Subscribe: Official Google Enterprise Blog
http://googleenterprise.blogspot.com/rss.xml
Added By: Feedage Forager Feedage Grade B rated
Language: English
Tags:
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: Official Google Enterprise Blog

Google Cloud



Google Cloud



Last Build Date: Wed, 25 Apr 2018 07:00:00 -0000

 



With new security and intelligent features, the new Gmail means businessWith new security and intelligent features, the new Gmail means businessVP Product Management, G Suite

Wed, 25 Apr 2018 07:00:00 -0000

Since the beginning, our aim with G Suite has been to help companies transform the way they work with our suite of cloud-based collaboration and productivity apps.Today we’re announcing major updates to help the more than 4 million paying businesses that use G Suite work safer, smarter and more efficiently. This includes an all-new Gmail, with a brand new look on the web, advanced security features, new applications of Google’s artificial intelligence and even more integrations with other G Suite apps. We’re also introducing a new way to manage work on the go with Tasks.Keep sensitive data secure with new Gmail security featuresKeeping your data secure is our top priority, which is why last month, we introduced new phishing protections to help address Business Email Compromise (BEC) threats—or when someone impersonates an executive to get sensitive information. With these new protections, Gmail has helped block 99.9 percent of BEC attempts by warning users or automatically moving messages to spam for them.Today, we’re introducing a new approach to information protection: Gmail confidential mode. With confidential mode, it’s possible to protect sensitive content in your emails by creating expiration dates or revoking previously sent messages. Because you can require additional authentication via text message to view an email, it’s also possible to protect data even if a recipient’s email account has been hijacked while the message is active.New confidential mode in Gmail lets you set expiration dates for sensitive information.Built-in Information Rights Management (IRM) controls also allow you to remove the option to forward, copy, download or print messages. This helps reduce the risk of confidential information being accidentally shared with the wrong people. Confidential mode will begin to roll out to consumer Gmail users and a limited number of G Suite customers in the coming weeks (broader rollout following).We’ve also redesigned our security warnings within Gmail so that they are simpler to understand and give a clear call to action to employees. These bigger, bolder warnings will help you be even more informed when it comes to potentially risky email.Bigger, bolder security warnings help you keep your company’s confidential information safe.And it’s always worth a reminder: we do not scan Gmail for the purposes of targeting ads, and there are no ads shown in Gmail for G Suite customers.Stay on top of email effortlessly using artificial intelligence in GmailNew AI-powered features in Gmail, like Nudging, Smart Reply and high-priority notifications, can now help you spend more time on work that matters.Most of us get more emails than we can deal with at one time, and sometimes things slip through the cracks. With Nudging, Gmail will proactively remind you to follow up or respond to messages, making sure you don’t drop the ball.Now Gmail will intelligently (and subtly) “nudge” you when you need to prioritize actions in your inbox.Last year, we introduced Smart Reply to our Gmail mobile apps. Smart Reply processes hundreds of millions of messages daily and already drives more than 10 percent of email replies on mobile. Today we’re bringing Smart Reply to Gmail on the web to help you respond to messages faster.New notifications on mobile help you stay focused on what’s important (and eliminate clutter, too.).We’re also introducing new features on mobile to help you minimize interruptions and clutter. High-priority notifications is a new setting that only notifies you of important messages, keeping interruptions to a minimum. Gmail can also recommend when to unsubscribe from mailing lists. Using intelligence, unsubscribe suggestions appear based on cues like how many emails you get from a sender and how many of them you actually read. You’ll start to see these notifications show up in your inbox over the coming weeks.Over the past few months, Salesforce has tested the new Gmail to collaborate on global projects.  “As the global leader in CRM, the ability to quickly and securely [...]


Media Files:
https://storage.googleapis.com/gweb-uniblog-publish-prod/images/GmailLaunch-03.max-600x600.png




Two higher ed collaborations expand access to Google Cloud PlatformTwo higher ed collaborations expand access to Google Cloud PlatformDirector

Tue, 24 Apr 2018 17:00:00 -0000

From Northeastern University’s work to map the spread of the Zika virus, to MIT’s massive computing for theoretical mathematics, higher education institutions are applying cloud technologies to help solve the global challenges we face.


Northeastern and MIT’s work are just two examples of higher education institutions using Google Cloud Platform (GCP) to uncover important insights from massive, diverse data sets. Today, we’re announcing how we’re collaborating with two higher education organizations, Unizin and Internet2, so that their members can benefit from GCP.

Improving student outcomes through the Unizin Data Platform

Colleges and universities are constantly seeking ways to better understand and help their students. This week Unizin, a consortium of 25 leading universities working together to improve education with technology, announced that its Unizin Data Platform (UDP) will be built on Google Cloud Platform as part of a new alliance with Google Cloud.


