virus attacks, at Solray. Cyberoam
UTM’s gateway anti-virus and anti-spyware solution ensures real-time protection for Solray’s
network by delivering clean web and mail traffic.
Recurrent Pattern Detection (RPD) powered signature-less anti-spam technology works instantly
on deployment, with minimal human intervention and is language independent. It blocks spam in
any language regardless of the content, e.g. image, audio, video or zip-based spam. The antispam
feature is also equipped with Virus Outbreak Detection. This protects the organization
against any zero day attack. All of this means that viruses, worms, Trojans, key-loggers and
spyware are now a thing of the past and business downtime is negligible.
- Browsing Check Accomplished
Prior to Cyberoam deployment, there was no control on sites visited by Solray’s employees.
However, all that changed with Cyberoam’s Web filtering feature which ensures protection from
inappropriate and insecure Web content, including phishing and other malware-loaded sites.
Cyberoam’s constantly updated database of millions of sites is divided into 82+ categories which
include pornography, P2P, entertainment and job search. By customizing user identity-based
policies, the administrator provides selective Internet access and surfing rights based on the
user’s working needs. “I can now prioritize the organization’s bandwidth usage as per business
requirements with more effective controls how much bandwidth any particular user can use during
any time of the day”, said. Mr. Turner.
- To Wrap it Up
When discussing his Cyberoam experience, Mr. Turner commented, “We are more than happy
with the service which has been provided. One of Cyberoam’s most beneficial features is its onappliance
reporting feature that gave us constructive statistical results such as Internet usage
patterns, the number of sites which were non-productive or unhealthy and knowing exactly what
our users were doing in the network.”