The Genuine Gemstone Company (GemsTV), United Kingdom, Europe
Cyberoam Optimizes Traffic Flow in the GemsTV Network
About The Genuine Gemstone Company, Online Shopping

The Genuine Gemstone Company, popularly known as GemsTV, is a family owned jeweller that specialises in creating exquisite fine jewellery with gemstones uncovered from some of the remotest locations on earth. They work primarily with small-scale artisanal miners, controlling the delicate art of cutting and polishing the gems and then creating breath-taking designs and collections which they sell directly to the consumer and trade alike, at very competitive prices.

GemsTV sells their exquisite pieces of jewellery through reverse auctions. It is officially the first channel of its kind in the UK and currently broadcasts live 24 hours a day. The channel is available on Sky, Virgin Media, Freesat, Freeview and online.

Our whole business is Internetbased

Mr. Andrew Smith

“Our whole business is Internet-based”, said Mr. Andrew Smith, Director at GemsTV. They host a high-traffic website in their internal server and most of their transactions take place through the website. Uninterrupted Internet connectivity and highly secured transactions were their “Need of the Day”.

Mr. Smith noticed the following network security fall-outs.

Unmanaged Network Load

The GemsTV network typically remained quite congested mainly because of high traffic generated by their website. “We had Vigor 3300 deployed in our network back then. It was just not able to handle all the traffic”, said Mr. Smith. Furthermore, a lot of bandwidth was fruitlessly utilized by employees‘ unproductive surfing and upload/download of streaming media like music, videos, etc., multiplying their woes times ten.

No Bars on Internet Usage

Due to lack of any filtering facility, there were practically no restrictions on the Internet Usage by employees. Employees tend to get tempted by social networking, gaming and other entertaining websites as a result of which their work suffered. Also, at certain unfortunate times employees unknowingly opened up the network to malware by surfing malicious websites or downloading malware-ridden applications which represented an added layer of threat.

The Cyberoam Solution

Mr. Smith scoured the market looking at a number of security solutions including Cisco, Draytek, SonicWall and NetScreen. Cyberoam Partners, Central IT Solutions, introduced him to Cyberoam. “After looking into Cyberoam specifications, and the cost at which all of it was being offered to us, we didn‘t bother looking any further”, said Mr. Smith. They bought One (1) CR50ia and deployed it in Gateway Mode at their Head Office in Redditch, Worcestershire.

After Cyberoam installation, Mr. Smith noticed the following improvements in their network‘s performance.

Identity Based Security

Identity forms the basis upon which security policies in Cyberoam are defined. This identity-based security protects against insider threats by giving full visibility of user activities in the network. It is like monitoring exactly “Who is Doing What”. Mr. Smith integrated Cyberoam with an external Active Directory (AD) Server to take full advantage of Cyberoam‘s identity-based security. “The incorporation of identity into security policies is one of the best features of Cyberoam”, said Mr. Smith.

Efficient Firewalling

Mr. Smith has placed Cyberoam‘s ICSA and Checkmark Certified Perimeter Firewall between the Internet and GemsTV‘s network such that it filters all incoming and outgoing Internet traffic. It allows the “good traffic” to come in while the “bad traffic” is given a No Entry signal. The Perimeter Firewall is a key component of the GemsTV network security architecture. It is intended to mitigate the risks and losses associated with various forms of cyber attacks.

Network Load Managed

“Deployment of Cyberoam in our network worked wonders in sorting our bandwidth issues out”, said Mr. Smith. Cyberoam‘s Quality of Service policies allow him to allocate appropriate bandwidth to Users, Firewall Rules, Applications and Web Categories, as needs be. This gives him complete control over how much bandwidth should be used where. Also, Cyberoam allows him to control users‘ access times and volume of data transfer, giving him a further degree of control.

Internet Usage Optimized

Cyberoam‘s 82+ categories tough Web Content filtering technology optimizes the use of GemsTV‘s internet resources. Mr. Smith is able to customize identity-based web filtering policies to impose selective Internet access and surfing rights based on employees‘ working needs. Also, this feature keeps all harmful websites, malware, phishing, pharming attacks and undesirable content at bay.

Uninterrupted Remote Connectivity

Mr. Smith uses Cyberoam UTM‘s SSL VPN along with IPSec VPN to provide stable and secure access to the company‘s internal network to remote users. Users from the Branch Offices can access all internal resources like equipment login pages and RDP servers placed in the Head Office LAN in a safe, hassle-free manner. The SSL VPN allows “Anywhere, Anytime” access to mobile users to the organization‘s internal network.

To Draw a Close

“Cyberoam covered for all the hassles we faced with our previous security solution. It gives us very satisfactory performance”, said Mr. Smith.