Infocom Technologies, Tanzania Africa
Cyberoam Secures Infocom Technologies, Tanzania
About the Infocom Technologies , Information Technology
Infocom Technologies is an IT solutions company based in Tanzania. It was incorporated
in 2001 as an IT consultant and Management services company after operating as an inhouse team for IPP Limited since 1998. Since then, it has grown in size to become a
significant IT solutions provider for the Tanzanian market.
We needed a good firewall, anti spam, and virus and content filtering. As we designs and develops a range of quality services including Web Solutions, Internet is the primary business enabler for our company.
Mr. Emmanuel Mwakajinga
Infocom‘s business activities over the Web include researching Internet information, maintaining its extensive news and company websites apart from email and download activities. Mr. Emmanuel Mwakajinga, System Administrator at Infocom was looking for a solution to meet the following security and productivity requirements.
Minimum Gateway Protection
The company‘s network at the head-office did not have minimum gateway firewall security to protect corporate data and servers from unauthorized outside access even though temporarily, they had deployed options such as Cisco devices, gateway Linux box etc., without long term value back outcome expectations. Sensing the situation urgency and the amount of risk involved in exposing the network, they wanted to avoid any further delay in establishing minimum firewall protection.
Along with firewall security, Infocom wanted its LAN, where most sensitive data such as customer records, tenders and contracts, payroll information etc., to stay protected from external intrusion attempts such as backdoor activities, remote exploits, buffer overflows, brute force attacks, DoS attacks and more. Any such attack would spell a direct assault on the organization‘s system integrity through corrupt internal files and applications, crashing of web & mail servers, valid data overwritten or exposure of confidential information.
Debar Malware and Clean Mail
Malware attacks from viruses, worms, Trojans, etc. were quite common in the
organization. According to Mr. Mwakajinga, “From the relatively harmless ones that force
users to press some keyboard key at regular intervals to the vicious ones that corrupt files
in the boot sector or even reformat the entire hard disk, malware attacks at Infocom were
costing us man-hours due to IT helpdesk calls.”
Building Safe Surfing Environment
Mr. Mwakajinga was looking for an organization-wide content filtering solution to clamp down on distracting sites and bandwidth hungry social networking sites at work, hence the much needed requirement for enhanced productive Internet use among its employees. Such a solution was also needed to protect the organization from virus attacks due to surfing the web or clicking spam-links that redirect to harmful sites such as phishing, spyware, P2P, pornography etc.
Optimizing Bandwidth Use
Bandwidth and resource reallocation were quite high on Infocom‘s wish-list. For them, many business activities were directly linked to Internet surfing. However, they were equally concerned about the prevalent system which could not provide the much needed bandwidth for business-critical VoIP, SAP downloads and multimedia applications. Instead, the precious bandwidth was being wasted due to unauthorized usage of video, chat, P2P applications and other improper download managers.
The Cyberoam Solution
As mentioned earlier, after experimenting with other firewall choices, Infocom
Technologies finally zeroed in on a Cyberoam CR1000i UTM appliance which was
deployed at their head-office in gateway mode.
Network Perimeter Fortified
Cyberoam‘s identity-based UTM appliance easily integrated into the Infocom
Technologies network with an existing Active Directory Services (ADS) which pulled all
users directly into its database, providing them with real time protection while utilizing
Defusing Intrusion Attempts
The use of Intrusion Prevention System (IPS) feature plays a key role in protecting the organization‘s internal LAN from known and unknown intrusion attempts. With tailormade polices enabled from firewall rule itself and a predefined database of over 3000+ signatures divided into categories of backdoor activities, remote exploits, buffer overflows, brute force attacks, DoS attacks and more, Cyberoam IPS is able to instantly block any malicious traffic entering the network.
Neutralizing Malware and Spam
Cyberoam‘s gateway anti-virus solution with industry-best virus detection capabilities,
scans web and mail traffic across HTTP, FTP, SMTP, POP3 and IMAP protocols at the
gateway to block malware from entering the Infocom network, thus, greatly reducing the
scope of IT helpdesk calls and the time that was earlier wasted due to such attacks. It
offers real-time protection with the critical capability of zero hour updates to tackle any
emerging viruses, worms, spyware, Trojans, key-loggers and many more online threats
before a valid signature could develop.
Surfing Control Achieved
Prior to Cyberoam deployment, there was no control on sites visited by Infocom
Technologies employees. However, all that changed with Cyberoam‘s Web filtering
feature which ensures protection from inappropriate and unsafe Web content, including
phishing and other malware-laden sites.
Cyberoam‘s Bandwidth Management solution solved Infocom Technologies‘s earlier bandwidth scarcity issues for business-critical applications. Mr. Mwakajinga can now prioritize the organization‘s bandwidth usage as per business requirements with more effective controls on which user consumes how much bandwidth (upload and download limits) during any time of the day.
To Round it Off
Within hours of deployment of Cyberoam at the Infocom Technologies network, most security issues were effectively resolved without degrading network performance. According to Mr. Mwakajinga, “One of the best features of Cyberoam is its on-appliance reporting feature which gave us useful statistical results such as Top 10 sites data transfer-wise, the number of sites which were non-productive or unhealthy and in knowing what exactly our users were doing in the network and what unproductive websites should be further blocked.”