Ultimate Security Tanzania, East Africa
Cyberoam UTM – An Absolute Safety Solution for Ultimate Security
About Ultimate Security, Security

Established in 1979, Ultimate Security is one of the oldest and professional radio alarm security companies in East Africa, operating in Kenya, Tanzania, and Uganda. It offers a wide range of security services, including the traditional static guard or "askari", through any level of sophisticated modern electronic alarm system.

The organization being into security industry uses Internet for running mail servers, web servers and research work.

We used a network security solution to safeguard the network from viruses, to restrict inappropriate Internet usage and optimize bandwidth. Our solution was not up to the mark.

Mr. Priyesh Singh
Technical Incharge
Ultimate Security

“We used a network security solution to safeguard the network from viruses, to restrict inappropriate Internet usage and optimize bandwidth. Inspite of that we faced a lot of malware, security and connectivity issues”, Mr. Priyesh Singh, the Technical Incharge of US informed. “Our solution was not up to the mark”, he further added.

US faced network security issues related to:

Uninhibited Internet Usage

Ultimate Security faced a bandwidth issue because the available bandwidth was not being used efficiently. Like many other organizations, employees spent a significant amount of their time in unproductive surfing due to which often legitimate applications were devoid of Internet bandwidth. Hence the company wanted to prevent the users from accessing such unproductive, harmful and malware-laden websites which distract the employees and open up the network for various attacks.

Business Continuity Issues

One of the major requirements of Mr. Singh was uninterrupted connectivity between the head office and the branch offices. They used WIA, Raha and Vodacom links to connect all the offices. But lest the link failed, the offices got disconnected and as a result the business suffered. Mr. Singh said, “If Internet was down all our business activities would come to a standstill”.

The Cyberoam Solution

Mr. Singh searched the market for best-fit network security solution and after having considered products like Instagate and Cisco ASA, he finally found Cyberoam to be best and purchased nine Cyberoam UTM appliances after recommendations from CSS (Computer Sales & Service), a partner to Cyberoam. All the appliances are deployed in Gateway Mode. The models and locations of the appliances are given below.

Appliance Details Location Office Identity
CR50ia Shivacom Group Head Office
CR 50ia Incar TZ Ltd Branch Office
CR 50ia Ultimate Security Branch Office
CR 50ia Estia Real Estate Branch Office
CR 25i Ultimate Control Room Branch Office
CR 25i MD's Residence Branch Office
CR 25i Ultimate Branch Arusha Branch Office
CR 25i Ultimate Branch Zanzibar Branch Office
CR 25i Shivacom Branch Office

The business benefits are:

  • Secured Network Fringe

    Cyberoam’s Firewall provides stateful and deep packet inspection for network based security thereby protecting the organization from DoS attacks and IP Spoofing attacks. It also provides a Fusion technology that enables to create policies for multiple features through a single interface. This simplified the administration of multiple appliances.

    With a database of 4000+ IPS signatures Cyberoam’s Intrusion Prevention System (IPS) automatically detects, blocks and drops the suspicious web traffic ensuring network security. It also provides signature updating facility that updates the signatures regularly and provides zero-hour protection against latest attacks.

    Mr. Singh said, “I am now assured that no external resources or threats can march into the network through Cyberoam”.

  • Regulated Internet Usage

    In order to control the surfing behaviour of employees Mr. Singh configured Cyberoam’s Web Filtering feature with customized policies which restricted them on the basis of their designations. This can be done through Cyberoam’s constantly updated database consisting of millions of URLs divided into 82+ categories, thus helping US to allow only those websites that are productive. In addition, HTTPS scanning controls unauthorized secure access, thereby preventing data leakage.

  • Optimized Bandwidth

    Cyberoam’s Bandwidth Management solution solves the earlier issues of US with bandwidth scarcity for business-critical applications by prioritizing them based on a certain criteria. It offers identity-based bandwidth controls, preventing blockage and optimizing bandwidth.

    Mr. Singh said, “Based on identity now everyone gets their own share of bandwidth. Hence bandwidth is wisely managed”.

  • Business Continuity Revived

    Cyberoam UTM provides total business continuity through Automatic Link Failover. Its Automatic Link Failover feature automatically detects the failed link and directs all the traffic through another working link, keeping the network “Always on”. Mr. Singh said, “In our organization multiple ISP links are load balanced to ensure constant connectivity with weights assigned as 1”. He further added, “Multi Link Management is one of the award winning features for Cyberoam”.

  • To Conclude

    Mr. Singh said, “Cyberoam has many award winning features and we are very much satisfied with what it has given to us. I would strongly recommend it to all who are in search of a good security solution”.