C & I Leasing Plc. Nigeria, Africa
Cyberoam Addresses Connectivity and Routing issues for C & I Leasing Plc
About C & I Leasing Plc., BFSI

C & I leasing Plc, listed on the Nigerian Stock Exchange, is the foremost brand for leases and other ancillary services in Nigeria. The company was incorporated in 1990 as a limited liability Company. In 1997, they concluded a major restructuring and diversification project that saw its conversion to a public company.

With a staff strength of over 4,000 people and operational offices in key locations in Nigeria and Ghana, the company takes pride in its track record of exceptional and qualitative service delivery. Today, the C & I leasing Plc brand presence can be felt in major sectors in the Nigerian economy, providing specialized services, in Marine, Telecommunications, Oil and Gas, Equipment Rentals, Manpower Outsourcing and Transportation.




We required a solution that ranks higher in its ease-of-use as well as supported networking and security features

Mr. Adeyemi Adedukun
System Administrator
C & I Leasing Plc.



C & I Leasing Plc uses the Internet for regular web surfing and accessing business critical web applications. In addition, the Internet plays a key role in connecting its branch offices with the head office. Explaining about the organization's Network Security requirements Mr. Adeyemi Adedukun, System Administrator at C & I Leasing Plc, said, "We required a solution that ranks higher in its ease-of-use as well as supported networking and security features".

According to Mr. Adedukun, the issues that they faced were:

DHCP Issues

Mr. Adedukun desired to allocate dynamic IP Addresses via DHCP to users connecting with the corporate network. Hence, the need was for a Gateway level security solution that can function as a DHCP server and assign and manage the dynamic IP Addresses.

Ease-of-use Concerns with Previous Solution

According to Mr. Adedukun, Microsoft TMG - their previous solution, was extremely complex to configure. An average IT worker skilled in basic firewall configuration would probably not be able to get the TMG fully operational without help.

The Cyberoam Solution

Having been dissatisfied with Microsoft TMG because it was extremely complex to configure and demanded high operational expenditure and overheads, C & I easing was in search of a solution that could provide them with better services with ease of administration. They were introduced to Cyberoam by Ha-Shem Network Services Limited - an authorized Cyberoam partner. Ha-Shem helped them scrutinize the varied features that Cyberoam has to offer.

After a thorough evaluation, they purchased a total of Four (4) Cyberoam Appliances:
One (1) CR25ia, One (1) CR100ia, One (1) CR200i and One (1) CR200iNG. They deployed the CR25ia appliance at Citrans Global Limited office and all other appliances at other C & I Leasing offices.

After deploying Cyberoam in the network, the benefits that they notice are:

  • Perimeter Level Protection

    Cyberoam Security Appliance shields the C & I Leasing's network from all kinds of outside threats. It's ICSA and Checkmark - dual certified Stateful Inspection Firewall provides granular access controls over Internet traffic and network resources. It provides deep packet inspection for network based security ensuring that unauthorized access is denied at the Gateway itself eliminating the scope of illegitimate pilfering of data or harm to internal resources.

    Cyberoam's Intrusion Prevention System (IPS) feature delivers a strong line of defense right at the gateway level, through 4500+ updated signatures against hackers, remote exploits, backdoor activity and other zero hour attacks. In addition, Cyberoam's IPS is equipped with simplified and effective IPS configuration with ready-to-use IPS policy templates that come with Firewall Rule style naming convention, solving the struggle of 'which IPS Policy to apply' for SOHO/SMBs along with easy troubleshooting.

  • Advanced Networking Features

    Cyberoam Security Appliance supports a plethora of networking features. Some of the key connectivity and routing features include: DHCP v4 & v6, DHCP Server, DHCP Relay, DNS based Inbound Server Load Balancing, Multiple ISP Load Balancing, Rule based ISP Gateway Fail-Over, High Availability (Active-Passive / Active-Active), Dynamic Routing (RIPv1, RIPv2, OSPF, BGP) , 802.1q VLAN Tagging, VLAN over WAN, Security over WiFi (WLAN), 3G/4G and WiMAX(WWAN) Support.

    Mr. Adedukun said, "Cyberoam supports plenty of connectivity and routing features. We have configured it to work as a DHCP server that assigns dynamic IP Addresses to users connecting to the corporate network and I must say, it is getting the job done quite handsomely."

  • Ease of Use with Next-Generation GUI

    Cyberoam has incorporated the principles of usability and Web 2.0 technology to provide a GUI that is easy to use and lets the security administrators feel in control. Given the ubiquitous nature of UTMs in organizations, the aim of this Next-Gen UI is to enable administrators to deploy and configure Cyberoam Security Appliances rapidly and by themselves. The GUI supports unified security by allowing creation of rules for all security features, right from the
    Firewall Rule page.

    Mr. Adedukun said, "Thanks to Cyberoam, the nightmare of complex routing configurations is over. Cyberoam has turned configuring all networking and security features into a piece of cake for me."

  • Powerful Web Filtering

    Cyberoam's Web filtering database has more than 100 million sites neatly grouped into more than 89 categories. Moreover, with the recently released CyberoamOS version 10.6.1, URL categorization database is shifted on the Cloud. This ensures that there is a central and common database for all Cyberoam
    security appliances all over the world! Moreover, the cloud repository is capable of holding unlimited URLs without degrading the performance of Cyberoam appliance.

    After successfully integrating Cyberoam with an AD server Mr. Adedukun has created Identity-based filtering policies to regulate the content accessed over the Internet. User identity based Web Filter policy combined with the comprehensive content filtering database, helps him to have granular control and unparalleled flexibility in implementing the organization's corporate policy of content accessed over the Internet.

  • Network Bandwidth Managed

    Cyberoam's QoS feature allows Mr. Adedukun to restrict bandwidth usage by implementing bandwidth policies based on User, Firewall Policy, Web Category and Application. In addition, each policy can be customized with a wide range of parameters such as maximum data transfer policy, time of the day etc.

    Mr. Adedukun said, "Frankly speaking, QoS support was a news for me. However, I'm glad to say that Cyberoam's QoS policies are quite effective besides the fact that they are straightforward to configure and manage."

  • Enhanced Network Visibility with Cyberoam iView

    Cyberoam iView offers centralized logging and reporting of network and user activity across distributed locations. The 1200+ reports analyze patterns from multiple logs and offer visibility that enables administrators to take corrective actions, pro-actively track security breaches, quickly respond to incidents, help display compliance with one-click compliance reports and enable forensic analysis.

    Mr. Adedukun said, "Cyberoam's On-appliance Identity-based reporting is its key feature. The granular control and visibility, deep down to the user level helps us a great deal in making many of our Internet access policies."


  • To Conclude

    "Cyberoam provides the best Return over Investment. We achieved all the benefits we expected from the product, with more ease of administration compared to our previous solution", said Mr. Adedukun.