K L University India, Hyderabad, Asia
KLU Saves Time & Gains Productivity with Cyberoam UTM
About KLU University, Education

K L University is a pioneer in the field of engineering education and research in private sector in the state of Andhra Pradesh. It was established as Koneru Lakshmaiah College of Engineering in the year 1980.

It imparts technical education in cutting edge technologies, inculcating applied research, scholarly inquiry, creative endeavor through the Knowledge and values based molding of students and make an imprint in the economic and social development of the Nation. Its vision is to become a World Class Institution in Education and Research by providing value based education in Sciences, Engineering and Technology.

The KLU initiative is to permit students to accomplish skills, boost up student creativity, and smooth out their progress to cope with the requirements of the modern workplace. Internet is used as a lifeline as it is the key business facilitator and department cannot run forward without Internet connections.

The network covered sensitive information which was under constant threat from spyware and DoS attacks. So they needed a strong Firewall and IPS solution.

Mr. B. Ravi Babu,
Systems Engineer,
K L University

Mr. Chee Keong Seng, the MIS Senior Executive at Kingshoe Manufacturing was looking for a reliable Internet security platform to protect its users. “We needed a solution which would give us highest ROI while taking in hand our major security concerns – all in a solitary box”, Mr. Seng said.

The concerns are listed below.

Shielding the Network Edge

The Kingshoe Manufacturing network basically comprised of business secrets, confidential data ,client sensitive information and data that can be possibly targeted by attacks from external entities and outside access attempts. Hence, Mr. Seng wanted a solution that would control the entire Internet traffic and provide a level of protection from network-based attacks by allowing good traffic and denying bad traffic as defined by a security policy.

Monitoring Website Access

The organisation wanted to block unwanted sites while enforcing productive surfing among employees and to prevent phishing and pharming.

They wanted a suitable content filtering solution with reporting feature for showing graphs and traffic results on specific sites accessed by staff when they switch computers.

VPN Connectivity

Kingshoe Manufacturing has evolved into an organization with independent networks at remote sites supporting many users. The primary challenges for Kingshoe Manufacturing were to provide access to sensitive data across a more secure and stable VPN. Internet is relied on profoundly to allow remote sites VPN access back to the office.

The Cyberoam Solution

Kingshoe Manufacturing looked into a number of security products including Fortinet in order to address their business challenges but the reporting feature of Fortinet did not fulfilled their expectations.

The search was on for an appliance which would take care of their all above requirements. So they felt that Cyberoam was the apparent choice. The organization then deployed Two (2) CR25i at their Malaysia office in Gateway mode.

The business benefits were as follows:

  • Identity based Authentication

    The automated Single Sign-On is another trait feature that Mr. Seng deployed. Using this feature, all the users transparently log in to Cyberoam when they boot up their machine. Once the user has been authenticated by Cyberoam, the UTM applies the relevant access control policy on the user, irrespective of the machine from which they have logged into the network. Identity is used in Cyberoam to encapsulate the user in a security policy that follows him wherever he or she logs into the network.

  • Total Perimeter Security

    Cyberoam’s ICSA and Checkmark-certified firewall offers stateful and deep-packet inspection to provide granular access control over Internet and network resources. Mr. Seng used default IPS policies from the firewall rule itself to protect Kingshoe’s Manufacturing corporate network from DoS & spoofing attacks and other exploits.

  • Web Security

    Cyberoam’s 82+ categories tough Web Content filtering technology kept the organisation’s internet resources effectively focused. The Content filtering feature makes sure that all P2P and Instant Messengers are blocked and that there is no breach of data. It blocks access to harmful websites, preventing malware, phishing, pharming attacks and undesirable content that could lead to legal liability and direct financial losses. Cyberoam helps manage staff access to websites, minimizing lost time on the internet, and lowering operating costs.

  • More Resilient Internet Connectivity

    The CR25i appliance deployed at the both office in Kuala Lumpur and Johor Bahru were used to ensure IPSec VPN connectivity along with the Cyberoam appliances with each other. This allowed remote office users to seamlessly access their work without any worries of breakdown in Internet traffic. Threat-free Tunneling (TFT)-driven VPN ensures that all such traffic is securely encrypted and no malware sneaks through it.

  • Superior Reporting

    Cyberoam’s reporting feature gives summary of what the users are up to in the network, including fruitless sites visited, time spent on each site. According to Mr. Seng, this has led to increased efficiency as the employees know that they are being monitored or restricted from accessing blocked sites.

    In simpler words, I can say that Cyberoam UTM is just like an array of security features.” said. Mr. Seng.