Liberia Petroleum Refining Company Liberia, Africa
Leading Liberia Petroleum Refining Company Hangs on Cyberoam for its Security
About Liberia Petroleum Refining Company (LPRC), PetroChemicals
The Liberia Petroleum Refining Company (LPRC) is a public entity, wholly owned by the Government of Liberia (GOL), with the mandate to procure and supply quality petroleum and petroleum products to the Liberian market.
The LPRC is certainly a business entity engaged in profit making activities. The idea of creating an oil company in Liberia was conceived when it became clear that the government was spending an enormous amount of its foreign earnings on the importation of petroleum and petroleum products into the country.
Therefore in the mid 1960s, construction work began for oil refining facilities under the auspices of the Liberia Refining Company (LRC) and in August 31, 1978, the company was changed to the Liberia Petroleum Refining Company (LPRC). Their vision is to be the best managed company in Liberia, offering unrivalled customer service in a work environment of the highest ethical standards, where employees are valued and given an opportunity to reach their fullest potential.
LPRC sensitive information was under constant threat with spyware and DoS attacks. Therefore, they needed a strong Firewall solution which would be capable in retorting these threats.
Mr. John Momolu Dukuly
Liberia Petroleum Refining
“Internet is one of our most critical resources without which all communications to and from our Branch Offices, distributors, partners and customers would come to a standstill”, said Mr. John Momolu Dukuly, MIS Director at LPRC.
The company was plagued with the following security and connectivity challenges related to its business activities.
Unsafe Network Gateway
Employees in LPRC wanted access to email, and they wanted to browse the World Wide Web. In addition, the company also wanted to publish their information on the Web. LPRC wanted to protect their servers with a strong firewall and access control management solution over all the WAN network resources.
Hence, the topmost priority of LPRC was to have an effective security mechanism in place at the Network Gateway itself. This would barricade the entire network from various forms of spyware, DoS attacks, fragmented and malformed packets, blended threats and more.
Disruptive Web Surfing
“As Internet use grows in business, so do the risks of uncontrolled access. When employees inadvertently or deliberately access sites containing inappropriate, illegal, or dangerous content, LPRC loses productivity, expose themselves to legal liability, and in some cases experience degraded network performance”, said Mr. Dukuly.
He wanted to monitor and control web surfing patterns of individual employees as well as the company on the whole. He wanted to pull the reins on Internet surfing to avoid employees from being distracted and the network from being exposed to various cyber threats. Uploading/downloading of streaming media, which occupied precious bandwidth, also needed to be restricted. T us, the organization needed an effective filtering solution which can help solve these problems by blocking access to inappropriate Web sites or those that can detract from employee productivity.
LPRC has evolved into an organization with independent networks at remote sites supporting many users. One of the challenges for LPRC was to provide access to sensitive data across a more secure and stable VPN.
The Cyberoam Solution
In order to address their business challenges, LPRC looked into a number of security products including Cisco and Linksys routers and switches. “We were utilizing Linksys routers before Cyberoam appliance, however, they provided generalized configuration that only applied to the IP addresses within the routers. Reporting was manual and not detailed enough.” said Mr. Dukuly.
However, after seeing a trial demo of Cyberoam, they took the decision of deploying the Cyberoam appliance – One (1) CR100i at the branch office - Monrovia in Gateway Mode.
The business benefits were as follows:
- User Integration
Cyberoam UTM adds up with a unique identity-based security solution which protects against insider threats by giving absolute visibility into “Who is doing What” in the network and allows creation of user identity-based policies. Mr. Dukuly used Cyberoam’s Active Directory (AD) facility to achieve the task of integrating LPRC users in the network through a wizard to trade in users. This ensures only company’s employees are allowed network access, while outsiders are kept at bay.
- Total Perimeter Security
Cyberoam’s ICSA and Checkmark-certified firewall offers stateful and deep-packet inspection to provide granular access control over Internet and network resources. “Cyberoam Firewall helps me to understand the attacks in my environment and the various threats to my network. Apart from that it is very helpful in notifying me when anomalous events happen in the network.” said Mr. Dukuly.
- Web Content Filtering
Cyberoam’s 82+ category tough Web Content filtering technology kept the organization’s internet resources effectively focused. The Content filtering feature makes sure that all P2P and Instant Messengers are blocked and that there is no breach of data. Cyberoam helps manage employee access to websites, minimizing loss of time on the internet, and lowering operating costs. It also helps enforce internet usage policies based on bandwidth needs to prevent business losses and other issues that result from limited access to mission-critical applications. Moreover, Cyberoam’s identity-based filtering allows configuration of individual user Internet access policy, surfing quota, time limits and bandwidth restrictions.
- Virtual Private Network Connectivity
Cyberoam’s SSL VPN solution bridged the geographical distances between the organization’s branch and head offices. This now ensures that the user can connect securely from any location and use the organization’s resources. Highly encrypted traffic enforced security over the Internet and ensures that no malware sneaks through.
Cyberoam also came with the added bonus - its inbuilt reporting functionality. The user’s internet activity could be closely monitored, with any compromising activity being stopped and an alert being sent to both the user and the administrator. In short, “We are satisfied, completely with Cyberoam UTM,” Mr. Dukuly said.
- To Reason Out
Key to its selection was Cyberoam’s proven scalability, as well as the sophistication built into the base-line product. “Cyberoam is a great fit for us. Since the introduction of the Cyberoam appliance in our organization, we have now gained confidence in configuring and monitoring our network better. We have gained lost times during work, better Quality of Service (QOS) which is increasing our productivity. Our future expansion is to have an upgrade of the present appliance to that of the CR300i series. Cyberoam has provided us good return on our investment (ROI),” said Mr. Dukuly.