CARE International, Kenya
, Kenya, Africa
Cyberoam Provides a Complete Security Solution to CARE
About CARE, Non-Government Organization
CARE International, which stands for Cooperative for Assistance and Relief
Everywhere, traces its roots back to 1945, when 22 American organizations combined
forces to rush emergency food rations in the form of 'CARE Packages' to the starving
survivors of World War II in Europe. Thousands of Americans, including United States
President Harry S. Truman, contributed to the effort.
Today, CARE International is a consortium of 12 member countries. The oldest
members are CARE USA and CARE Canada (of which CARE Kenya is a part), which
were established in 1945 and 1946 respectively. The other eleven member countries
are Australia, Austria, Canada, Denmark, France, Germany, Japan, The Netherlands,
Norway, the United Kingdom, and Thailand.
CARE International in Kenya (CIK) is a development and humanitarian organization
with a goal to reduce poverty at the household level and to provide relief in
emergencies.CIK has been operational in Kenya since 1968. It currently carries out
major initiatives in Refugee and Emergency Operations, Health, Livelihoods, Water and
Sanitation and in HIV/AIDS. It is one of the lead agencies under the United Nations
High Commission for Refugees (UNHCR) and the World Food Programme (WFP), for
water and hygiene, food distribution and basic education in Dagahaley camp, one of
three such camps in Dadaab, along the Kenya-Somalia border.
It is of utmost importance for CIK to have constant communication with CARE
International offices all over the globe. The most important mode of inter-office
communication is emails over the internet. Internet is also used for Web Surfing and
miscellaneous Business Applications. Hence, it was necessary to secure Internet usage
in the organization.
We had Spam problems, threat
from Malware, Bandwidth Maxing
by users and users visiting
unproductive and prohibited
Mr. Patrick Maina
Mr. Patrick Maina, IT Manager in CARE Kenya, was looking for a reliable Internet
Security solution. Citing his concerns, he said,” We had Spam problems, threat from
Malware, Bandwidth Maxing by users and users visiting unproductive and prohibited
websites.” Their major business concerns were as follows:
Exposed Network Perimeter
CIK‘s security solutions were purchased only when required, and were not as effective
against constantly evolving threat scenarios. Without a firm IT network boundary in
place, they were concerned that their organization was vulnerable to external intrusion
attempts such as backdoor activities, remote exploits, buffer overflows, brute force
attacks, DoS attacks and more which would result in compromise of their organization‘s
system integrity through corrupt internal files and applications, crashing of web & mail
servers, valid data overwritten or exposure of confidential information.
Uncontrolled Malware and Spam
The organizations network was quite vulnerable to Malware attacks from viruses,
worms, Trojans, etc. Malware ranged from relatively harmless ones that forced users
to press some keyboard keys at regular intervals to vicious ones that corrupted files in
the boot sector, reformatted the entire hard disk or even caused system crashes.
Employees at CIK were engulfed by torrents of Spam. The flow of Spam throughout
the network ate away precious bandwidth affecting network speed and availability.
Also, employees were compelled to manually clean their inboxes which was quite
tedious and frustrating.
Unhealthy Web Surfing
Another pressing issue for Mr. Maina was the use of Internet by employees for nonbusiness related purposes like casual surfing, torrents, chatting, gaming, watching
videos and uploading/downloading high bandwidth files. He found that such
unrestricted web surfing took toll on bandwidth availability and was adding to the
organization‘s ISP bills because of the huge volumes of data wasted in non-productive
work. Moreover, they were losing plenty of man-hours that could have been
channelized for business efforts. Hence, Mr. Maina desired an effective Content
Filtering solution which would block all unauthorized surfing and downloading. All
Phishing, Pharming and malicious content over the Internet also needed to be
Unruly Web Surfing Practices, uploading/downloading of bandwidth intensive files and
free movement of Spam throughout the network occupied most of the available
bandwidth leaving a bare minimum for business-critical applications. Hence, an
efficient Bandwidth Management system was required.
The Cyberoam Solution
CIK considered several security products including Cisco PIX and Surf Control.
Finally, they gave the go-ahead to Cyberoam. They purchased Six (6) Cyberoam
Appliances which are deployed as shown in the following table.
|Nairobi (Head Office)
The business benefits are as follows:
- Shielded Network Perimeter
Cyberoam UTM shields the entire CIK Network from outside threats. It‘s ICSA and
Checkmark - dual certified stateful and deep-packet inspection firewall segregates the
LAN, and internal servers from unauthorized outside access.
In addition, Mr. Maina also subscribed to Cyberoam‘s Intrusion Prevention System
feature which acts as a second line of defense through 4000+ updated signatures
against hackers, remote exploits, backdoor activity and other zero-hour attacks. Acting
as an application firewall, it also supplements organizational efforts to curb data
leakage through open proxies, instant messengers and P2P applications.
- Clean Web and Mail Traffic
Cyberoam‘s Gateway Anti-Virus & Anti-Spyware solution secures the CIK network by
providing real-time protection against viruses, worms, Trojans, keyloggers, spyware
and more on all web (HTTP, FTP) and mail (SMTP, POP, IMAP) traffic. According to
Mr. Maina, “Since viruses are overpowered at the gateway itself, we are relieved that
our network and critical information systems are much less likely to fall prey to virus
Cyberoam Gateway Anti-Spam, with a spam catch rate of 98%, checks all inbound
and outbound mails for email spam, drastically reducing bandwidth consumption and
the time employees wasted cleaning their inboxes of junk emails.
- Enhanced Productivity
Cyberoam‘s 82+ categories tough Web Content filtering technology optimized the use
of CIK‘s internet resources. This feature makes sure that all P2P and Instant
Messengers are blocked and that there is no breach of data. It blocks access to
harmful websites, preventing malware, phishing, pharming attacks and undesirable
content that could lead to legal liability and direct financial losses. This helps manage
staff access to websites, minimizing lost time on the internet, and lowering operating
- To Conclude
Mr. Maina said, “Cyberoam is a very useful tool. I have recommended Cyberoam to
quite a number of my peers.”