Through its technology partner
Ondú Cloud, Corporación Celeste discovered the Palo Alto Networks data security
platform. Although the company evaluated different CASB and DLP offerings, Palo Alto Networks
SaaS Security and
Enterprise DLP—operating in an integrated way—were the solutions chosen to secure all their SaaS applications and
deliver data protection.
One factor was decisive in the selection. Other solutions in the category depended on additional components like the
installation of host agents on the computers, responsible for protecting the accesses that occur from those devices. “We
didn’t need that. Palo Alto Networks provides the solutions that align with our vision: to protect SaaS applications and
data at all times, regardless of the type of equipment that the user uses—smartphone, personal or company computer,
tablet—or if they connect through a public or private network,” says Guido Hernández Gómez, head of information
security at Corporación Celeste.
In terms of deployment ease and speed, the implementation of the solutions also met the expectations of the
organization. With the support of
Ondú Cloud and Palo Alto Networks, the process began in December 2020, and shortly
after, Corporación Celeste was already taking advantage of its new SaaS protection scheme.
From a data security perspective, the company now had a complete and deep view of everything that was happening
on its SaaS environments and users’ connections, protecting company data across any vector throughout their cloud
journey: authorized SaaS or unsanctioned Shadow IT applications, personal or corporate devices (laptops, tablets, smart
phones, etc.), private or public network connections, etc. On the other hand, with the enterprise-grade capabilities of
Palo Alto Networks Enterprise DLP, Corporación Celeste reduced the risk of suffering any leaks of sensitive data like
personally identifiable information and intellectual property, etc. Since the solution provided more advanced capabilities
to monitor the use and transfers of Celeste’s information, security measures can be taken when suspicious movements
are flagged, or violations of corporate security policies occur.