REAL Insurance Company Kenya, Africa
Cyberoam Tackles Internet Security Challenge for REAL Insurance Company
About REAL Insurance Company, BFSI

REAL Insurance Company (formerly known as Royal Insurance Company East Africa Ltd.) has been in the market since 1910 initially as a branch and later incorporated as a company in 1978. From this humble beginning the Company now has branches in the City Centre & Westlands – Nairobi, Mombasa, Malindi, Nakuru, Naivasha, Eldoret, Kitale, Kisumu, Thika, Nyeri, Meru and three subsidiary companies in the region, REAL Insurance Tanzania, REAL Insurance Malawi and REAL Insurance Mozambique. REAL Insurance Company Limited remains a global network partner of RSA (formerly known as Royal & Sun Alliance Insurance Group). With business expansions and adding to the array of new branches, REAL was looking for an Internet security solution that would safe-guard its corporate network in the head office.

Faced with increasing unproductive and harmful Internet surfing by staff, The REAL Insurance management team needed an Internet content security and control solution for its head office.

Mr. John K Mwaura
IT Manager
REAL Insurance Company

Faced with increasing unproductive and harmful Internet surfing by staff, The REAL Insurance management team tasked Mr. John K Mwaura, the IT Manager (Infrastructure) to begin a search for an Internet content security and control solution for its head office – Nairobi, Kenya.

Mr. Mwaura was looking for a single box solution that would offer:

Securing the Perimeter

REAL Insurance wanted to secure their servers by a strong firewall solution and access control management over all the WAN network resources.

Control Unproductive Surfing

The organisation needed to know who was accessing what sites and needed an identity based filter and reporting system that would include a users’ online behavioural audit. The solution would also be required to block harmful spyware/malware infested sites. It was also required to limit access to unproductive sites - such as Web-mail, HTTPS, news, online shopping and gaming – and block ‘phishing’ and ‘pharming’ sites which trick users into revealing confidential data.

Spam Menace

This was required to keep mails secure and in-boxes clean. Ideally it would be a ‘deploy-and-forget' solution that didn’t need to be ‘trained’ to identify spam mails. As by the time such solutions are trained, the spam pattern changes. This greatly reduces the effectiveness of such anti-spam offerings. In this light, the spam filtering was required to be totally automated and perform irrespective of the language and content of the mail with an absolute minimum amount of false positives - as no organisation can afford to lose a single business opportunity should a legitimate email being wrongly classified as spam.

Malware Menace

A perimeter level anti-virus solution was required that could protect the network, scan and clean any malware or spyware over Web mail and scan all Web traffic to ensure the contents’ sanctity. Moreover, all files transferred over the Internet would have to be scanned to ensure that they are malware-free.

Mr. Mwaura tried various security solutions, but found that they either demanded a steep, one-time capital expenditure or they were complex and difficult to deploy and maintain – creating costly operational overheads. The recurring expenditure of renewal was also costly in most instances.

The Cyberoam Solution

After experiencing a range of products, REAL Insurance decided to try Cyberoam UTM and contacted a local Cyberoam authorised reseller, Isolutions Associates.

Working with Cyberoam distributor, Coast Data Sytems Limited, integration specialists were able to demonstrate the ease with which Cyberoam was able to blend seamlessly into the corporate network infrastructure and resolve all problems. Cyberoam’s CR100i was deployed in the bridge mode in the company’s Nairobi based Head Office.

These appliances provide transparent security to the REAL Insurance head office. Encouraged by the performance of the Cyberoam UTM during POC, the company subscribed to the content filtering, anti-virus, anti-spam, and IPS features. Cyberoam has been integrated with Active Directory for internal authentication. This enables the organization to use the Identity-based security approach of Cyberoam to the maximum.

  • Productive Internet Usage

    Cyberoam's identity-based filtering enables the administrator to locally create a list of users and assign Web access rights to them as per their professional profile and designations. Cyberoam's content filtering database has more than 44 million sites neatly grouped into more than 82 categories.

    With IP Address and time as additional parameters, the administrator has granular controls and unparalleled flexibility. Spyware, phishing and pharming sites are blocked to ensure that no employee is duped into compromising his or her personal and professional information.

    P2P, unauthorised and illegal downloads are now out of bounds for all employees. Using a combination of identity, IP address, service and time schedules, the administrator can now create policies to allow controlled access to a few unproductive sites during stipulated time periods.

  • Malware Menace Mitigated

    Cyberoam's gateway anti-virus solution watches over the Web and mail traffic. All traffic, including HTTP, HTTPS and FTP and mail traffic over SMTP, IMAP and POP3, is scanned for malware and sanitised. All compressed files are decompressed and checked for any hidden malware. This level of all-round anti-virus security prevents virus, worms, spyware, Trojan and other malware outbreaks and translates into fewer housekeeping calls to company’s IT department.

  • No Spam

    Cyberoam's gateway anti-spam solution now checks all inbound and outbound mails for spam. According to the initial requirement, it is truly a 'deploy and forget’ solution. With a spam detection rate of 98% and a false positive rate as low as one false positive per 100,000 mails, Cyberoam's spam filter ensures that the company’s in-boxes are spam-free and no mail-based business opportunities are lost.

    All this efficiency is achieved by the solution's inherent adaptive intelligence. Irrespective of the language and the content of the mail, spam is detected and action taken.

    The anti-spam solution also has a unique feature - Virus Outbreak Detection (VOD). Using this feature, Cyberoam detects and blocks any zero day attack and vulnerability exploits.

    After installing the Cyberoam solution the number of spam attacks dropped to almost nil and the inboxes were clean and spam free. This situation is also reflected in the saved bandwidth.

  • On-Appliance Auditing

    On-appliance comprehensive reporting is one of Cyberoam's most significant features. Reports include ‘Internet bandwidth usage’, ‘top accessed sites’ as well as Google search reports, which enhance the visibility of users’ online behaviour.

    The ‘traffic discovery’ feature helps the administrator identify the amount of bandwidth used by various applications in almost real-time. This also helps separate the ‘bandwidth grabber’ applications from business critical applications.

  • Conclusion

    "Cyberoam's content security is comprehensive. It not only boosts connectivity and productivity, but it also prevents significant Internet bandwidth wastage,” says Mr. Mwaura. “It’s a simple solution that seamlessly integrates into the corporate network and is designed to ensure the company’s security and productivity well into the future,” he added.