Cloudlock Explainer VO

Submit Audition/Proposal on this Project
Rate this Project

Project Main Details

Cloudlock Explainer VO 
This is a buyout for an explainer video, describing how a security softwares works. The narration will accompany an animated video, showing the benefits of the products. This video will live online and is not for broadcast. Tone should be informative. 
2017-01-14 01:35:25 GMT
2017-01-24 17:00:00 (GMT -08:00) Pacific Time (US & Canada) 
Yes (click here to learn more about Voice123's SmartCast)
0 direct invitation(s) have been sent by the voice seeker resulting in 0 audition(s) and/or proposal(s) so far.
Voice123 SmartCast is seeking 50 auditions and/or proposals for this project (approx.) Invitations sent by SmartCast have resulted in 49 audition(s) and/or proposal(s) so far.

Project Parameters

The Voice Actor should be located in:
Flexible Price - USD 400 to USD 600
Training, business presentations, sales, and web sites
English - USA and Canada
Young Adult Female OR Young Adult Male OR Middle Age Female OR Middle Age Male OR Senior Female OR Senior Male
• Phone Patch OR
Source Connect OR
• Audio files must be delivered via email OR
• Audio files must be delivered via FTP/Dropbox/Google Drive/cloud
There are no special pre-, post-, or production requirements for this project.
Not defined
This is a non-union project

Script Details

Security threats come in all shapes and sizes, but some of the most dangerous are practically invisible.

Conventional security solutions limit visibility to network perimeters, on-network traffic, and managed mobile devices, leaving a large blind spot in the cloud.

The interconnected nature of cloud applications has led to the rise of an entirely new class of attack: cloud-native threats. Here’s how it works:
A quick internet search leads a hacker to all the information they need to generate a targeted, legitimate looking phishing email, making it difficult for end-users to reasonably know what’s safe, and what isn’t.
There are no files to scan for malware, making the attack completely invisible to traditional security solutions.

Like most users, the victim accepts the risks, only glancing at the access being granted. These approved apps use a protocol called OAuth to potentially gain full permissions, giving unlimited access to email and files.
Once a hacker has access, they can initiate an attack, viewing and downloading massive amounts of a company’s most sensitive data, such as intellectual property, account information, and personnel records.
But the attack doesn’t just end there, as the cloud makes sharing malicious applications across an entire organization simple. Hackers can easily do this themselves
Statistics show that organizations have an average of 550 unique cloud apps enabled with corporate credentials.
So, how do you defend your network against a growing number of cloud-native threats?
Cisco Cloudlock provides visibility and control over your connected cloud applications.
Cloudlock gives you all the information you need to know about the apps connected to your organization, including the most risky apps people in your organization have installed, and the users that installed them, and app trends across your entire organization.
For each cloud application, you can see the access the app requires, a crowd-sourced, Community Trust Rating that shows you the percentage of your peers that trust the application, and an overall Risk Rating.
Using all this information, you can classify apps as “trusted” or “banned” for individual users or across your entire organization. CloudLock even integrates with Cisco Umbrella, letting you ban apps at the DNS level.
Want to do this all automatically? You can with policy-driven controls that allow or revoke apps based on your criteria...
…allowing you to stop risks quickly and efficiently.
Cloudlock itself is a cloud-native solution, so there’s no hardware to install and can be set up in a matter of minutes.
Contact your Cisco account team to schedule a demo today or learn more at 
Please note that you should only use the script or your recording of it for auditioning purposes. The script is property, unless otherwise specified, of the voice seeker and it is protected by international copyright laws.

Voice-Seeker Details

Sign in to display the company name (if applicable)


Voice123 Team Comments

Voice123 consultations with this voice seeker regarding this project and/or other projects by this voice seeker, via phone, chat, and/or email.

unchecked This project - phone.

unchecked Previous projects - phone.

unchecked This project - email or chat.

checked Previous projects - email or chat.

Note: Voice123 strives to establish the legitimacy of all projects posted. However, Voice123 subscribers and users are responsible for confirming information stated by prospective voice seekers, agents and/or clients. Voice123 subscribers and users assume all liability for use of any information found through Voice123, or any of its publications.

This page contains the most important details of this project. If you find the information on this project inaccurate or inappropriate, please let us know by contacting us.

Submit Audition/Proposal on this Project