ICAN BPO Navi Mumbai, India, Asia
Cyberoam Provides Business Critical Internet Security to ICAN BPO
About the ICAN BPO, BPO
ICAN BPO is a full service outsourced solutions provider with deep domain expertise in the
areas of sales, marketing and customer relationship management. Managing customer
relationships, fostering improvement and adding value to them is how ICAN enables
organizations worldwide to constantly improve their business performance.
Being a BPO it is very important for us to secure our Internal Database. We work on outsourced applications and securing their data is also our prime focus. We can‘t afford to compromise on Internet security.
Mr. Sachin Borade
Mr. Sachin Borade, (IT Head) at ICAN BPO, in explaining the scenario and their needs said, “Being a BPO it is very important for us to secure our Internal Database. We can‘t afford to compromise on Internet security. We also work on outsourced applications and securing their data is our prime focus. Our base requirement was a solution that would cater to our security needs.” Delineating the ICAN BPO‘s security needs Mr. Borade pointed out their existing requirements and the issues of their previous solution:
Access Control and Intrusion Prevention
The organization needed a firewall and an intrusion prevention solution. The combination of both the solutions was needed to protect the network against intentional and unintentional intrusion attempts, and Denial of Service attacks. The organization needed to know which applications were vying to get to the Internet. Any un-productive application ought to be blocked as Internet is not a resource that can be squandered.
In the absence of gateway anti virus, users surfing the Web (HTTP), transferring the file (FTP) and exchanging mail (SMTP, POP3, IMAP) were constantly exposed to the danger of malware infestation. Simple day-to-day activities were often hampered with hidden dangers. The result was that productivity suffered as the IT department had to interfere to rectify the situation.
Gateway Anti Spam was required to keep mails secure and inboxes clean. The spam filtering was required to be totally automated and perform irrespective of the language and content of the mail with an absolute minimum amount of false positives - as the organization cannot afford to lose a single business opportunity by assorting a genuine mail wrongly classified as spam.
Controlling Surfing Practices
The organization needed to know who was accessing what sites and as such needed an
identity based filter and reporting system that would include the users‘ online behavioral
audit. It would also be required to block harmful spyware/malware infested sites. One of the
most important vectors of worry was the employee productivity. The productivity might be
affected while spending precious time in unproductive surfing and messaging. Mr. Borade
also said “Voice being major application for us, unproductive surfing lead to choking
bandwidth for voice based applications.”
Audited Internet Access
All Internet-based activities have to be logged. The logging and reporting should be identitybased and not just IP Address-based, where the administrator cannot identify the actual user behind it. The reporting should be clear and should be able to provide clear visibility to the administrator about all Internet usage and surfing patterns.
The Cyberoam Solution
ICAN BPO tested Cisco ASA, Juniper, and Fortigate but found that they were not providing
on-appliance reports with the core product. They were using Cisco PIX firewall, which was
configured to allow specific services and block rest of the services. Also VPN configured in
PIX allowed the employees to connect to the remote networks over Internet links.
Access and Application Control
Mr. Borade said “We were using gateway firewall, but it only provided us with basic IP
Address/Service based firewall rules. We didn‘t have any reporting tool, so we were unaware
of what was happening in our network. In case of any outbreaks, it was impossible to track
the source, making it difficult for us to handle our network.”
Malware and Spam Free Internet
Cyberoam‘s gateway anti virus, anti spyware and anti spam features guard all the web and mail protocols and ensure that no malware or spyware sneaks through the perimeter. Recurrent Pattern Detection (RPD) powered signature-less anti spam technology works instantly on deployment, with the least human intervention and is language independent. It blocks spam in any language regardless of the content, e.g. image, audio, video or zipbased spam. The anti spam feature is also equipped with Virus Outbreak Detection. This protects the organization against any zero day attack.
ICAN BPO installed Cyberoam not only to manage employee Internet access, but to
minimize the risk of other web security threats. In addition, they chose Cyberoam to help
improve employee productivity and save network bandwidth. ICAN uses Cyberoam to
block access to specific category of websites. They utilize the Cyberoam‘s reporting
functionality to help identify organizational risk levels for productivity, security and network
bandwidth loss trends.
Knowing Who is Doing What?
“Comprehensive Reporting is one of Cyberoam‘s most significant features,” said Mr.
Borade. The reporting feature reports details of any attempted violation, and offers
appropriate functionality for the manager to keep track of the organizational activities.
Secure Business Connectivity
The head office and branch offices have multiple ISP links. “Link failures, bandwidth choking results in loss of our customers and thus impacting our business”, Mr. Borade said. Cyberoam‘s Multilink Manager feature load balances the traffic and takes care of link failover. This ensures that the network is up and truly utilized for true business use. He can now claim maximum uptime for the customers even in case of link failures. All the sites are securely connected using Cyberoam‘s site-to-site IPSec VPN feature. On the way, it also bridges our connectivity and productivity requirements. Cyberoam gives us productivitypromoting, business-friendly security,” Mr. Borade concluded.
“Cyberoam had proved very useful for our organization. It has helped us to achieve what we desired. In one line we can say "Cyberoam is a solid product with some unique features - very easy to set up and manage."”, Mr. Borade concluded.