The Unizin Data Platform allows institutions to anonymize, aggregate, store, share, and analyze teaching and learning data. Member universities use this data to do things like identify students who may be at risk of failing a class or improve personalized learning approaches. Understanding data from the past gives educators more insights and tools to help improve student outcomes.


Rob Lowden, Unizin Executive Director, shared that "Building the Unizin Data Platform on the Google Cloud Platform provides our members with scalable infrastructure, powerful data analytics and the ability to leverage machine learning solutions to advance Unizin's work to improve learning research and outcomes in a highly secure environment. Google Cloud is an ideal provider for Unizin to advance the higher education digital learning ecosystem."

GCP now available to the Internet2 community

Founded in 1996, the nonprofit consortium Internet2 provides a collaborative environment for U.S. research and education organizations to solve shared technology challenges. Internet2 has announced that member institutions can now use Google Cloud Platform, available through distributor Carahsoft, to develop solutions in support of their educational, research and community service missions. The pre-Validation service is available now and the fully validated service will launch later this year. Institutions can learn more and express interest on Internet2's website.


We hope these new collaborations will help more institutions take advantage of Google Cloud Platform to drive impact in research and collaboration. To learn more visit our website or express interest.
(image) Google Cloud is announcing collaborations with Unizin and the Internet2 Pre-Validation Service to help higher education institutions uncover important insights from data and dramatically improve outcomes.


Media Files:
https://storage.googleapis.com/gweb-uniblog-publish-prod/images/Visual_for_header_for_April_26_Cloud_partner.max-600x600.png




Engineered for renewal: Google Cloud, Etsy and sustainabilityEngineered for renewal: Google Cloud, Etsy and sustainabilityEditorial Lead

Mon, 23 Apr 2018 13:00:00 -0000

As the CTO of Etsy, Mike Fisher is responsible for evolving technology strategy, scaling IT systems and infrastructure and deepening machine learning expertise, all of which is crucial to supporting the global creative commerce platform that Etsy is today.To deliver a buying and selling experience that currently supports approximately 1.9 million entrepreneurs, Mike and his team recently committed to Google Cloud Platform to help them scale and connect Etsy buyers and sellers globally. But their decision was based on more than just technology.We sat down with Mike to hear about Etsy’s unique approach to evaluating their cloud partner.QH: Why is sustainability a value at Etsy?MF: Sustainability supports our mission to Keep Commerce Human, within the company, and outside, to our 1.9 million sellers. It’s an important value that pulls through everything we do; from how we consume food at the office, to the products we help people sell, to how we power our buildings. And of course, it’s important in how we power our data centers, and in the cloud computing we use.QH: Is this special to Etsy, or is this a broader point about many of today’s companies?MF: Etsy is a little unique because we've been around almost 13 years, and sustainability has always been core to us. But other businesses are definitely on board. People want to support businesses that are doing this. I think at Google Cloud you've seen that customers want businesses to be able to host and provide their services in a sustainable manner.QH: True.MF: They're migrating to the cloud, and having a cloud provider that is committed to that as well is a huge benefit.QH: In itself, is going to the cloud a business decision around expenditure, or a technology decision over how fast you'll be able to manufacture, test, and deploy software?MF: I wouldn't separate technology and business decisions. Going to the cloud, for example, is a great business decision for us, since it allows for things like enhanced site performance and focus on our strategic initiatives. We can have a presence around the world, with faster load times. That supports the possibility of stronger conversions and better experiences. You get that with a global cloud. All good for the business. And of course, spinning up infrastructure much, much faster than we could on our own means we’re moving quicker and supporting our sellers’ businesses better.And then there are the things on the sustainability side. Our servers run 24/7 today in the data center whether we need 100% of their compute capacity or not. But like all of e-commerce, we have daily cycles, monthly cycles, the holiday season. Having to power computers capable of handling our holiday season at peak, instead of scaling up and down for what we need? That is a sustainability decision that is a great business decision.QH: How do you measure success around sustainable energy consumption?MF: Our impact goals are economic, social and ecological. Underneath the ecological goal, we want 100% renewable electricity by 2020 -- the offices, and all of the data centers. Google helps that a lot, since you’re committed to 100% renewables. On top of that, we want to reduce the intensity of our energy usage by 25% by 2025, even as we increase our business. It’s pretty hard to imagine doing that without the cloud.QH: Did you have any differences about your needs working with Google?MF: We do have differing criteria for renewable energy. We strive to source renewables in the same power market as the consumption, while Google strives to do the same, you also operate in some regions where procuring renewables is complex and may not be possible. But even that was a great conversation, because the Google team worked with us on that. They were like, "we understand that that's important to Etsy, and we will work towards that goal."QH: Good to know, since I was going to say: Etsy likes handcrafted things, a human touch. But we have thousands of identical servers, and we use lots of automation. They[...]


