Case Studies
March 25, 2025

Zappi Secures Google Workspace and Beyond with Metomic

Learn how Zappi leveraged Metomic to gain crucial visibility into Google Workspace. Discover how Metomic's features helped them classify sensitive information, identify risks, and improve their data security posture, ultimately leading to quicker responses to potential data leaks and significant ROI.

Download
Download

Meet Hatitye Chindove, the Head of Information Security and Data Compliance at Zappi, a company embracing a cloud-first approach for its operations.  

Hatitye is responsible for ensuring the robustness of Zappi's Information Security Management system. Faced with the challenge of understanding and protecting the sensitive data scattered across their various SaaS applications, such as Google Workspace, Zappi sought a solution that could provide comprehensive visibility and classification. This led them to Metomic, a platform that proved to be a strong fit for their cloud-centric environment.

🎥Watch: How Zappi implemented quicker responses to possible data leaks

What was the problem you were looking to fix?

‘The major thing was understanding where our data is in our applications. My belief really is that you can’t protect what you don’t know. So the approach we took was to say ‘is there a way that we can discover our sensitive data, see where it is, and classify it?’ What Metomic had was a good solution to that. 

‘What we had, as a problem, from our side, was that we are a cloud-first company. So most of our solutions are SaaS-based, cloud-based, and Metomic was a good fit for that.’

What do you find most helpful about Metomic? 

‘For most things we requested as features, they executed quite quickly. It was quite good to influence what comes out. 

‘It’s easy to use, it’s simple to navigate. And it has opportunities to help us extend what we may want to get out of it.

‘It’s quite nice that you can have the notifications go directly to the person via Slack for them to action their own issues raised vs the security team reaching out to a person saying, ‘You have an issue’. Unfortunately, if you’re in the field of Information Security or you’re in the legal remit, when you knock on the door, people don’t usually think it’s a good knock on the door.’

Why would you recommend Metomic to another security expert? 

‘The major one is onboarding - time to value is short. If you’ve worked quite closely with a CFO, within three months, if you can at least start appreciating value quickly, then you’re able to show that this was a good investment.

‘The second thing was extendability as the integrations are coming in with a SaaS or cloud-first approach, that’s good.

‘The last one is the design of it. With Metomic’s design principles, which were more privacy by design, you sleep well at night, from my side, knowing that if Metomic suffers a data breach, they wouldn’t get my data because Metomic isn’t saving the data on their side, they’re saving references of it. That is a very good design practice.  

‘In reality, if you’re in an ecosystem that does inspection of contents, to be trusting another organisation in this current climate where you have suppliers being compromised left, right and centre, it’s quite hard to say you’ve taken a gamble on a company that is housing most of this data for you. 

‘So that principle of privacy and security by design - or saving only what Metomic needs to save to do the job that they need to do - just gives you that confidence. You’re going to suffer a data breach at some point if you haven’t already. And if it does happen the other way [where Metomic were to suffer one], you won’t come out on the headlines saying: ‘we suffered a data breach because our supplier got compromised.’ 

Have you got any tangible results from Metomic that you could share? 

‘We have quicker responses to possible data leaks that we find through Google Workspace, for example, with document shares. 

‘It’s also given us the classification and visibility over risk items. Immediately, especially for the Google Workspace document sharing, Metomic has paid for itself seven-fold. 

‘The major one for my team was talking to our finance folks, and telling them, ‘Hey, did you know all of these financial documents are currently outside?’ We figured out something went wrong with the off-boarding which liberated these documents. It allowed us to put better safeguards in place.’

🔒Protect Sensitive Data in Google Workspace: Request a Metomic Demo Today

When you integrate your SaaS applications with Metomic, you’ll have access to out of the box classifiers that detect sensitive data such as credit card numbers, bank account numbers, email addresses, and more.

You’ll also have the option to create your own custom classifiers to protect sensitive data that matters to your organisation.

To find out more about how Metomic can secure your Google Workspace and other SaaS apps, request a demo with one of our security experts today.

Meet Hatitye Chindove, the Head of Information Security and Data Compliance at Zappi, a company embracing a cloud-first approach for its operations.  

Hatitye is responsible for ensuring the robustness of Zappi's Information Security Management system. Faced with the challenge of understanding and protecting the sensitive data scattered across their various SaaS applications, such as Google Workspace, Zappi sought a solution that could provide comprehensive visibility and classification. This led them to Metomic, a platform that proved to be a strong fit for their cloud-centric environment.

🎥Watch: How Zappi implemented quicker responses to possible data leaks

What was the problem you were looking to fix?

‘The major thing was understanding where our data is in our applications. My belief really is that you can’t protect what you don’t know. So the approach we took was to say ‘is there a way that we can discover our sensitive data, see where it is, and classify it?’ What Metomic had was a good solution to that. 

‘What we had, as a problem, from our side, was that we are a cloud-first company. So most of our solutions are SaaS-based, cloud-based, and Metomic was a good fit for that.’

What do you find most helpful about Metomic? 

‘For most things we requested as features, they executed quite quickly. It was quite good to influence what comes out. 

‘It’s easy to use, it’s simple to navigate. And it has opportunities to help us extend what we may want to get out of it.

‘It’s quite nice that you can have the notifications go directly to the person via Slack for them to action their own issues raised vs the security team reaching out to a person saying, ‘You have an issue’. Unfortunately, if you’re in the field of Information Security or you’re in the legal remit, when you knock on the door, people don’t usually think it’s a good knock on the door.’

Why would you recommend Metomic to another security expert? 

