Bidco Uganda Ltd, Uganda, Africa
Cyberoam Ensures Constant Business Connectivity for Bidco
About Bidco, Manufacturing

Bidco Uganda Ltd. was originally established as a manufacturing organization, committed to using the most efficient modern technologies to produce a superior range of products. The Company is the brainchild of Bhimji Depar Shah the grand patriach of Bidco after whom the company is named Over the years, Bidco successfully won over the market, becoming the largest and fastest growing manufacturer of vegetable oils, fats, margarine, soaps and protein concentrates in East and Central Africa. Currently, Bidco markets the largest and widest range of quality edible oil and hygiene products.


In the absence of restrictions on Internet surfing, our employees could easily fall prey to potentially harmful websites harbouring illegal or inappropriate content

Mr. Subhash Carpenter
Head ICT
Bidco Uganda Ltd



According to Mr. Subhash Carpenter, Head ICT at Bidco Uganda Limited, the company was facing the following Internet security concerns which affected its business activities.

Lack of Access Control and Intrusion Prevention

Growing Internet traffic and a limited access control mechanism made BUL‘s internal network vulnerable to unauthorized external access from hackers, DOS attacks and other network intrusions. Hence, Mr. Carpenter wanted a solution that would control Internet traffic and provide a level of protection from network-based attacks by allowing good traffic and denying bad traffic as defined by security policies.

Unbridled Internet Surfing

“In the absence of restrictions on Internet surfing, our employees could easily fall prey to potentially harmful websites harbouring illegal or inappropriate content”, said Mr. Carpenter. Also, download and transmission of non-business related information such as entertainment, music, gaming, etc., caused disruption in workplace productivity. This placed an enormous burden on the company‘s bandwidth resources, lowering network availability for legitimate business activities.

Impending Cyber Threats

Communication is a critical need of any business, which is mainly done via emails. As email usage in BUL increased, so did the risk of blended threats from emails embedded with links to malicious or compromised websites. “Spam travelled totally uncontrolled in our network,” said Mr. Carpenter. Spam entering the system was creating problems at multiple levels - it was clogging the mail server, eating into the storage space, and sapping bandwidth.

Mr. Carpenter wanted an effective antivirus solution to put a check on infiltration by virus, worms, spyware, Trojans, keyloggers and other malware.

Business Continuity Concerns

One of Mr. Carpenter‘s major requirements was continuous connectivity between their offices in Uganda and Singapore. They use a leased MPLS link between these two sites for constant access to their SAP ERP. MPLS is a highly scalable, protocol agnostic, data-carrying mechanism which makes data transfer over long distances very easy. Hence, BUL uses it to link its Uganda and Singapore office. But, in case this MPLS link failed, both offices got disconnected which adversely affected business continuity.

The Cyberoam Solution

AAfter careful inspection, BUL found Cyberoam to be an ideal mix of best-of-the-breed network security solutions backed by strong proactive technical assistance. They decided to deploy One (1) CR 200i at their Head Office in Jinja, Uganda. After deployment, the following benefits were noticed.

Identity-based Security

Cyberoam‘s unique identity-based security protects against insider threats by giving full visibility of user activities in the network. It is like monitoring exactly “Who is doing What”. This feature allows creation of identity-based policies. Mr. Carpenter used Local Authentication to create user identities for all employees. “Thanks to Cyberoam‘s Identity-based security, I am able to manage all users very well”, he said.

Barricaded Network

Cyberoam‘s ICSA and Checkmark certified firewall provides granular access controls over Internet traffic and network resources. BUL users are given controlled access to network and internet resources, ensuring that no security loopholes are left open. “Even Cisco Firewall is not able to give such a measure of control as given by Cyberoam‘s firewall”, said Mr. Carpenter.

With a comprehensive database of 3000+ signatures, Cyberoam‘s Intrusion Prevention System protects Bul‘s data from several variants of spyware attacks, spoofing and DoS attacks in addition to keyloggers, Trojans and more.

Centralized Control of Internet Traffic

Mr. Carpenter was able to establish Centralized Control over all Internet traffic to and from their Head Office at Jinja as well as their Plantation in Kalangala. He established a single gateway through Cyberoam for all incoming and outgoing traffic in both the sites such that it can be monitored and controlled from a single location.

“We have been able to reign in the Internet surfing patterns of our employees both at Jinja and Kalangala. With Cyberoam‘s Web and Application Filtering we can tailor filtering policies to suit our needs and eliminate traffic to undesirable sites”, said Mr. Carpenter. Web and Application filtering features make sure that all P2P and Instant Messengers are blocked and that there is no breach of data

Enhanced Protection Against Malware and Spam

Cyberoam‘s Gateway Anti-Virus & Anti-Spyware solution secures the BUL network by providing real-time protection against viruses, worms, Trojans, keyloggers, spyware and more on all web (HTTP, FTP) and mail (SMTP, POP, IMAP) traffic.

Cyberoam‘s Gateway Anti-Spam, with a spam catch rate of 98%, checks all inbound and outbound mails for email spam, drastically reducing bandwidth and resource consumption.

Business Continuity Upheld

Cyberoam UTM provides total business continuity through VPN and Automatic Link Failover. Mr. Carpenter uses VPN through Cyberoam as a back-up link in case of outage of the point to point MPLS link between the Uganda and Singapore office. This ensures continuous connectivity between the two sites. Traffic is automatically directed through Cyberoam in case of failure of the MPLS link which eliminates the complexities involved in doing the same manually.

Summing up

“After installing Cyberoam, one by one all our problems got solved”, exclaimed Mr. Carpenter expressing his satisfaction on deploying Cyberoam in their network.