Media Files:
https://storage.googleapis.com/gweb-uniblog-publish-prod/images/2017_10_17_ETSY_117ADAMS_LIBRARY_162_Fw6WbOJ.max-600x600.jpg




I’m Feeling Earthy: Earth Day trends and moreI’m Feeling Earthy: Earth Day trends and moreLead for Sustainability

Sun, 22 Apr 2018 16:00:00 -0000

It’s Earth Day—take a walk with us.

First, let’s dig into issues taking root in Search. Ahead of Earth Day, “solar energy,” “drought” and “endangered species” climbed in popularity this week. Meanwhile, people are looking for ways their own actions can make a positive impact. The top “how to recycle” searches were for plastic, paper, batteries, plastic bags, and styrofoam. And around the world, trending queries about Earth Day were “how many trees will be saved by recycling?” and “which type of plastic is more friendly to the environment?”  

To explore some of the other searches that are blooming for Earth Day, take a look at our trends page.

(image)

In our corner of the world, Earth Day celebrations started on Google Earth’s first birthday (tweet at @googleearth with #ImFeelingEarthy and see where it takes you!). The party continues today with a special tribute to Jane Goodall in today’s Doodle, and kids inspired by the Doodle can create their own Google logo, thanks to our partnership with World Wildlife Fund. And while we’re feeling extra Earthy this week, the environment is important to our work all year long—here’s what we’re doing for our operations, our surroundings, our customers, and our community.

(image)


Media Files:
https://storage.googleapis.com/gweb-uniblog-publish-prod/images/Earth_Day_Doodle.max-600x600.jpg




Simplifying apps, desktops and devices with Citrix and Chrome EnterpriseSimplifying apps, desktops and devices with Citrix and Chrome EnterpriseProduct Manager

Fri, 20 Apr 2018 16:00:00 -0000

As cloud adoption continues to accelerate, many organizations have found they need an ever-expanding fleet of mobile devices so that employees can work wherever and whenever they need. And research shows that when employees can work from anywhere, they can do more. According to Forbes, employee mobility leads to 30 percent better processes and 23 percent more productivity.But as the demand for mobility grows, many organizations have also found themselves challenged by the need to provide secure mobile endpoints with access to certain legacy line-of-business or Windows apps. To help, last year we announced our partnership with Citrix to bring XenApp and XenDesktop to Chrome Enterprise.Since bringing XenApp and XenDesktop to Chrome Enterprise, we’ve worked extensively with Citrix to help more businesses embrace the cloud. Last month, we announced that admins can now manage Chromebooks through several popular enterprise mobility management (EMM) tools, including Citrix XenMobile. And this year at HIMSS we showed how the combination of Citrix and HealthCast on Chrome Enterprise helps healthcare workers access electronic health records and virtualized apps securely on Chrome OS using their proximity badge.All of this is the topic of an IDG webinar we’re co-sponsoring with Citrix. The webinar “Chrome OS & Citrix: Simplify endpoint management and VDI strategy” includes IDG CSO SVP/Publisher Bob Bragdon, Chrome Enterprise Group Product Manager Eve Phillips, and Citrix Chief Security Strategist Kurt Roemer as speakers, and addresses how Citrix and Chrome enable access to mission-critical business apps and create a productive workforce inside or outside corporate infrastructure.Here’s what the webinar will cover:How Chrome and Citrix can ensure secure access to critical enterprise apps.How employees can be more productive through access to legacy apps in VDI. How Citrix XenApp (XA) and XenDesktop (XD) integrate with Chrome OS.How Citrix’s upcoming product launches and enhancements with Chrome, GCP and G Suite can help enterprise IT teams and end users.In March, Citrix’s Todd Terbeek shared his experiences transitioning to Chrome Enterprise, and this week Chief Security Strategist Kurt Roemer discussed how combining Citrix with Chrome can deliver expanded value across security, privacy and compliance. Our work with Citrix continues to evolve, and we’re looking forward to finding new ways to collaborate in the future.To learn more, sign up for the webinar.A new webinar, “Chrome OS & Citrix: Simplify endpoint management and VDI strategy,” addresses how Citrix and Chrome enable access to mission-critical business apps and create a productive workforce inside or outside corporate infrastructure.[...]


