Download PDF
CloudLock (Cisco) > Case Studies > Pandora Implements CloudLock to Protect its IP and Ensure Confidential Information Like PII is Secured
CloudLock (Cisco) Logo

Pandora Implements CloudLock to Protect its IP and Ensure Confidential Information Like PII is Secured

Technology Category
  • Cybersecurity & Privacy - Cloud Security
Applicable Functions
  • Business Operation
Use Cases
  • Cybersecurity
Services
  • Cloud Planning, Design & Implementation Services
  • Cybersecurity Services
The Challenge
Pandora, a leading internet radio company, has a highly mobile workforce that relies heavily on SaaS (Google Apps) and PaaS (Salesforce) for their daily operations. Google Drive is a crucial tool for Pandora's employees as it allows them to create, distribute, and update dynamic documents on active projects, and to share and collaborate both internally and externally. However, the security of Pandora’s shared documentation is a major concern. The company is keen on protecting its intellectual property and is concerned about data loss prevention. While employees rely on sharing documents to perform their jobs, the IT department is tasked with ensuring that sharing with external partners and vendors adheres to the company’s acceptable use policies and is done securely.
About The Customer
Pandora is the leading internet radio company with a single mission: to play only the music that people love. Pandora has been doing this since 2000 with the Music Genome Project®, the most comprehensive analysis of music ever undertaken. Today, more than 150 million people throughout the United States have registered to listen to free personalized radio stations on Pandora. The company has a very mobile workforce, and its employees rely on SaaS (Google Apps) and PaaS (Salesforce) every day to do their work.
The Solution
Pandora implemented CloudLock to identify critical information stored in Google Drive and protect its sensitive intellectual property. CloudLock’s Security Policy Engine allows IT to set content, context, and sharing based policies and put security monitoring on autopilot. It provides ongoing monitoring and alerting that detects, flags, and sends alerts once document sharing settings deviate from acceptable use policies or put sensitive data at risk of being exposed or lost. CloudLock also allows domain administrators and document owners to quickly and effectively verify the legitimacy of suspected exposures, remediate any incorrect sharing, and rely on ongoing monitoring to prevent any future exposures. Additionally, CloudLock Compliance Scan allows customers to find, classify, and secure Personally Identifiable Information such as Social Security numbers, credit card numbers, and any other pattern using RegEx searches.
Operational Impact
  • CloudLock provides ongoing monitoring and alerting that detects, flags, and sends alerts once document sharing settings deviate from acceptable use policies or put sensitive data at risk of being exposed or lost.
  • CloudLock allows domain administrators and document owners to quickly and effectively verify the legitimacy of suspected exposures, remediate any incorrect sharing, and rely on ongoing monitoring to prevent any future exposures.
  • CloudLock Compliance Scan allows customers to find, classify, and secure Personally Identifiable Information such as Social Security numbers, credit card numbers, and any other pattern using RegEx searches.

Related Case Studies.

Contact us

Let's talk!

* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from IoT ONE.
Submit

Thank you for your message!
We will contact you soon.