‘The major one is onboarding - time to value is short. If you’ve worked quite closely with a CFO, within three months, if you can at least start appreciating value quickly, then you’re able to show that this was a good investment.

‘The second thing was extendability as the integrations are coming in with a SaaS or cloud-first approach, that’s good.

‘The last one is the design of it. With Metomic’s design principles, which were more privacy by design, you sleep well at night, from my side, knowing that if Metomic suffers a data breach, they wouldn’t get my data because Metomic isn’t saving the data on their side, they’re saving references of it. That is a very good design practice.  

‘In reality, if you’re in an ecosystem that does inspection of contents, to be trusting another organisation in this current climate where you have suppliers being compromised left, right and centre, it’s quite hard to say you’ve taken a gamble on a company that is housing most of this data for you. 

‘So that principle of privacy and security by design - or saving only what Metomic needs to save to do the job that they need to do - just gives you that confidence. You’re going to suffer a data breach at some point if you haven’t already. And if it does happen the other way [where Metomic were to suffer one], you won’t come out on the headlines saying: ‘we suffered a data breach because our supplier got compromised.’ 

Have you got any tangible results from Metomic that you could share? 

‘We have quicker responses to possible data leaks that we find through Google Workspace, for example, with document shares. 

‘It’s also given us the classification and visibility over risk items. Immediately, especially for the Google Workspace document sharing, Metomic has paid for itself seven-fold. 

‘The major one for my team was talking to our finance folks, and telling them, ‘Hey, did you know all of these financial documents are currently outside?’ We figured out something went wrong with the off-boarding which liberated these documents. It allowed us to put better safeguards in place.’

🔒Protect Sensitive Data in Google Workspace: Request a Metomic Demo Today

When you integrate your SaaS applications with Metomic, you’ll have access to out of the box classifiers that detect sensitive data such as credit card numbers, bank account numbers, email addresses, and more.

You’ll also have the option to create your own custom classifiers to protect sensitive data that matters to your organisation.

To find out more about how Metomic can secure your Google Workspace and other SaaS apps, request a demo with one of our security experts today.

Meet Hatitye Chindove, the Head of Information Security and Data Compliance at Zappi, a company embracing a cloud-first approach for its operations.  

Hatitye is responsible for ensuring the robustness of Zappi's Information Security Management system. Faced with the challenge of understanding and protecting the sensitive data scattered across their various SaaS applications, such as Google Workspace, Zappi sought a solution that could provide comprehensive visibility and classification. This led them to Metomic, a platform that proved to be a strong fit for their cloud-centric environment.

🎥Watch: How Zappi implemented quicker responses to possible data leaks

What was the problem you were looking to fix?

‘The major thing was understanding where our data is in our applications. My belief really is that you can’t protect what you don’t know. So the approach we took was to say ‘is there a way that we can discover our sensitive data, see where it is, and classify it?’ What Metomic had was a good solution to that. 

‘What we had, as a problem, from our side, was that we are a cloud-first company. So most of our solutions are SaaS-based, cloud-based, and Metomic was a good fit for that.’

What do you find most helpful about Metomic? 

‘For most things we requested as features, they executed quite quickly. It was quite good to influence what comes out. 

‘It’s easy to use, it’s simple to navigate. And it has opportunities to help us extend what we may want to get out of it.

‘It’s quite nice that you can have the notifications go directly to the person via Slack for them to action their own issues raised vs the security team reaching out to a person saying, ‘You have an issue’. Unfortunately, if you’re in the field of Information Security or you’re in the legal remit, when you knock on the door, people don’t usually think it’s a good knock on the door.’

Why would you recommend Metomic to another security expert? 

‘The major one is onboarding - time to value is short. If you’ve worked quite closely with a CFO, within three months, if you can at least start appreciating value quickly, then you’re able to show that this was a good investment.

‘The second thing was extendability as the integrations are coming in with a SaaS or cloud-first approach, that’s good.

‘The last one is the design of it. With Metomic’s design principles, which were more privacy by design, you sleep well at night, from my side, knowing that if Metomic suffers a data breach, they wouldn’t get my data because Metomic isn’t saving the data on their side, they’re saving references of it. That is a very good design practice.  

‘In reality, if you’re in an ecosystem that does inspection of contents, to be trusting another organisation in this current climate where you have suppliers being compromised left, right and centre, it’s quite hard to say you’ve taken a gamble on a company that is housing most of this data for you. 

‘So that principle of privacy and security by design - or saving only what Metomic needs to save to do the job that they need to do - just gives you that confidence. You’re going to suffer a data breach at some point if you haven’t already. And if it does happen the other way [where Metomic were to suffer one], you won’t come out on the headlines saying: ‘we suffered a data breach because our supplier got compromised.’ 

Have you got any tangible results from Metomic that you could share? 

‘We have quicker responses to possible data leaks that we find through Google Workspace, for example, with document shares. 

‘It’s also given us the classification and visibility over risk items. Immediately, especially for the Google Workspace document sharing, Metomic has paid for itself seven-fold. 

‘The major one for my team was talking to our finance folks, and telling them, ‘Hey, did you know all of these financial documents are currently outside?’ We figured out something went wrong with the off-boarding which liberated these documents. It allowed us to put better safeguards in place.’

🔒Protect Sensitive Data in Google Workspace: Request a Metomic Demo Today

When you integrate your SaaS applications with Metomic, you’ll have access to out of the box classifiers that detect sensitive data such as credit card numbers, bank account numbers, email addresses, and more.

You’ll also have the option to create your own custom classifiers to protect sensitive data that matters to your organisation.

To find out more about how Metomic can secure your Google Workspace and other SaaS apps, request a demo with one of our security experts today.