Media Files:
https://storage.googleapis.com/gweb-uniblog-publish-prod/images/ForresterWave_blogheader.max-600x600.png




5 things you can do with Chrome Browser to increase employee productivity5 things you can do with Chrome Browser to increase employee productivityProduct Manager

Wed, 18 Apr 2018 16:00:00 -0000

Whether it’s accessing business apps, collaborating on projects or just checking email, the web browser is increasingly becoming the place where employees get their jobs done. In fact, 76 percent of companies employ browser-based email, and 70 percent have adopted browser-based office applications, according to a recent Forrester study.Since employees spend a lot of time in their browsers at work, we wanted to share some ways you can customize Chrome Browser to help employees stay focused. Chrome Browser has many built-in capabilities that IT admins can use to pre-install bookmarks, apps, and extensions,centrally manage policies, and provide an optimal web browsing experience.Here are five things IT admins can do with Chrome Browser to help teams work more efficiently.1. Use Chrome Sync to get fast and easy access across devices.With Chrome Sync, an employee’s browser history, bookmarks, apps, extensions and even open tabs can follow them from device to device throughout the day—even as they switch across Windows, Mac and Chrome OS platforms. IT can also manage bookmarks centrally through policy, pushing out links to important sites and web apps that users can access from any device when logged into the browser.2. Help users stay secure through Safe Browsing.With Safe Browsing, Chrome Browser automatically notifies users when a site may be malicious, so they can avoid it. This means employees can avoid threats that might result in spending hours recovering from an infected device instead of getting things done. IT can allow users to decide if they want Safe Browsing turned on, or they can set a policy centrally to enable or disable it.3. Block intrusive ads so employees can stay focused.Intrusive ads can be a drain on anyone’s peace of mind. By enabling Chrome Browser’s automatic pop-up blocker through set policies, IT teams can help employees stay on task without being distracted. Chrome Browser now automatically filters links to third-party websites disguised as play buttons or other site controls, or transparent overlays on websites that capture clicks and open new tabs or windows.4. Use a standardized homepage for employees.IT admins can set employees’ homepages to internal sites so they have the latest tools and most up-to-date information. And with Group Policy or Cloud Policy, IT can easily set different homepages for different groups in the organization.5. Pre-install apps and extensions for easy access and security.IT admins can make it easy for employees to access the apps and extensions they need to be productive while maintaining the right security policies. They can deploy selected apps and extensions tailored to an employee’s department or role, whether they're internally built or public, like productivity or CRM apps, giving them easy access to the tools needed to do their work as soon as they open their browser. Visit Device management > Chrome > User Settings in the Admin Console or check out these instructions.These are just a few ways IT admins can manage Chrome Browser to support user productivity. To get started with managing Chrome Browser for businesses, visit our website. And for information on how to set up, manage and configure Chrome Browser for your enterprise, check out our help center.[...]


Media Files:
https://storage.googleapis.com/gweb-uniblog-publish-prod/images/connectedworkspaces_1_1.max-600x600.png




G Suite Enterprise for Education is now availableG Suite Enterprise for Education is now availableProduct Manager

Wed, 18 Apr 2018 15:30:00 -0000

Since launching G Suite for Education, we’ve heard a common request from colleges, universities and large school districts: the need for more advanced tools to meet their complex technology needs. In January, we announced G Suite Enterprise for Education, a new edition of G Suite for Education that offers additional enterprise-grade capabilities designed for large institutions and customized for education. Starting today, G Suite Enterprise for Education is generally available to educational institutions in the United States, and is coming to more countries soon.Additionally, new tools—such as Data Loss Prevention (DLP), security key management and enforcement, and Gmail S/MIME—will start rolling out to all G Suite for Education users over the next few months. G Suite for Education, a suite of tools used by 80M teachers and students, has been and will remain free for schools and we’ll continue to add new features to that edition at no additional cost.New security features added to free version of G Suite for EducationAdmins can expect increased security and greater controls with new tools that are being made available over the next few months to the free version of G Suite for Education:Gmail and DriveData Loss Prevention (DLP) lets admins prohibit users from sharing sensitive content with people outside their institutions. It checks for sensitive content like personal student information or preset keywords, and alerts admins so they can intervene. Hosted Gmail S/MIME offers schools an additional line of defense to protect sensitive emails. With this tool, institutions have the option to digitally sign and encrypt emails. In addition, it also adds verifiable account-level signatures authentication to better protect against email spoofing. It’s easy to manage for administrators and seamless for users.Security keymanagement and enforcement offers an additional layer of security for user accounts by requiring a physical key. Admins can now require faculty, staff and students to use physical keys that use cryptography as a part of 2-step verification when signing into G Suite.  Admins can control session length for users accessing Google services like Gmail and Drive, which means that users will be automatically logged out after a specified amount of time. If specific groups of users require certain session lengths, admins can apply different web session duration settings to different groups.Enterprise-grade tools for educational institutionsFor educational institutions with administrative needs similar to businesses, G Suite Enterprise for Education offers robust tools customized for education. Here’s what users can expect:Advance your institution with advanced controlsThe Security Center in G Suite Enterprise for Education gives organizations more visibility and control over security. To prevent institutions from potential threats, we’re arming IT admins with actionable insights to protect sensitive data against attacks. With security center tools, IT departments gain insights into how data may be exposed with external file sharing, can see phishing messages targeting users within their organization, and access metrics to demonstrate the organization’s security effectiveness.With Advanced Mobile Device Management (MDM), universities and institutions have scaled control over devices in their domain. Using customizable MDM rules, admins can automate mobile device management tasks, like approving all Android devices that enroll for management at the start of a new school year. Once the rules are in place, pre-specified events trigger actions like sending notification emails to administrators, blocking or approving a device, or even wiping account data from devices if its lost by a student. And with Mobile Audit, admins can see a report of device activities, including device policy compliance.Enhanced analytics and search capabilitiesCloud Search is[...]


