Case Study
Mandarin Oriental Hotel
(Thailand)

Mandarin Oriental Hotel Group is the award winning owner and operator of some of the most luxurious hotels, resorts and residences located in prime destinations around the world. Increasingly recognized for creating some of the world's most sought-after properties, the Group provides 21st century luxury with oriental charm. Above all, Mandarin Oriental is renowned for creating unique hotels through distinctive design and a strong sense of place, luxury hotels right for their time and place.

The Challenge

Mandarin Oriental from Bangkok is a truly remarkable five-star hotel that managed to become a top destination through contemporary, classic yet cutting-edge, unique blend of luxury and comfort. Their success comes from style, service, and excellence, and these strong points translate into know-how that has to be kept securely inside the hotel's premises. The challenge is that employees from the reception, marketing department, HR department, and others, handle critical data and transfer it for job purposes on portable storage devices making it vulnerable to leakages and losses.

The Solution

The IT Manager of the Mandarin Oriental chose Endpoint Protector because it was recommended by their trusted partner and the proof of concept revealed a great fit between their requirements and Endpoint Protector’s features.

File Tracing and File Shadowing are among the preferred features because they disclose file transfers on portable media, meaning exactly what user, from what computer, in what moment, what file and on which device did the transfer occur. Additionally, the software provides a copy of the transferred file, for the Admin to see exactly what the file contains and if the title of the file corresponds to its content. For example, the title could be "Hotel presentation", but to contain the personal records of all the staff.

On a scale from 1 to 5 (one being "poor" and five being "excellent"), the hotel's IT Manager rated all aspects related to Endpoint Protector as excellent - features, granularity, ease of installation, ease of use, support and updates, availability of staff when calling or asking for assistance, and competitive pricing. When asked about the experience he had in dealing with our Support team and our company in general, the hotel's IT Manager had a positive response.

Why Endpoint Protector?
  • Great features
  • Monitors, blocks, and alerts data transfers
  • Ease of use and installation
Let’s talk about your use case

Fill in the form below to get in touch with one of our DLP experts
Check your email to download .
If you don't see it please check your spam or junk folders.



Please use a valid email address!
Data Loss Prevention Best Practices
Download our free ebook on
Data Loss Prevention Best Practices

Data Loss Prevention (DLP) tools have become an essential part of data protection strategies. Highly flexible and adaptable to any company size, DLP solutions can be tailored to different needs and support compliance efforts with new data protection regulations. This whitepaper outlines the best practices companies should adopt when implementing DLP tools.

The case study is also available for download