Infocom Technologies, Tanzania Africa
Cyberoam Secures Infocom Technologies, Tanzania
About the Infocom Technologies , Information Technology

Infocom Technologies is an IT solutions company based in Tanzania. It was incorporated in 2001 as an IT consultant and Management services company after operating as an inhouse team for IPP Limited since 1998. Since then, it has grown in size to become a significant IT solutions provider for the Tanzanian market.

The company considers itself at the forefront of promoting Tanzania‘s potential as a major information technology center. Currently, Infocom Technologies designs and develops a range of quality services including Web Solutions (i.e. Development, Hosting and Online advertising), Database design, development and management, Training and IT consultancy.




We needed a good firewall, anti spam, and virus and content filtering. As we designs and develops a range of quality services including Web Solutions, Internet is the primary business enabler for our company.

Mr. Emmanuel Mwakajinga
System Administrator
Infocom Technologies



Infocom‘s business activities over the Web include researching Internet information, maintaining its extensive news and company websites apart from email and download activities. Mr. Emmanuel Mwakajinga, System Administrator at Infocom was looking for a solution to meet the following security and productivity requirements.

Minimum Gateway Protection

The company‘s network at the head-office did not have minimum gateway firewall security to protect corporate data and servers from unauthorized outside access even though temporarily, they had deployed options such as Cisco devices, gateway Linux box etc., without long term value back outcome expectations. Sensing the situation urgency and the amount of risk involved in exposing the network, they wanted to avoid any further delay in establishing minimum firewall protection.

Precluding Intrusions

Along with firewall security, Infocom wanted its LAN, where most sensitive data such as customer records, tenders and contracts, payroll information etc., to stay protected from external intrusion attempts such as backdoor activities, remote exploits, buffer overflows, brute force attacks, DoS attacks and more. Any such attack would spell a direct assault on the organization‘s system integrity through corrupt internal files and applications, crashing of web & mail servers, valid data overwritten or exposure of confidential information.

Debar Malware and Clean Mail

Malware attacks from viruses, worms, Trojans, etc. were quite common in the organization. According to Mr. Mwakajinga, “From the relatively harmless ones that force users to press some keyboard key at regular intervals to the vicious ones that corrupt files in the boot sector or even reformat the entire hard disk, malware attacks at Infocom were costing us man-hours due to IT helpdesk calls.”

The existing antivirus and other security features at the organization took a long time to update in response to these threats. Thus, Mr. Mwakajinga was looking for an antimalware solution that could straight away arrest any newly emerging malware at the gateway itself. In addition, employees at Infocom Technologies were frustrated due to their email inboxes overloading with volumes of useless and unwanted spam messages. There was urgent need for a well-equipped email security solution.

Building Safe Surfing Environment

Mr. Mwakajinga was looking for an organization-wide content filtering solution to clamp down on distracting sites and bandwidth hungry social networking sites at work, hence the much needed requirement for enhanced productive Internet use among its employees. Such a solution was also needed to protect the organization from virus attacks due to surfing the web or clicking spam-links that redirect to harmful sites such as phishing, spyware, P2P, pornography etc.

Optimizing Bandwidth Use

Bandwidth and resource reallocation were quite high on Infocom‘s wish-list. For them, many business activities were directly linked to Internet surfing. However, they were equally concerned about the prevalent system which could not provide the much needed bandwidth for business-critical VoIP, SAP downloads and multimedia applications. Instead, the precious bandwidth was being wasted due to unauthorized usage of video, chat, P2P applications and other improper download managers.

The Cyberoam Solution

As mentioned earlier, after experimenting with other firewall choices, Infocom Technologies finally zeroed in on a Cyberoam CR1000i UTM appliance which was deployed at their head-office in gateway mode.

According to Mr. Mwakajinga, “Being an all-in-one appliance, Cyberoam is an integrated and easy to use solution that offers large range of features which provided us the desired network protection and performance for our business requirements to achieve the following desired results.”

Network Perimeter Fortified

Cyberoam‘s identity-based UTM appliance easily integrated into the Infocom Technologies network with an existing Active Directory Services (ADS) which pulled all users directly into its database, providing them with real time protection while utilizing resources usefully.

Further, with the help of Cyberoam‘s identity-based Layer 8 firewall, Mr. Mwakajinga was able to configure access control policies and identify users directly based on username rather than through IP addresses alone. This ensures that the identity-based firewall prevents unauthorized outsiders from breaching past the company‘s perimeter.

Defusing Intrusion Attempts

The use of Intrusion Prevention System (IPS) feature plays a key role in protecting the organization‘s internal LAN from known and unknown intrusion attempts. With tailormade polices enabled from firewall rule itself and a predefined database of over 3000+ signatures divided into categories of backdoor activities, remote exploits, buffer overflows, brute force attacks, DoS attacks and more, Cyberoam IPS is able to instantly block any malicious traffic entering the network.

Neutralizing Malware and Spam

Cyberoam‘s gateway anti-virus solution with industry-best virus detection capabilities, scans web and mail traffic across HTTP, FTP, SMTP, POP3 and IMAP protocols at the gateway to block malware from entering the Infocom network, thus, greatly reducing the scope of IT helpdesk calls and the time that was earlier wasted due to such attacks. It offers real-time protection with the critical capability of zero hour updates to tackle any emerging viruses, worms, spyware, Trojans, key-loggers and many more online threats before a valid signature could develop.

Also, Cyberoam‘s Checkmark-certified anti-spam solution with a spam catch rate of 98% proved handy in checking all inbound and outbound mails for email spam including images, foreign languages and multiple characters. Moreover, with a unique feature - Virus Outbreak Detection (VOD), it is able to automatically detect and block any new malware attacks emerging from emails.

Also, Cyberoam‘s Checkmark-certified anti-spam solution with a spam catch rate of 98% proved handy in checking all inbound and outbound mails for email spam including images, foreign languages and multiple characters. Moreover, with a unique feature - Virus Outbreak Detection (VOD), it is able to automatically detect and block any new malware attacks emerging from emails.

Surfing Control Achieved

Prior to Cyberoam deployment, there was no control on sites visited by Infocom Technologies employees. However, all that changed with Cyberoam‘s Web filtering feature which ensures protection from inappropriate and unsafe Web content, including phishing and other malware-laden sites.

With its comprehensive and continuously updated database of millions of region-specific popular sites across the cyberspace grouped into 82+ categories, it granularly blocks unproductive sites and even IMs, P2P exchanges and illegal downloads with customized messages to enable end user education.

Bandwidth Management

Cyberoam‘s Bandwidth Management solution solved Infocom Technologies‘s earlier bandwidth scarcity issues for business-critical applications. Mr. Mwakajinga can now prioritize the organization‘s bandwidth usage as per business requirements with more effective controls on which user consumes how much bandwidth (upload and download limits) during any time of the day.

To Round it Off

Within hours of deployment of Cyberoam at the Infocom Technologies network, most security issues were effectively resolved without degrading network performance. According to Mr. Mwakajinga, “One of the best features of Cyberoam is its on-appliance reporting feature which gave us useful statistical results such as Top 10 sites data transfer-wise, the number of sites which were non-productive or unhealthy and in knowing what exactly our users were doing in the network and what unproductive websites should be further blocked.”