BG Technical, Nigeria, Africa
BG Technical Deployed Cyberoam to Address their Network Security Woes
About BG Technical, Petroleum Services

B.G Technical ltd executed its first project for Shell in Forcados, Nigeria in 1994. The company has grown steadily since, both in capacity, diversity of services and in geographical spread. Presently, BGT offers services to most of the producing companies in Nigeria. Customers include Addax Petroleum, Chevron, Total, SPDC, Oando and others. The growth in services portfolio makes BGT one of the most integrated indigenous service companies, with services ranging from well services, to Pipeline and Process Services, (Pipeline Integrity assessment, etc.). BGT also has a manufacturing arm, Pipeline Pigs and Accessories Limited (PPA), a local company that designs and produces Patented Products for the oil industry. PPA has the only facility in Africa that manufactures quality pigging products. These products are used locally in Nigeria and exported to countries in Europe, Middle East and other regions. The Company’s focus is to offer services that help operators produce more oil & gas and also help them transport the products where they are needed.

“Cyberoam has turned out to be a smart investment for us. The product is proving its worth considering the investment we made”

Mr. Olaoluwa Ibigbami
IT Manager
BG Technical

Keeping in tune with most modern and tech-savvy organizations nowadays, BG Technical believes in a firm IT infrastructure. Internet is, by default, an invaluable resource to such organizations whose day-to-day business depends on effective communications and research. Hence, complete availability and security of this resource is of utmost importance. However, according to Mr. Olaoluwa Ibigbami, IT Manager of BG Technical, their network suffered from the following issues.

Lack of Perimeter Defences

"Agreed that Internet is quite a boon for any organization, but it has a dark side to it that we need to be wary of", pondered Mr. Ibigbami. In the absence of an effective network security solution, BG Technical's network was rendered vulnerable to impending cyber threats. The immediate need was to fortify the network perimeter against malicious intrusions, Spam, malware, etc.

Unmonitored Web Activity

Mr. Ibigbami felt that due to the lack of proper logging and monitoring, the Internet was not utilized productively. There were high chances of employees getting diverted from their tasks by accessing social networking sites, downloading/uploading videos, music and doing other non- work related activities. As a result, network bandwidth and employee productivity were negatively affected.

The Cyberoam Solution

After searching for a suitable solution in the market, Mr. Ibigbami decided to trust Cyberoam with their network’s security. Hence, they purchased One (1) CR200iNG and deployed it at their Head Office in Gateway Mode. After Cyberoam installation, they noticed the following benefits.

  • Firewall: A barricade of Fire

    Cyberoam's Firewall, Checkmark and ICSA certified, ensures that the organization's network is safe from attacks like DoS, DDoS, IP Spoofing and other network attacks. It also provides granular access controls over Internet traffic and network resources. Its Fusion Technology blends security, connectivity and productivity by enabling the administrators to create policies for multiple security and networking features through single interface.

  • Layer 8: Identity-based Security

    Cyberoam's Layer 8 technology provides a robust network security system which can include a user's human identity as part of the Firewall rule matching criteria. It treats user identity as the 8th Layer or the human layer in the network protocol stack, enabling educational institutes to overcome the limitations of conventional UTMs/firewalls which bind security to IP Addresses alone. By implementing Layer 8 security in their networks, administrators can gain real-time visibility into the online activity of users while creating security policies based on their usernames.

  • Spam and Malware Repelled at Gateway

    Cyberoam's Gateway Anti Virus and Anti Spyware features guard all the web and mail protocols -HTTP, HTTPS, SMTP, POP3, IMAP and VPN tunnels to ensure that no Malware or Spyware sneaks through the perimeter. Additionally, the Anti Virus blocks attachments for specified file types such as executables, media files, PDF, zipped files etc. before these blended threats can cause havoc in the network.

    Cyberoam's Gateway Anti-Spam, with a Spam catch rate of 99%, checks all inbound and outbound mails for Spam, drastically reducing the earlier time employees would waste cleaning their inboxes of junk emails. With its language-independent and content-agnostic property, the solution makes it very difficult for spammers to get around its spam filter through the regular "drive-by" tactics such as putting unsubscribe links, or faking URLs of legitimate sites to send unwanted mails.

  • Business Continuity Upheld

    Cyberoam's Multi-Link Load Balancing and Automated Failover feature intelligently manages the Two (2) ISP links in the BG Technical network. Mr. Ibigbami has assigned weights in a 1:2 ratio to both links which is how traffic is load balanced. In case of failure of one link or when the link is at limited capacity, the entire traffic is redirected to the alternate link ensuring that business critical services are always up and running. He commented, "We can now accommodate more users on the available bandwidth by customizing the rules to optimize utilization of current resources".

  • To Conclude

    “Cyberoam has turned out to be a smart investment for us. The product is proving its worth considering the investment we made”, said Mr. Ibigbami.