Tanzania Electric Supply Company, Tanzania, Africa
Cyberoam Provides an All-in-One Security Solution to Tanzania Electric Supply Company
About Tanzania Electric Supply Company, Government
Tanzania Electric Supply Company Limited (TANESCO) is a Tanzanian parastatal organization established in 1964. It generates, transmits, distributes and sells electricity to Tanzania Mainland and sells bulk power to the Zanzibar Electricity Corporation (ZECO). Its main offices are located in Dar es Salaam and it operates regional offices throughout Tanzania. The Ministry of Energy and Minerals regulates the operations of TANESCO.
In this era of technology where Internet is a prerequisite for almost all business activities, TANESCO depends on Internet for connectivity, research, surfing and communication purposes.
“Since most of our business activities are dependent on Internet, continuous and secured connectivity is a major necessity for us.”
Mr. Elirehema Obedi Mejooli
Ag. Manager ICT
Communications & Infrastructure
Mr. Elirehema Obedi Mejooli, the Ag. Manager ICT Communications and Infrastructure at TANESCO said, “Since most of our business activities are dependent on Internet, continuous and secured connectivity is a major necessity for us”.
The security issues faced were:
Risky Network Perimeter
Increasing usage of Internet also increased the number of threats. Moreover, if the network was infected by any of the threats like remote exploits, DoS attacks and other random network attacks, it led to serious network downtime. Mr. Mejooli said, “Many a times our network got victimized by DoS attacks.”
Unrestrained Internet Browsing
Mr. Mejooli wished to keep his employees focused on their tasks, preventing them from getting distracted by surfing unproductive websites like social networking sites, gaming, music and other entertainment-related websites. Moreover, bandwidth was also excessively used by such websites, making legitimate applications inaccessible due to insufficient bandwidth. As a result, productivity and bandwidth both were affected. He said, “We noticed that many employees got diverted from their tasks while surfing non-work-related websites”.
Flooding Spam Mails
TANESCO’s network received a significant number of mails as Spam, leading employees to waste a considerable amount of time in reading and then deleting those mails. Some Emails were such that tempted the employees to click spiteful links which ultimately led to hassles for the organization and the employees. This resulted to an unacceptable loss of productivity.
The Cyberoam Solution
Having considered many solutions like Cisco ASA5505, TANESCO found Cyberoam to be satisfactory and appealing. Hence, they purchased One (1) CR 1500i and deployed it in Gateway Mode at their Data Center.
After deployment they noticed the following benefits:
- Firewall – A Safe Network Perimeter
Now, with Cyberoam handling all his network security issues, namely Firewall, Reporting, Antispam, Antivirus, etc., it has become very easy for Mr. Madhu to handle the entire SVES network from one platform. “Now I do not need to maintain separate solutions for different security needs. For whatever I need, I just log on to Cyberoam and the task is done!” he said.
- Network Perimeter Firewalled
Cyberoam’s Firewall is Checkmark Level 5 and ICSA Certified. It provides stateful and deep packet inspection for network based security thereby protecting the organization from DoS, IP Spoofing and other network attacks. It also provides a Fusion technology that enables creation of policies for multiple features through a single interface. Mr. Mejooli said, “Thanks to Cyberoam our network is now safe from malicious traffic”.
- Restrained Internet Browsing
Cyberoam has a constantly updated database of millions of sites divided into 82+ categories which allows access only to those sites which are permitted by IT guidelines of the company. Cyberoam’s Web and Application Filtering blocks all malware-laden sites, P2P, IMs, illegal audio, video, streaming media and other bandwidth-intensive download. Moreover, Cyberoam’s identity-based filtering allows creating and assigning schedules, policies and level of access to individual users based on their designation and role for surfing the web. In addition, HTTPS scanning controls unauthorized secure access, thereby preventing unauthorized download, upload and data leakage.
Mr. Mejooli said, “Using Cyberoam’s Web and Application Filtering solution, we are assured that all the employees are focused on their tasks”.
- Controlled Spam
Cyberoam’s Gateway Anti Spam solution provides Recurrent Pattern Detection technology that is content and language agnostic. Moreover, it provides protection against foreign characters and image-based Spam with almost no cases of false positives. Finally, its Virus Outbreak Detection (VOD) feature protects the network against real-time massive virus outbreaks. Mr. Mejooli said, “With Cyberoam at our gateway, the number of Spam mails has reduced significantly”.
- Cautious Usage of Bandwidth
Cyberoam’s Bandwidth Management solution solved TANESCO’s earlier issues with bandwidth scarcity for legitimate applications. It offers identity-based bandwidth controls, preventing blockage and optimizing bandwidth. Mr. Mejooli said, “Based on identity now everyone gets their own share of bandwidth. Hence bandwidth is wisely managed”.
- Business Stability Maintained
Cyberoam’s Multiple Link Management, smartly distributes the Internet traffic between the two ISP links ensuring its best possible usage. It also enables Mr. Mejooli to assign weights to each ISP links such that the traffic load is distributed accordingly. Moreover, the Multi-Link Manager keeps a constant watch on the behaviour of the links. If any of the links fail the load is automatically transferred to the working link, leading to all-time Internet accessibility. Mr. Mejooli said, “In our organization multiple ISP links are load balanced assuring guaranteed service availability”. He further added, “Thanks to Cyberoam, the network has now become stable enough to run the business smoothly without any Internet problems, ensuring efficient business continuity”.
- To Conclude
Mr. Mejooli said, “Cyberoam is a good product that integrates all the security solutions in just one device. It also has an excellent ability to control access to resources”.