Fidelity Bank Ghana Limited, Ghana, Africa
Cyberoam Continues to Secure Fidelity Bank Ghana even with Growing Business and Increasing Staff Numbers
About Fidelity Bank Ghana Limited, BFSI

Fidelity Bank Ghana Limited (FBGL) was incorporated on the 28th of June, 2006. It was the 22nd bank to be licensed by the Bank of Ghana. It is one of Ghana’s premier banking and financial institutions serving individual consumers, small and middle market businesses and large corporations. They provide full range of banking, investing, asset management and other financial and risk-management products and services.

Since, the Internet is one of the most important resources for a bank, they require it for maintaining their website, online transactions, net banking and other administrative activities.

Cyberoam has been stable enough and has solved most of our problems.

Mr. Roger Oteng Baah
Network Operations Manager
Fidelity Bank Ghana Limited

Mr. Roger Oteng Baah, the Network Operations Manager at FBGL said, “Internet being one of the most vital factors for us, its uninterrupted connectivity and security is essential”.

The security issues they faced were:

Scalability Issues

Mr. Baah mentioned, “We previously used CR200i and CR300i for securing our network. But since, the bank was growing and expanding day by day it had become necessary for us to get a higher end solution that could handle the increasing man-power.”

Difficult to Manage Increasing Number of Users

Mr. Baah stated, “With the growing number of users in the bank, the network would become more vulnerable as there would be more number of entry points for threats. Also, the larger an organization is, the more careful it has to be in screening all outgoing and incoming Internet traffic. Hence, we needed a solution that could manage the increasing lot.”

The Cyberoam Solution

To deal with the above challenges, FBGL wished to get a higher end appliance for their bank. Hence, they purchased Two (2) CR1000ia at their Data Centre (Head Office). They deployed them in Gateway Mode.

The positive outcomes noticed after deploying Cyberoam in their network are:

  • Scalability Issues Resolved

    Mr. Baah stated, “After deploying higher end appliances of Cyberoam in our network, we are now able to manage the increased number of employees smoothly.”

  • Easy Management of Increasing Users

    Cyberoam UTM with a unique identity-based security solution protects against insider threats by giving absolute visibility into “Who is doing What” in the network. This feature greatly helps Mr. Baah to create policies for controlling the act ivities based on identity of the users rather than IP Addresses. Thus it helps him to know what is going on in the network and efficiently manage the increasing number of users.

  • Firewall – A Wall Securing the Network Periphery

    Cyberoam’s Firewall is Checkmark Level 5 and ICSA Certified. It provides stateful and deep packet inspection for network based security, thereby protecting the organization from DoS, IP Spoofing and other network attacks.

    Mr. Baah said, “Cyberoam has made us tension-free, preventing from all sorts of network attacks”.

  • Safe Surfing Practice

    Cyberoam’s Web Filtering solution provides a database of 89+ categories with the help of which Mr. Baah can prevent the employees from accessing unproductive and harmful websites. Cyberoam’s Application Filtering blocks all P2P, IMs, illegal audio, video, streaming media and other bandwidth-intensive download. Moreover, Cyberoam with its identity-based filtering, allows the administrator to create schedules and assign the Internet access policies to individual users based on a certain criteria.

    Mr. Baah said, “With the default policies, Cyberoam’s Web and Application Filtering, has enabled us to filter the unwanted contents of websites, leading to increase in productivity”.

  • Efficient Monitoring of Internet Activities

    Cyberoam’s On-Appliance Reporting feature enables the organization to know the activities going on across the network. It includes features like Traffic Discovery, Internet Bandwidth Usage Monitors, Top Accessed Categories and Google Search Reports, which enhance the visibility of a user’s online behaviour. Additionally, this feature comes absolutely free without any extra cost. Having 1000+ granular reports at their service, the organization can keep a track of each employee to know the surfing trend. Hence, based on the tendency, the organization can also twist the policies to stop the surfing habits of the employees.

    Mr. Baah said, “Cyberoam’s Reporting feature has helped us to get a clear picture of the Internet activities going on in the network and taking actions accordingly”.

  • Secured and Cost-Effective Inter-Office Connection

    Cyberoam’s VPN bridges the geographical distances between the head office, remote user, and the branch offices. It ensures secure connectivity in such a way that no one can fiddle with the data by any means. Thus, the DMZ servers can be accessed easily now. Moreover, its VPN connection failover feature offers continuous connectivity for IPSec connections across multiple ISP gateways.

    Mr. Baah said, “Cyberoam’s IPSec and SSL VPN have enabled us to access the remote resources easily, securely and cost-effectively

  • To Conclude

    Mr. Baah mentioned, “Cyberoam has been stable enough and has solved most of our problems.”