Century Group, Nigeria, Africa
Cyberoam UTM – A Medley of Internet Security and Remote Access Solutions for the Century Group
About Century Group, Conglomerate

Century Group (CG) is a global industrial group operating in the energy and non-energy sectors through seven main subsidiaries. They provide top-of-the-range equipment and support services to local and international operators in Nigeria, the West African sub-region and across the African continent. In the energy sector, they have proven expertise in operations and maintenance of offshore production and storage facilities, as well as logistics and procurement. They are the largest operator of Floating, Production, Storage and Offloading (FPSO) vessels in Nigeria.

Internet acts as a backbone for countries like CG, as they operate in different sectors. Hence, for communicating, research, administrative purposes and general surfing Internet is necessary for them.

Internet is very much important for our day to day communications and data transmission.

Mr. Oche Ankeli
IT Coordinator
Century Group

Mr. Oche Ankeli, the IT Coordinator at CG said, “Internet is very much important for our day to day communications and data transmission. Hence, secure and continuous connectivity was our vital necessity”.

Unproductive Internet Surfing

Oche felt that the valuable resource, Internet, was not utilized productively. He often noticed that employees made themselves busy in non- work related tasks like uploading/downloading music, videos, chatting, accessing social networking sites, playing games or aimless surfing. This affected productivity and bandwidth immensely. Also, sometimes the unaware clicks on malicious links op ened the network for malwares, leading to unnecessary hassles.

Unreliable Data Transmission between Offices

Oche said, “It was very difficult for us to connect our head office and branch offices with each other. As a result, the resources installed at the head office could not be accessed easily. Moreover, often our inter-office communications were exclusively dependent on telephone calls which were very expensive. Hence, we faced many hitches that held back our business benefits.”

The Cyberoam Solution

CG searched the market for a rock-solid threat protection solution that could provide them complete security and that too within their budget. Having a demo of Cyberoam, they found it to be perfect and purchased Three (3) appliances, One (1) CR100iNG at Lagos (Head Office), One (1) CR25iNG at Port Harcourt GRA (Branch Office) and One (1) CR25iNG at Port Harcourt Kidney Island (Branch Office). All the appliances are deployed in Gateway Mode.

The positive business outcomes that CG noticed are:

  • Firewall – Defending the Network Perimeter

    Cyberoam’s Firewall is Checkmark Level 5 and ICSA Certified. It protects the organization from DoS, IP Spoofing and other network attacks by providing stateful and deep packet inspection for security based on network. It also provides a Fusion technology that enables administrators to create policies for multiple features through a single interface. Case Study Internet is very much important for our day to day communications and data transmission. Mr. Oche Ankeli IT Coordinator Century Group Cyberoam’s ICSA and Checkmark certified Firewall provides granular access and controls over

  • Safe and Productive Internet Surfing

    Cyberoam’s Web Filtering solution, with a comprehensive database of 82+ categories helped CG to block the unproductive and harmful websites, so that no one can access them. Thus, it safeguards the employees from harmful content like porn and violence. Cyberoam’s Application Filtering blocks all malware-laden sites, P2P, IMs, illegal audio, video, streaming media and other bandwidth-intensive download. Moreover, Cyberoam with its identity-based filtering, allows the administrator to create schedules and assign Internet access policies to individual user based on a certain criteria. In addition, HTTPS scanning controls unauthorized secure access, preventing unauthorized download, upload and data leakage. As a result, this helped CG in increased productivity and security of network from malwares.

    Oche said, “With the help of Cyberoam, we have achieved a remarkable increase in productivity”.

  • Identity Based Security

    Cyberoam’s identity-based solution enables Oche to know what is going on in the network. He said, “We used Cyberoam’s Active Directory facility to bring everyone under his supervision”. This helps him lot in creating policies for controlling the activities of the users on the basis of identity rather than IP Addresses which were difficult to remember. Thus, it helps him to keep an eye on the traffic, going in and out of the network.

    Oche said, “Cyberoam’s identity-based security is one the best features which helps us to control all our users effortlessly”.

  • Reliable Data Transmission between Offices

    Cyberoam’s VPN connects the head office, remote user, and the branch offices with each other in such a way that no raider can fiddle with the data by any means. The resources at the head office are now easily and securely accessible. Also, its Threat-free Tunnelling Technology ensures that no malware slips into the network. Moreover, its VPN connection failover feature offers continuous connectivity for IPSec and L2TP connections across multiple ISP gateways, automatically after the connection gets blocked.

    Oche said, “Cyberoam has reduced our telephone bills to a great extent and increased network scalability”.

  • To Conclude

    Oche said, “Cyberoam is a UTM born out of divine inspiration. It comes packaged with a medley of standard security features loaded onto a single appliance.”