Blue Chip Communications, Nigeria, Africa
Cyberoam UTM Demystifies Internet Surfing Activities for Blue Chip Communications
About Blue Chip Communications, IIT/ITES

Blue Chip Communications Limited, an engineering company is committed solely to the provision of Turnkey Telecommunication Solutions and Services. The company is primarily focused on the Marketing, Supply, Network installation, Integration, Support, Consulting, Customer Training and the provision of total telecommunications and information technology solution and services. Their vision is to be the best telecommunications service support company in Africa providing first class cutting edge telecom support service.

Internet is used as a lifeline as it is the principle business enabler and there can be no compromise when it comes to Internet connectivity and security, as it is the most productive resource. Internet is mainly used for browsing, email, and internal hosting applications. Thus, business cannot be run without Internet connections.

Blue Chip Communications contract documents and sensitive servers are under constant threat from spyware, and DoS attacks. So they were in need of Gateway Firewall and Intrusion Prevention solution for protection of their entire network.

Mr. Alakija Adeola
IT Head,
Blue Chip Communications

Mr. Alakija Adeola, the IT Head for Blue Chip Communications was looking for a reliable Internet security platform to protect its users. “We needed a solution which would give us highest ROI while taking in hand our major security concerns - all in a solitary box”, Mr. Adeola said.

The concerns are listed below.

Shielding the Network Edge and Hard-Hitting IPS

The Blue Chip Communications network basically comprised of business secrets, confidential data and other client sensitive information and data that can be possibly targeted by attacks from external entities and outside access attempts. Some hackers just to have fun, grab attention, take revenge, or demand certain things, set up a DDOS or DOS (Denial of Service) attack which freezes your entire system and leads to none of the servers, websites and computer systems to work.

Hence, Mr. Adeola wanted a solution that would control the entire Internet traffic and provide a level of protection from network-based attacks by allowing good traffic and denying bad traffic as defined by a security policy. They need to protect the network against intentional and unintentional intrusion attempts, and Denial of Service attacks.

Virus and Spam Control

Blue Chip Communications rely heavily on email in order to receive orders from customers as well as for internal communication; as with the majority of modern organizations email is the prime method of communication for the company. Therefore protecting their email servers was an important decision. The pervasiveness of malicious threats has created the need to protect all layers of the network - wherever information flows. Viruses are no longer the only menace. Organizations must contend with network worms, spyware and other insidious pests.

Blue Chip Communications wanted to secure its entire email network from newly emerging malware threats and reduce overall spam incidence. This was required to keep mails secure and in-boxes clean. The spam filtering was required to be totally automated and perform irrespective of the language and content of the mail with an absolute minimum amount of false positives - as no organization can afford to lose a single business opportunity should a legitimate email being wrongly classified as spam.

Monitoring Website Access

As Internet use grows in Blue Chip Communications, so do the risks of uncontrolled access. When employees inadvertently or deliberately access sites containing inappropriate, illegal, or dangerous content, organizations lose productivity, expose themselves to legal liability, and in some cases experience degraded network performance.

Also, the use of bandwidth- intensive applications such as streaming media or the downloading of music or videos by few employees would slow or shut down entire organizational networks. An effective filtering solution can help solve these problems by blocking access to inappropriate Web sites or those that can detract from employee productivity

The Cyberoam Solution

Blue Chip Communications looked into a number of security products but they found Cyberoam UTM best among the rest in terms of features, stability and easy-to-use.

After understanding Cyberoam‘s features Mr. Adeola decided to go with Cyberoam and also found Cyberoam cost-effective compared to other products. Mr. Adeola decided to deploy One (1) unit of CR50ia in Gateway mode in Head Office. MCSI Consulting is the IT service desk/support provider for Blue Chip Communications.

The business benefits were as follows:

  • Firewall and Intrusion Prevention

    Cyberoam firewall is ICSA and Checkmark certified - provides granular access controls over Internet traffic and the network resources. Coupled with Intrusion Prevention module, Cyberoam UTM can counter any Denial of Service attack. Mr. Adeola now felt the network is secure.

  • Malware and Spam-free Network

    Cyberoam‘s Gateway Anti-Virus solution, with the industry‘s best malware detection rates, scans mail and web traffic over the entire Blue Chip Communications network for SMTP, IMAP, POP3, HTTP and FTP protocols, thereby, ensuring that the mail and web traffic is clean and the network is fully secure against malware including rootkits, viruses, worms, Trojans, spyware, backdoors, keyloggers and more.

    Moreover, the anti-virus even blocks attachments for specified file types such as executables, media files, PDF, zipped files etc. before these blended threats can enter the network and cause damage.

    Cyberoam‘s Gateway Anti-Spam solution with its content-agnostic feature blocks spam in any language regardless of the content, e.g. image, audio, video or zip-based spam, therefore greatly reducing spam problem faced by Blue Chip Communications network. On top of it, Virus Outbreak Detection feature secures the entire network against any Zero-hour mail-based attacks.

  • Safe Browsing & Judicious Bandwidth Management

    Blue Chip Communications needed the ability to instantly block web sites, enforce acceptable usage policies on their users and have access to audit trails for entire user activity. Cyberoam addresses all these issues and more, by providing a flexible content filtering solution that puts the network administrator firmly in control.

    Cyberoam has a content filtering database of more than 44 million Websites, categorized cleanly in 82+ categories, providing extensive control over Internet usage. All unauthorized downloads, P2P applications, pirated audio and video streaming and other harmful content is now safely blocked.

    Any phishing or pharming Website is disallowed to ensure that no personal information accidentally falls into the hands of criminals. The content filtering categories allow the organization to create policies to block access to sites associated with spyware, phishing, key-logging, malicious mobile code and malware. All content access over HTTP, HTTPS and FTP over HTTP is controlled, scanned and made malware free.

  • On-Appliance Reporting - Know Who is Doing What?

    “Comprehensive Reporting is one of Cyberoam‘s most significant features,” said Mr. Adeola. The reporting feature reports details of any attempted violation, and offers appropriate functionality for the manager to keep track of the organizational activities.

    The On-Appliance reporting module includes features like Traffic Discovery, Internet Bandwidth Usage Monitors, Top Accessed Categories and Google Search Reports, which enhanced the visibility of a user‘s online behavior. The active alerts and comprehensive reports help Mr. Adeola to keep a tab on the Internet usage trends.

  • To Bring to a Close

    “Cyberoam UTM Appliance offers the full UTM features that we need. It comes with very user-friendly GUI interface and setup is simple and straight forward. The main dashboard provides intuitive system overview and real time statistics on various internet activities. We chose Cyberoam because it is very User friendly, very cost-effective, feature-rich and provides good technical support. ” said Mr. Adeola.