Bakhresa Group of Companies, Tanzania, Africa
Cyberoam UTM Solution Selected for Price, Performance, and Reliability at Bakhresa Group
About Bakhresa Group, Conglomerate

Bakhresa Group is one of the leading Industrial Houses in Tanzania, East Africa. Started in a humble manner with a small restaurant in the Port City of Dar Es Salaam, Tanzania, in mid seventies, it has now emerged as a respected business group in the Region.

The Group has its operations spread in Tanzania, Zanzibar, Uganda, Kenya, Malawi, Zambia and most recently in Mozambique. The group now boasts of a turnover of more than Three Hundred Million United Sates Dollars and is a proud employer of more than two thousand employees associated directly. There are several companies under its umbrella and have investments mainly in Food and Beverage Sector, Packaging, Logistics and Real Estate.




The network covered sensitive information which was under constant threat from spyware and DoS attacks. So they needed a strong Firewall and IPS solution.

Mr. Raju Mudunuri
IT Manager
Bakhresa Group



The challenges faced by Bakhresa Group are as follows:

  • Protecting the Network Periphery & Tough IPS

    Locked offices and buildings cannot protect information if the computers holding it are open to everyone on the network. The Bakhresa Group contains public servers, such as e-mail and web, which are exposed to the outside world in order to perform their function. The company contains the contract document and other client sensitive information and data that can be possibly targeted by attacks from external entities and outside access attempts. However, at the same time, the authorities have a responsibility to protect users from network threats, and keep the network up and running. A top security priority was to establish a private network to keep confidential information safe from unauthorized users, hackers, and other threats. Consequently, Mr. Raju Mudunuri, the IT Manager at Bakhresa Group wanted a gateway firewall for protection of their entire network.

    Also, the sensitive servers were under constant threat from spyware, DoS attacks, fragmented and malformed packets, blended threats and more. Therefore, they needed a strong IPS solution which would be proficient in retorting these threats.

  • Controlling Surfing Practices

    Unmanaged Internet access presents many challenges and introduces unnecessary risk. With unmanaged internet access, employees were distracted by non-work related or unproductive activities. The organization needed to know who was accessing what sites and as such needed an identity based filter and reporting system that would include the users‘ online behavioral audit.

    Also, the use of bandwidth- intensive applications such as streaming media or the downloading of music or videos by few employees would slow or shut down entire organizational networks. Installing a content filtering solution can eliminate these problems

  • Business Continuity Concerns

    Bakhresa Group has evolved into an organization with independent networks at remote sites supporting many users. The primary challenges for Bakhresa Group were to provide access to sensitive data across a more secure and stable VPN. Internet is relied on profoundly to allow remote sites VPN access back to the main office.

    Another, major issue was the connectivity problem. "If Internet was down our business activities would come to a halt," Mr. Mudunuri said. To avoid a single point of failure, multiple locations had multiple ISP links. So, multiple ISP links load balancing, and failover is also a critical need.
The Cyberoam Solution

Bakhresa Group looked into a number of security products in order to address their business challenges. The search was on for an appliance which would take care of their all above requirements. The company then deployed One (1) 200i & One (1) 100i in Dar Es Salaam at the Head Office, Three (3) 25i in Zanzibar at the branch office, and One (1) 50i has been kept as stand by. All the appliances were deployed in Gateway mode.

The challenges faced by Bakhresa Group are as follows:

  • Firewall & Stopping Intrusions

    Bakhersa Group operates Cyberoam‘s ICSA and Checkmark Certified Perimeter Firewall between the Internet and the organization‘s network to establish a secure environment for the organisation‘s computer and network resources. The Perimeter Firewall is a key component of the Bakhresa‘s network security architecture. This Perimeter Firewall policy governs how the Perimeter firewall will filter Internet traffic to mitigate the risks and losses associated with security threats to the Bakhresa Group network.

    This policy is designed to protect employee computers from hacking and virus attacks by restricting access to computers on the Bakhersa Group‘s network and provides granular access controls over Internet traffic and the network resources. Coupled with Intrusion Prevention module, Cyberoam UTM can counter any Denial of Service attack. Mr. Mudunuri now felt the network is secure.

  • Web Content Filtering

    Cyberoam‘s 82+ category tough Web Content filtering technology kept the organization‘s internet resources effectively focused. The Content filtering feature makes sure that all P2P and Instant Messengers are blocked and that there is no breach of data. Cyberoam helps manage employee access to websites, minimizing lost time on the internet, and lowering operating costs. It also helps enforce internet usage policies based on bandwidth needs to prevent business losses and other issues that result from limited access to mission-critical applications.

  • Flexible Internet Connectivity

    The IPSec VPN solution of Cyberoam bridged the geographical distances between the organization‘s branch and head offices. This now ensures that the user can connect securely from any location and use the organization‘s resources. Highly encrypted traffic enforced security over the Internet and ensures that no malware sneaks through.

    Cyberoam‘s Multilink manager increases the overall network performance by load balancing the network traffic between all their four (4) ISP links terminating on them, delivering continuity in security. In case of failure, the load is automatically transferred to the other ISP link, which leads to 100% Internet uptime, and round the clock connectivity to their employees.

  • To Conclude

    “Comprehensive Reporting is one of Cyberoam‘s most significant features. I am very impressed with the on-appliance reporting tool that displayed all vital statistics graphically, which allows quick checks of overall network conditions,” said Mr. Mudunuri. With Cyberoam in place, they have the confidence of a secure and protected environment.