Media Files:
https://storage.googleapis.com/gweb-uniblog-publish-prod/images/G_Suite_Enterprise_EDU-hero.max-600x600.jpg




Think macro: record actions in Google Sheets to skip repetitive workThink macro: record actions in Google Sheets to skip repetitive workProduct Manager, G Suite

Wed, 11 Apr 2018 16:00:00 -0000

Since their debut nearly 40 years ago, spreadsheets have remained core to how businesses get work done. From analyzing quarterly revenue to updating product inventory, spreadsheets are critical to helping companies gather and share data to inform quicker decisions—but what else can you do if they’re in the cloud?We’ve been focused on making Google Sheets better for businesses for this reason, which is why we’ve recently added new features to help teams analyze and visualize their data. Today we’re adding more updates to Sheets, including a way to record macros in the cloud to automate repetitive tasks, as well as more formatting options. Check it out.Record macros in Sheets, skip mundane tasksWe want to help companies automate work by approaching macros differently: cloud-first. Starting today, you can record macros in Sheets. Let’s say you need to format new data imports or build the same chart across multiple sheets of quarterly data. Repeating the same steps manually can take hours, but the Sheets macro recorder lets you record those actions and play them back on command without having to write any code.Record macros in Sheets, skip mundane tasksHere’s how it works: when you record a macro, Sheets converts the macro actions into an Apps Script automatically. If you want to update your macro, you can simply edit the script directly instead of having to re-record the macro from scratch. You can also write your own Apps Script functions and import them as new macros.The best part about Sheets Macros is that they’re built for use in cloud-based files, which means that teams can run macros at the same time that others are working in the sheet without interrupting them. For example, a finance team having a budget meeting can run macros while reviewing the same spreadsheet. It also means that coworkers or clients won’t be forced to download sensitive files to use your macros. Since your Sheets files are in the cloud, you can keep tighter controls over who can view and re-share your data.More updates to SheetsYou may have noticed that over the past few years we’ve put effort toward building Sheets features to help businesses view, analyze and share their data more easily. This includes adding new chart types (waterfall and 3D), ways to embed charts while keeping data up-to-date in Docs and Slides (even if you move files), more functions (up to 400+ now), additional formatting, print options and more.Today, we’re adding even routinely requested features, including the ability to add printing page breaks, custom paper sizes, more options for row and column grouping and a way to add checkboxes in cells. We’ve also made it possible for you to group your data by time frame (like week, month or year) when you create pivot tables.Speaking of pivot tables, our engineering team has also been hard at work bringing the power of Google’s artificial intelligence into Sheets to help teams know what their data knows. You might have noticed that we recently added intelligent pivot tables in Sheets to help analyze and find new insights, no matter how skilled you are at data analytics.Companies like Whirlpool Corporation and Sanmina are using Sheets for more collaborative data analysis. These latest additions are designed to make Sheets a go-to resource for businesses and will roll out over the next few weeks. Learn more about Sheets on our Learning Center.[...]After nearly 40 years, it's time for teams to approach spreadsheets cloud-first.


Media Files:
https://storage.googleapis.com/gweb-uniblog-publish-prod/images/PivotToTheCloud-01.max-600x600.png




How Topcoder crowdsources solutions to tough coding challenges with Chrome BrowserHow Topcoder crowdsources solutions to tough coding challenges with Chrome BrowserCommunity Architect

Tue, 10 Apr 2018 16:00:00 -0000

Editor’s note: Today’s post is from Kyle Bowerman, Community Architect for Topcoder, a crowdsourcing marketplace that connects businesses with designers, developers and data scientists to build technology solutions. Topcoder uses Chrome Browser as its development environment, creating extensions to GitHub and simulating various device environments.

Companies need developers who can create apps that solve complex problems. Developers want to show off their coding skills. That's where Topcoder comes in—we connect the talents of a global community of 1 million developers to companies with coding issues to solve.

