CARE International, Kenya , Kenya, Africa
Cyberoam Provides a Complete Security Solution to CARE International, Kenya
About CARE, Non-Government Organization

CARE International, which stands for Cooperative for Assistance and Relief Everywhere, traces its roots back to 1945, when 22 American organizations combined forces to rush emergency food rations in the form of 'CARE Packages' to the starving survivors of World War II in Europe. Thousands of Americans, including United States President Harry S. Truman, contributed to the effort.

Today, CARE International is a consortium of 12 member countries. The oldest members are CARE USA and CARE Canada (of which CARE Kenya is a part), which were established in 1945 and 1946 respectively. The other eleven member countries are Australia, Austria, Canada, Denmark, France, Germany, Japan, The Netherlands, Norway, the United Kingdom, and Thailand.

CARE International in Kenya (CIK) is a development and humanitarian organization with a goal to reduce poverty at the household level and to provide relief in emergencies.CIK has been operational in Kenya since 1968. It currently carries out major initiatives in Refugee and Emergency Operations, Health, Livelihoods, Water and Sanitation and in HIV/AIDS. It is one of the lead agencies under the United Nations High Commission for Refugees (UNHCR) and the World Food Programme (WFP), for water and hygiene, food distribution and basic education in Dagahaley camp, one of three such camps in Dadaab, along the Kenya-Somalia border.

It is of utmost importance for CIK to have constant communication with CARE International offices all over the globe. The most important mode of inter-office communication is emails over the internet. Internet is also used for Web Surfing and miscellaneous Business Applications. Hence, it was necessary to secure Internet usage in the organization.

We had Spam problems, threat from Malware, Bandwidth Maxing by users and users visiting unproductive and prohibited websites.

Mr. Patrick Maina
IT Manager
CARE International

Mr. Patrick Maina, IT Manager in CARE Kenya, was looking for a reliable Internet Security solution. Citing his concerns, he said,” We had Spam problems, threat from Malware, Bandwidth Maxing by users and users visiting unproductive and prohibited websites.” Their major business concerns were as follows:

Exposed Network Perimeter

CIK‘s security solutions were purchased only when required, and were not as effective against constantly evolving threat scenarios. Without a firm IT network boundary in place, they were concerned that their organization was vulnerable to external intrusion attempts such as backdoor activities, remote exploits, buffer overflows, brute force attacks, DoS attacks and more which would result in compromise of their organization‘s system integrity through corrupt internal files and applications, crashing of web & mail servers, valid data overwritten or exposure of confidential information.

Uncontrolled Malware and Spam

The organizations network was quite vulnerable to Malware attacks from viruses, worms, Trojans, etc. Malware ranged from relatively harmless ones that forced users to press some keyboard keys at regular intervals to vicious ones that corrupted files in the boot sector, reformatted the entire hard disk or even caused system crashes.

Employees at CIK were engulfed by torrents of Spam. The flow of Spam throughout the network ate away precious bandwidth affecting network speed and availability. Also, employees were compelled to manually clean their inboxes which was quite tedious and frustrating.

Unhealthy Web Surfing

Another pressing issue for Mr. Maina was the use of Internet by employees for nonbusiness related purposes like casual surfing, torrents, chatting, gaming, watching videos and uploading/downloading high bandwidth files. He found that such unrestricted web surfing took toll on bandwidth availability and was adding to the organization‘s ISP bills because of the huge volumes of data wasted in non-productive work. Moreover, they were losing plenty of man-hours that could have been channelized for business efforts. Hence, Mr. Maina desired an effective Content Filtering solution which would block all unauthorized surfing and downloading. All Phishing, Pharming and malicious content over the Internet also needed to be plugged.

Clogged Bandwidth

Unruly Web Surfing Practices, uploading/downloading of bandwidth intensive files and free movement of Spam throughout the network occupied most of the available bandwidth leaving a bare minimum for business-critical applications. Hence, an efficient Bandwidth Management system was required.

The Cyberoam Solution

CIK considered several security products including Cisco PIX and Surf Control. Finally, they gave the go-ahead to Cyberoam. They purchased Six (6) Cyberoam Appliances which are deployed as shown in the following table.

Location Cyberoam Model Deployment Mode
Nairobi (Head Office) CR 50i Bridge
Garissa CR 50i Bridge
Kisumu CR 50i Bridge
Dadaab CR 200i Bridge
Kisii CR 50i Gateway
Nyamira CR 50i Gateway

The business benefits are as follows:

  • Shielded Network Perimeter

    Cyberoam UTM shields the entire CIK Network from outside threats. It‘s ICSA and Checkmark - dual certified stateful and deep-packet inspection firewall segregates the LAN, and internal servers from unauthorized outside access.

    In addition, Mr. Maina also subscribed to Cyberoam‘s Intrusion Prevention System feature which acts as a second line of defense through 4000+ updated signatures against hackers, remote exploits, backdoor activity and other zero-hour attacks. Acting as an application firewall, it also supplements organizational efforts to curb data leakage through open proxies, instant messengers and P2P applications.

  • Clean Web and Mail Traffic

    Cyberoam‘s Gateway Anti-Virus & Anti-Spyware solution secures the CIK network by providing real-time protection against viruses, worms, Trojans, keyloggers, spyware and more on all web (HTTP, FTP) and mail (SMTP, POP, IMAP) traffic. According to Mr. Maina, “Since viruses are overpowered at the gateway itself, we are relieved that our network and critical information systems are much less likely to fall prey to virus attacks”.

    Cyberoam Gateway Anti-Spam, with a spam catch rate of 98%, checks all inbound and outbound mails for email spam, drastically reducing bandwidth consumption and the time employees wasted cleaning their inboxes of junk emails.

  • Enhanced Productivity

    Cyberoam‘s 82+ categories tough Web Content filtering technology optimized the use of CIK‘s internet resources. This feature makes sure that all P2P and Instant Messengers are blocked and that there is no breach of data. It blocks access to harmful websites, preventing malware, phishing, pharming attacks and undesirable content that could lead to legal liability and direct financial losses. This helps manage staff access to websites, minimizing lost time on the internet, and lowering operating costs.

  • To Conclude

    Mr. Maina said, “Cyberoam is a very useful tool. I have recommended Cyberoam to quite a number of my peers.”