Procter and Gamble Collaborates in the Cloud with Box.net

Procter and Gamble Collaborates in the Cloud with Box

Box has deployed its cloud content management solution to 18,000 globally distributed P&G employees. Box has signed Procter and Gamble as a customer to this end and anticipates increased adoption over the next three years.

P&G’s deployment marks a major turning point for Box and, more broadly, cloud adoption in the enterprise,” said Aaron Levie, co-founder and CEO of Box. “Cloud services like Box are no longer merely filling the gaps between outdated systems or providing a workaround for frustrated users; they’re transforming the way entire organizations manage information and collaboration securely and at scale.”


We’ve worked with Box on a smaller scale for a few years now, and over that time we’ve watched the Box platform mature into a powerful content management solution, while still maintaining a focus on end user experience and simplicity,” said Eleodor Sotropa, associate director, GBS Employee Services and Solutions. “With this next stage of adoption, Box will help transform the way our global employees share and access content across devices and drive collaboration in the cloud.”

The deployment represents the largest enterprise deal to date for Box, which earlier powered internal and external content sharing and collaboration for a few P&G divisions.

The latest agreement between the two organizations delivers several benefits to P&G including making it easy for employees to share content and collaborate across some of P&G’s offices. P&G will also be able to offer content access and sharing from any device with mobile applications for iPhone, iPad, and BlackBerry.

Also, it will be able to provide IT with an easy-to-use administrative interface for reporting and managing corporate content on Box.

Box.net was recently included in Gartner’s 2011 Report, “Cool Vendors in Content Management.”

The Box Apps Marketplace includes integrations with cloud solutions like Salesforce, Google Apps, NetSuite and Jive. The company notes that this integration makes Box content accessible across business applications.

By Anuradha Shukla

Sorry, comments are closed for this post.

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

The Future Of Cloud Storage And Sharing…

The Future Of Cloud Storage And Sharing…

Box.net, Amazon Cloud Drive The online (or cloud) storage business has always been a really interesting industry. When we started Box in 2005, it was a somewhat untouchable category of technology, perceived to be a commodity service with low margins and little consumer willingness to pay. All three of these factors remain today, but with…

Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) attacks that made popular Internet properties like Twitter, SoundCloud, Spotify and Box inaccessible to many users in the US. The DDoS attack happened in three waves targeting DNS service provider Dyn, resulting in a total of about…

Digital Twin And The End Of The Dreaded Product Recall

Digital Twin And The End Of The Dreaded Product Recall

The Digital Twin  How smart factories and connected assets in the emerging Industrial IoT era along with the automation of machine learning and advancement of artificial intelligence can dramatically change the manufacturing process and put an end to the dreaded product recalls in the future. In recent news, Samsung Electronics Co. has initiated a global…

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data The modern enterprise is digital. It relies on accurate and timely data to support the information and process needs of its workforce and its customers. However, data suffers from a likability crisis. It’s as essential to us as oxygen, but because we don’t see it, we take it for granted.…

5 Things To Consider About Your Next Enterprise Sharing Solution

5 Things To Consider About Your Next Enterprise Sharing Solution

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction or advertising firms require sharing and collaboration with very large (several Gigabytes) files. Financial services…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…