Venco Imtiaz Construction Company, Afghanistan, Asia
VICC Trusts Cyberoam over Microsoft ISA Server
About Venco Imtiaz Construction Company, Construction

Venco Imtiaz Construction Company (VICC) provides comprehensive construction management through multilingual construction project managers, superintendents, and field engineers. Depending upon the services required by the client, VICC's construction and management team provides program review and evaluation, value engineering, scheduling, cost estimating, cost control, and program management.

VICC generates ongoing reports to keep project managers up-to-date will all aspects of cost and schedule milestones. They incorporate International Building Codes, QC, and Safety Standards on projects sites. They provide construction services for military and civilian facilities that require protection from conventional weapons, accidental explosions, and terrorist threats.

We were looking for a reliable, high performing and affordable total security solution

Mr. Saleh Rajabi
ICT Manager

Highlighting the need for a security solution, Mr. Saleh Rajabi, the ICT Manager at VICC said, “We were looking for a reliable, high performing and affordable total security solution”.

According to Mr. Rajabi, the issues that they faced were:

Need for a Security Solution

Mr. Rajabi desired a security solution that could do Firewalling as well as provide smooth and efficient user authentication and accounting feature. He commented, “We needed a security solution that was feature-rich as well as affordable, scalable, and reliable”.

The Cyberoam Solution

Before Cyberoam deployment, Venco Imtiaz Construction Company had Microsoft ISA Server deployed in their network. However, the solution did not perform as per their expectations and hence they desired to replace it with a feature-rich, reliable and affordable network security appliance.

Cyberoam, with its competitive pricing and the comprehensive set of security features, caught their attention. They purchased One (1) CR 200i Appliance and deployed it at their Head Office in Kabul, in Gateway Mode.

After deploying Cyberoam in the network, the benefits that they notice are:

  • Cyberoam – An All-in-One Solution

    Cyberoam Network Security appliances offer comprehensive security to organizations at an affordable price. Not only does Cyberoam Firewall the network perimeter, it provides tons of other useful features like Web Filtering, Application Filtering, VPN, IPS, Anti Virus, Anti Spam, Multi link Load Balancing, QoS, Web Application Firewall, and many more; all in One Single Box. Multiple security features integrated over a single platform make security simple, yet highly effective.

    Cyberoam, with its Extensible Security Architecture (ESA) and multi-core technology carries the ability to combat future threats to organizations’ security. As a product, it is unique among Network Security appliances worldwide with its Identity-based security, which links user identity to security right from authentication to policy setting, controls and reporting.

  • Feature-rich Firewall

    CCyberoam’s ICSA and Checkmark certified Firewall provides granular access controls over Internet traffic and the network resources. The Firewall scans each data packet entering the network and as per the configured policy, decides whether it should be permitted or discarded. Cyberoam’s Layer 8 technology includes a user's human identity as part of the Firewall Rule matching criteria. The Layer 8 technology penetrates through all the security modules of Cyberoam Network Security Appliances.

    Moreover, all security and networking features can be centrally configured and managed from a single Firewall Rule page with complete ease. The identity-based security gives real-time visibility into the online activity of employees based on their usernames rather than IP Addresses, plotting a clear picture of who is doing what in the network.

    Mr. Rajabi said, “Cyberoam’s Firewall Rule page is unique and feature rich. The option to configure all security features from a single page is innovative and quite helpful”.

  • Simplified AD Integration

    Cyberoam provides Active Directory integration feature that maps users and groups from ADS with Cyberoam. This enables the appliance to identify network users transparently for authentication purposes.

    Cyberoam communicates with Windows Directory Services to authenticate users based on groups, domains and organizational units. Cyberoam offers two options to integrate the appliance user database with ADS: Tight Integration and Loose Integration, offering a great flexibility to configure policies governing how a user is mapped to their respective groups in Cyberoam.

    Mr. Rajabi said, “Cyberoam’s AD integration feature is very simple to configure. Personally, I learnt a lot of new tips and techniques during the configuration process”.

  • Effective Multi Link Management

    “We have Three (3) ISPs in our organization, each with different bandwidth capabilities. For optimal network performance, we have distributed the Internet traffic accordingly”, said Mr. Rajabi.

    Cyberoam offers intelligent traffic distribution ensuring that no link is overburdened, which in turn has led to increased bandwidth scalability for the company.

    In addition, Cyberoam’s best-in-class Automatic ISP failover feature has improved the network and user performance because of zero downtime.

  • To Conclude

    Mr. Rajabi happily quoted, “With Cyberoam in place, we have the confidence of a secure and protected company network”.