eofolarin.com
Emmanuel Folarin

IT Infrastructure & Security Consultant

Web Solutions Architect

Tech Entrepreneur

  • About
  • Works
  • Services
  • Resume
  • Skills
  • Blog
  • Contact
Emmanuel Folarin

IT Infrastructure & Security Consultant

Web Solutions Architect

Tech Entrepreneur

Download CV

Recent Posts

  • The Heathrow Airport Cyberattack
  • How IT Can Enforce OneDrive Backup with Intune
  • When Small Businesses Try Every New Tech Tool
  • Introducing Eschecker 0.1
  • Nigeria’s Data Protection Act 2023: Progress or Paper Tiger?

Recent Comments

  1. Emmanuel Folarin on How IT Can Enforce OneDrive Backup with Intune
  2. Arabella3600 on Why You Keep Getting Spam and Phishing Emails in Microsoft 365
  3. Anna_Mosley on How IT Can Enforce OneDrive Backup with Intune
  4. Bright on How IT Can Enforce OneDrive Backup with Intune

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025

Categories

  • Articles
  • Business Insight

Deployment of Cyberoam Unified Threat Management (UTM) – Eterna Plc

  • Created By: Emmanuel
  • Date: 21/02/2014
  • Client: Eterna Plc
  • Categories: Project

In 2014, as part of Eterna Plc’s security upgrade initiative, I led the deployment of Cyberoam NG200 Series Unified Threat Management (UTM) appliances across the organization’s head office and key branches. The objective was to establish centralized perimeter security, protect against internal and external threats, and gain full visibility and control over network activities.

The Cyberoam UTM provided comprehensive firewall, VPN, intrusion prevention, web filtering, and application control in a single device, aligning with Eterna’s security policy and compliance goals.


Key Features Deployed

  • Next-Gen Firewall (NGFW): Layer 7 application-aware firewall with user-based policies

  • Intrusion Prevention System (IPS): Predefined and custom signatures for blocking malicious behavior

  • Web Filtering: Blocked access to unauthorized and high-risk categories

  • Bandwidth Management: Prioritized business-critical apps and throttled non-essential usage

  • Site-to-Site VPN: Encrypted tunnels between HQ and branch offices

  • Failover & Load Balancing: WAN redundancy setup for internet link stability

  • User Authentication: Integrated with Active Directory for identity-based access control

  • Application Control & Monitoring: Monitored user behavior, blocked P2P and unauthorized apps

  • Real-Time Logging & Reporting: Enabled alerts, logs, and weekly activity reports for compliance and auditing


My Contributions

As the Lead UTM Implementation Engineer, I:

  • Conducted infrastructure assessment and planned UTM appliance placement

  • Installed and configured Cyberoam NG200 appliances at head office

  • Created site-to-site VPN links for secure connectivity with branches

  • Defined and enforced content filtering, application control, and IPS policies

  • Integrated UTM with Active Directory for user-based traffic control

  • Produced full configuration documentation and backup strategy

  • Trained the IT team on daily operations, policy tuning, and log monitoring

  • Provided post-deployment support and firmware upgrade path


Impact & Results

  • Established centralized security control across all offices

  • Reduced malware incidents, phishing attempts, and unauthorized access

  • Improved internet usage visibility and productivity control

  • Enhanced compliance posture with user-level logging and policy enforcement

  • Built a strong foundation for future cloud and hybrid infrastructure security

Tags: Infrastructure Solutions Security
Share:

Prev
Next

© 2025 Emmanuel O. Folarin | Proudly Powered by eofolarin.com