January 20, 2021 | Reading time 7 minutes

Cider Chooses SpinOne to Bridge SaaS Security Gaps


Cider is a software development company founded in 2015 and is based in San Francisco, California. Cider’s web developers, project managers, and consultants assist their clients by creating websites and mobile apps along with software and Salesforce integration. Cider provides not only full-project teams but also individual resources to satisfy their diverse customer base. The company is also a part of the Forbes Business Council. As a Google Workspace organization, they regularly use Google Drive to store and access critical business data.


Cider assists thousands of customers, and their founder Ilya Lipovich needed to find a solution that can provide an additional layer of security for all their Google Workspace data. Their organization utilizes a variety of third-party applications to aid their everyday operations. They required a security solution to monitor these applications and perform automated risk assessments to ensure their organization’s data was safe and secure.

Since Cider developers and designers work with many customers outside of their organization, Cider also required a tool to monitor data sharing to prevent sharing of data outside of the company to 3rd-party users. With ransomware attacks being 73% successful in 2020, ransomware protection was also one of their top priorities to reduce downtime and recovery costs in case of Ransomware and prepare the company for a new wave of zero-day attacks.

SaaS Security & Data Protection Needs

  • Application Risk Assessment
  • SaaS Application Access Management
  • 24/7 Ransomware Monitoring
  • Monitor SaaS Data Sharing


With Cider’s needs in mind, Ilya Lipovich decided to browse the market for a security solution to provide third-party app monitoring,  ransomware protection, and shared items control. After reviewing multiple solutions in the Google Workspace Marketplace, he chose to sign up with Spin Technology.

The 24/7 automated ransomware protection was exactly what he was searching for and gave him peace of mind that his organization was protected. The OAuth Application and Chrome Extension Risk Assessment provided him the tools to monitor applications that were installed within their organization and have the ability to manage access to any risky applications.

Lastly, SpinOne’s Security Policies granted Ilya the ability to create data-sharing management policies to revoke sharing to certain domains and/or users outside of his organization. Cider found a solution that met their company’s security and compliance requirements while being able to monitor their domain for external data sharing and apps usage.  Spin’s great reviews, pricing, and security benefits made Ilya’s decision easier, knowing he would receive the best Google Workspace data security and management solution in the market.

Was this helpful?

Thanks for your feedback!
Avatar photo

Chief Marketing Officer

Courtney Ostermann is the Chief Marketing Officer at Spin.AI responsible for the global marketing program focused on driving brand awareness and revenue growth. Previously, Courtney served as the Vice President of Corporate and Demand Marketing at PerimeterX, where she helped accelerate revenue and supported its acquisition by HUMAN Security. She was also the Vice President of Corporate Marketing at PagerDuty, where she assisted with the company’s IPO, and has held marketing leadership roles at organizations such as Imperva, BMC Software, Oracle, and Saba Software. Courtney resides in the Bay Area and is a graduate of Colgate University.


How Can You Maximize SaaS Security Benefits?

Let's get started with a live demo

Latest blog posts

Understanding What is Ransomware Attack A Brief Guide

Understanding What is Ransomware Attack: A Brief Guide

The number of ransomware attacks has been growing steadily for the past years. So have the ransom payments. Experts predict […]

unraveling the risk of shadow it Unraveling the Risk of Shadow IT

Unraveling the Risk of Shadow IT

While our workplaces become increasingly reliant on third-party applications, how do organizations balance security and usability? Our Director of Product […]

Effective Steps to Take During a Cloud Ransomware Attack Effective Steps to Take During a Cloud Ransomware Attack

Effective Steps to Take During a Cloud Ransomware Attack

In 2023 alone, 72% of companies were affected by ransomware, a significant increase compared to 55% in 2018. Unless your […]