Sultanlar Pazarlama Turkey, Europe
Cyberoam Ensures Safe Internet Surfing for Sultanlar Pazarlama
About Sultanlar Pazarlama, Retail

Sultanlar Pazarlama is a company involved in the sales of food, cleaning and pharmaceutical products, cosmetics and baby supplies. The company has an extensive network of distributors, chain stores, supermarkets, pharmacies, perfumeries, canteens, co-operatives, hotels and restaurants. Their operations include sales, distribution, campaign, currency and inventory of 86 producer companies’ over 9000 SKUs in both Asian and European regions of Istanbul.


Internet is one of our most critical resources without which all communications to and from our Branch Offices, distributors, partners and customers would come to a standstill

Mr. Mustafa Biricik
Head of IT Department
Sultanlar Pazarlama


“Internet is one of our most critical resources without which all communications to and from our Branch Offices, distributors, partners and customers would come to a standstill”, said Mr. Mustafa Biricik, Head of the IT Department at Sultanlar Pazarlama. He faced the following problems regarding network security.

Incompetent Reporting Mechanism

Prior to Cyberoam deployment, their reporting mechanism proved to be insufficient in meeting their expectations. They lacked means to save the reports. Hence, they did not have access to historical data which is essential for analysing network activities like user surfing patterns, frequency and nature of malicious attacks, etc.

Unruly Web Surfing

Another pressing concern for Mr. Biricik was unproductive, unhealthy and possibly illicit internet surfing by employees. He wanted to monitor and control web surfing patterns of individual employees as well as the organization on the whole. He wanted to pull the reins on Internet surfing to avoid employees from being distracted and the network from being exposed to various cyber threats. Uploading/downloading of streaming media, which occupied precious bandwidth, also needed to be restricted.

Uncontrolled Spam and Malware

“Spam has been a real pain for us since the beginning”, said Mr. Biricik, expressing his exasperation over the overwhelming Spam problem in their network. The flow of Spam throughout the network ate away precious bandwidth affecting network speed and availability. Spam flooded employees’ inboxes compelling them to perform the finding-a-needle-in-a-haystack task of sorting through their mails to find legitimate ones.

The organizations network was quite vulnerable to Malware attacks from viruses, worms, Trojans, etc. Malware ranged from relatively harmless ones that forced users to press some keyboard keys at regular intervals to vicious ones that corrupted files in the boot sector, reformatted the entire hard disk or even caused system crashes.

The Cyberoam Solution

Mr. Biricik and his team screened almost all available network security products in the market in search for a solution that would fulfil their requirements. Ultimately, they zeroed in on Cyberoam. They deployed One (1) CR 50ia at their Head Office in Gateway Mode. After Cyberoam deployment, the following benefits were noticed.

  • Identity-based Security

    Identity forms the basis upon which security policies in Cyberoam are defined. This identity-based security protects against insider threats by giving full visibility of user activities in the network. It is like monitoring exactly “Who is Doing What”. Mr. Biricik integrated Cyberoam with an external Active Directory (AD) Server to take full advantage of Cyberoam’s identity-based security. “The incorporation of Identity into security policies is one of the best features of Cyberoam”, said Mr. Biricik.

  • Network Perimeter Secured

    Cyberoam’s ICSA and Checkmark certified firewall provides granular access controls over Internet traffic and network resources. Users are given controlled access to network and internet resources, ensuring that no security loopholes are left open.

    With a comprehensive database of 3000+ signatures, Cyberoam’s Intrusion Prevention System protects Sultanlar Pazarlama’s data from several variants of spyware attacks, spoofing and DoS attacks in addition to keyloggers, Trojans and more.

  • Web Surfing Secured

    Cyberoam’s 82+ categories tough Web Content filtering technology optimized the use of Sultanlar Pazarlama’s internet resources. Mr. Biricik was able to customize identity-based web filtering policies to impose selective Internet access and surfing rights based on employees working needs. He can now prioritize the organization’s bandwidth usage as per business requirements with more effective controls on which employee consumes how much bandwidth (upload and download limits) during any time of the day. Furthermore, this feature keeps all harmful websites, malware, phishing, pharming attacks and undesirable content at bay.

  • Malware and Spam Checked

    “Cyberoam has saved us from the impending threat of Spam”, said Mr. Biricik. Cyberoam’s Gateway Anti-Spam, with a spam catch rate of 98%, checks all inbound and outbound mails for email spam, drastically reducing bandwidth and resource consumption. Recurrent Pattern Detection (RPD) powered signature-less anti spam technology works instantly on deployment, with the least human intervention and is language independent. It blocks spam in any language regardless of the content, e.g. image, audio, video or zip-based spam. The anti spam feature is also equipped with Virus Outbreak Detection. This protects the organization against any zero day attack.

    Cyberoam’s Gateway Anti-Virus & Anti-Spyware solution secures the Sultanlar Pazarlama network by providing real-time protection against viruses, worms, Trojans, keyloggers, spyware and more on all web (HTTP, FTP) and mail (SMTP, POP, IMAP) traffic.

  • Enhanced Reporting

    “Cyberoam’s On-Appliance Reporting has appealed to us the most”, said Mr. Biricik. The On-Appliance sophisticated monitoring and reporting mechanism in Cyberoam helps him and his team to perform timely and accurate assessment of web usage. Availability of historical data makes it possible for him to keenly analyse all network activity reports which guide him in making appropriate security policies. Reports include “Internet bandwidth usage”, “top accessed sites” as well as Google search reports, which enhance the visibility of users’ online behaviour.

  • Efficient Technical Support

    “The Cyberoam Team provides very efficient post-sales technical support. They ensure high customer satisfaction which allows us to put our complete faith upon Cyberoam”, said Mr. Biricik.

  • To Wind Up

    “Cyberoam’s power-packed security features have fulfilled all our expectations!” said Mr. Biricik.