The process is simple: companies come to us with programming requests, and we create crowdsourcing challenges that let our community of developers demonstrate what they can do. The size and scope of these challenges can vary—some are exploratory and open-ended, like choosing the best grid library for JavaScript; others are very task-based and specific, like building a new screen for a mobile app. When developers from our community create a solution, they win prize money, and our enterprise customers get the apps and technology solutions they need.

Since our community develops on browser, our choice of browser as a development environment is very important. When we started Topcoder in 2001, we used Firefox’s development tools. However, we switched to Chrome Browser when it was launched in 2008 because, from our perspective as coders, it’s the best environment for development. The development tools in Chrome Browser remove roadblocks to fast delivery of projects—like the need to test apps on physical devices, or worrying if the solution will work on every browser. Because of this, we develop for Chrome Browser first, then test to be sure our apps work just the same on other browsers.

Without the development tools, like the plug-in library, built into Chrome Browser, there’d be no way developers could work at the speed our customers need. Let’s say the challenge is to fix a problem with an app’s “submit” button on a particular phone model. With Device Mode in Chrome Browser, our developers can simulate all kinds of devices instantly—even screen sizes and resolutions—without needing to test on the actual physical device. This can be a critical time-saver—we don’t have to go back to the customer and say, “sorry, we’ll get back to you in a few weeks after we find that device and test the code.” We trust Chrome Browser will help our developers create solutions that will work no matter which device they're accessed on.

Extensions are another tool we use to connect developers to challenges faster, so companies get quality coding work done fast. We created an extension that takes GitHub issue tickets and quickly turns them into Topcoder challenges. The extension exposes our challenges to the coding community in just a few seconds, instead of days. We also created an extension that lets developers search GitHub for Topcoder challenges by keyword, and look up other Topcoder developers.

With Chrome Browser, our developers get a better development environment, our enterprise customers get the apps they need, and all of us get a great browser experience in the process. That’s a winning solution for everyone.


(image)


Media Files:
https://storage.googleapis.com/gweb-uniblog-publish-prod/images/topcoder.max-600x600.png




Meeting our match: Buying 100 percent renewable energyMeeting our match: Buying 100 percent renewable energySenior Vice President

Wed, 04 Apr 2018 13:00:00 -0000

A little over a year ago, we announced that we were on track to purchase enough renewable energy to match all the electricity we consumed over the next year. We just completed the accounting for Google’s 2017 energy use and it’s official—we met our goal. Google’s total purchase of energy from sources like wind and solar exceeded the amount of electricity used by our operations around the world, including offices and data centers.What do we mean by “matching” renewable energy? Over the course of 2017, across the globe, for every kilowatt hour of electricity we consumed, we purchased a kilowatt hour of renewable energy from a wind or solar farm that was built specifically for Google. This makes us the first public Cloud, and company of our size, to have achieved this feat.Today, we have contracts to purchase three gigawatts (3GW) of output from renewable energy projects; no corporate purchaser buys more renewable energy than we do. To date, our renewable energy contracts have led to over $3 billion in new capital investment around the world.Corporate RE Purchasing League Table (2018)Google is the largest corporate purchaser of renewable energy in the world.Renewable Energy PPA (2018)Google’s 26 renewable energy generation projects across the globe have a capacity of 3GW of total annual output.Google Global Data Centers (2018)The energy consumed by our 15 data center sites, which run Google products 24/7, is matched 100% with renewable energy.The road to 100 percentWe've been working toward this goal for a long time. At the outset of last year, we felt confident that 2017 was the year we'd meet it. Every year, we sign contracts for new renewable energy generation projects in markets where we have operations. From the time we sign a contract, it takes one to two years to build the wind farm or solar field before it begins producing energy. In 2016, our operational projects produced enough renewables to cover 57 percent of the energy we used from global utilities. That same year, we signed a record number of new contracts for wind and solar developments that were still under construction. Those projects began operating in 2017—and that additional output of renewable energy was enough to cover more than 100 percent of what we used during the whole year.We say that we “matched” our energy usage because it’s not yet possible to “power” a company of our scale by 100 percent renewable energy. It’s true that for every kilowatt-hour of energy we consume, we add a matching kilowatt-hour of renewable energy to a power grid somewhere. But that renewable energy may be produced in a different place, or at a different time, from where we’re running our data centers and offices. What’s important to us is that we are adding new clean energy sources to the electrical system, and that we’re buying that renewable energy in the same amount as what we’re consuming, globally and on an annual basis.Google's data center in Eemshaven, The Netherlands.Looking aheadWe’re building new data centers and offices, and as demand for Google products grows, so does our electricity load. We need to be constantly adding renewables to our portfolio to keep up. So we’ll keep signing contracts to buy more renewable energy. And in those regions where we can’t yet buy renewables, we’ll keep working on ways to help open the market. We also think every energy buyer—individuals and businesses alike—should be able to choose clean energy. We’re working with groups like the Renewable Energy Buyers Alliance and Re-Source Platform to facilitate greater access to renewably-sourced energy.This program has always been a first step for us, but it is an important milestone in our race to a carbon-free future. We do want to get to a point where renewables and other carbon-free energy sou[...]


Media Files:
https://storage.googleapis.com/gweb-uniblog-publish-prod/images/DC-BE-APW-091917-762-Edit.max-600x600.jpg




Expanding our cloud network for a faster, more reliable experience between Australia and Southeast AsiaExpanding our cloud network for a faster, more reliable experience between Australia and Southeast Asia

Tue, 03 Apr 2018 16:00:00 -0000

Earlier this year, we announced that we are expanding our global infrastructure with new regions and subsea cables, advancing our ability to connect the world and serve our Cloud customers with the world’s largest network.

Today, we’re excited to announce our investment in the Japan-Guam-Australia (JGA) Cable System.  

This new addition to the Google submarine network family, combined with investments in the  Indigo, HK-G and SJC subsea cables,will give GCP users access to scalable, diverse capacity on the lowest latency routes via a constellation of cables forming a ring between the key markets of Hong Kong, Australia and Singapore. Our investment in these cables builds on our other APAC cable systems, namely Unity, Faster and PLCN, interconnecting the United States with Japan, Taiwan and Hong Kong.

Taken together, these cable investments provide improved connectivity to GCP’s five cloud regions across Asia and Australia (with more on the way),so that companies using GCP can serve their customers no matter where they are.

The JGA cable system will have two fiber pairs connecting Japan to Guam, and two fiber pairs connecting Guam to Sydney. This provides deeply scalable capacity to both our users and Google Cloud Platform customers. JGA is being co-built by NEC Corporation and Alcatel Submarine Networks. The JGA-South segment is being developed by a consortium of AARnet, Google, and RTI-C, while the JGA-North segment is a private cable being developed by RTI-C. Together, the segments will stretch 9500 km (or nearly 6000 miles).

Whether we’re delivering directions to Maps users, videos to YouTube viewers, or GCP services to businesses, we know a fast and reliable infrastructure makes all the difference. That’s why we continue to invest in strategic routes, many of which require crossing oceans. To learn more about our network, visit our website.

(image)
(image)


Media Files:
https://storage.googleapis.com/gweb-uniblog-publish-prod/images/image2.max-600x600.jpg




ICYMI in March: here’s what happened in G SuiteICYMI in March: here’s what happened in G SuiteG Suite Blog Editor

Mon, 02 Apr 2018 17:00:00 -0000

Just like that, another month down.In March, we announced a slew of security updates to Google Cloud, including enhancements to G Suite. In a nutshell, G Suite companies can now use advanced configurations to help fend off phishing scams. These updates will continue to help businesses block (ph)ishy activity, like if an untrusted sender tries to share encrypted attachments or if someone tries to trick you by sending information from a domain that looks like yours.With these protections in place, more than 99.9 percent of Business Email Compromise (BEC) scenarios—when someone impersonates an executive to get sensitive information—are automatically moved to spam or flagged to users as shifty. Sorry, Charlie.We also automatically enabled basic device management for mobile devices that access G Suite. Now IT admins can better enforce pass codes, erase confidential data for Android and iOS devices with selective account wipe and more without users needing to install profiles. Lastly, we added IRM controls to Team Drives to prevent folks from printing, downloading or copying files they shouldn’t have access to.Many of these protections are default-on, which means you don’t have to do a thing. Read up here, or get started using the security center for G Suite.This one is so simple. Did you know that you can make a copy of a Google Doc or Sheet with a quick URL change? In the URL of your document, delete the information before the final backslash. In this case, change “edit” to “copy.” Done!And since security should always be top of mind, brush up on how to manage your share settings in Docs or other apps on our Help Center.→Most of us track down files in Google Drive by searching for the name of the person who shared a file with us. Because of this, Drive is going to start intelligently organizing the “Shared with Me” section by listing names and the files that people have shared with you, so you can track down files faster.→ Two-step verification is an easy and effective way to protect G Suite users, which is why we recommend that businesses use security keys. Moving forward, all G Suite admins—not just G Suite Business admins—will be able to manage the deployment of security keys and view usage reports. Learn more.→ Now your jams in Jamboard will automatically save to Drive.Here’s a full rundown of product updates in March (PDF version).[...]


Media Files:
https://storage.googleapis.com/gweb-uniblog-publish-prod/original_images/ICYMI_Loop_01.gif




Noodle on this: Machine learning that can identify ramen by shopNoodle on this: Machine learning that can identify ramen by shopDeveloper Advocate

Mon, 02 Apr 2018 15:00:00 -0000

There are casual ramen fans and then there are ramen lovers. There are people who are all tonkotsu all the time, and others who swear by tsukemen. And then there’s machine learning, which—based on a recent case study out of Japan—might be the biggest ramen aficionado of them all.Recently, data scientist Kenji Doi used machine learning models and AutoML Vision to classify bowls of ramen and identify the exact shop each bowl is made at, out of 41 ramen shops, with 95 percent accuracy. Sounds crazy (also delicious), especially when you see what these bowls look like:Ramen bowls made at three different Ramen Jiro shopsWith 41 locations around Tokyo, Ramen Jiro is one of the most popular restaurant franchises in Japan, because of its generous portions of toppings, noodles and soup served at low prices. They serve the same basic menu at each shop, and as you can see above, it's almost impossible for a human (especially if you're new to Ramen Jiro) to tell what shop each bowl is made at.But Kenji thought deep learning could discern the minute details that make one shop’s bowl of ramen different from the next. He had already built a machine learning model to classify ramen, but wanted to see if AutoML Vision could do it more efficiently.AutoML Vision creates customized ML models automatically—to identify animals in the wild, or recognize types of products to improve an online store, or in this case classify ramen. You don’t have to be a data scientist to know how to use it—all you need to do is upload well-labeled images and then click a button. In Kenji’s case, he compiled a set of 48,000 photos of bowls of soup from Ramen Jiro locations, along with labels for each shop, and uploaded them to AutoML Vision. The model took about 24 hours to train, all automatically (although a less accurate, “basic” mode had a model ready in just 18 minutes). The results were impressive: Kenji’s model got 94.5 percentaccuracy on predicting the shop just from the photos.Confusion matrix of Ramen Jiro shop classifier by AutoML Vision (Advanced mode). Row = actual shop, column = predicted shop. You can see AutoML Vision incorrectly identified the restaurant location in only a couple of instances for each test case.AutoML Vision is designed for people without ML expertise, but it also speeds things up dramatically for experts. Building a model for ramen classification from scratch would be a time-consuming process requiring multiple steps—labeling, hyperparameter tuning, multiple attempts with different neural net architectures, and even failed training runs—and experience as a data scientist. As Kenji puts it, “With AutoML Vision, a data scientist wouldn’t need to spend a long time training and tuning a model to achieve the best results. This means businesses could scale their AI work even with a limited number of data scientists." We wrote about another recent example of AutoML Vision at work in this Big Data blog post, which also has more technical details on Kenji’s model.As for how AutoML detects the differences in ramen, it’s certainly not from the taste. Kenji’s first hypothesis was that the model was looking at the color or shape of the bowl or table—but that seems unlikely, since the model was highly accurate even when each shop used the same bowl and table design. Kenji’s new theory is that the model is accurate enough to distinguish very subtle differences between cuts of the meat, or the way toppings are served. He plans on continuing to experiment with AutoML to see if his theories are true. Sounds like a project that might involve more than a few bowls of ramen. Slurp on.[...]A data scientist used machine learning and AutoML Vision to classify bowls of ramen by the shop wh[...]



Tip off: how we’re using predictive analytics during the Final FourTip off: how we’re using predictive analytics during the Final FourGoogle Cloud team

Fri, 30 Mar 2018 16:00:00 -0000

When we teamed up with the NCAA last December, we were thrilled to help them use cloud technology to analyze more than 80 years’ worth of statistical game and competition data. But we also wanted to challenge ourselves to do something a little different in the process—and hopefully delight basketball fans while we were at it.That’s how we came to embark on a months-long experiment to apply our own technologies to the NCAA’s treasure trove of data. We assembled a team of technicians, data scientists, and basketball enthusiasts (we call them The Wolfpack) who built a data processing workflow using Google Cloud Platform technologies like BigQuery and Cloud Datalab. Our goal wasn't to predict winners or losers, but to build models that look at influential factors on team performance—after all, it’s not whether you win or lose but how you play the game. (For the nitty gritty technical details, read this post on our Big Data blog.)By analyzing NCAA data through our workflow, we were able to uncover all sorts of interesting facts—everything from who blocks more shots per minute (for the record: juniors) to whether teams with a certain type of animal mascot cause more March Madness upsets (hint: meow). But we wondered if there was more we could do. Could we use data analytics and machine learning to anticipate what might happen during a live game—for example, the number of three-pointers a team might attempt in the second half?This weekend, we’ll attempt to do exactly that during the Final Four in San Antonio—and we’ll be sharing our predictions in real-time TV ads you can see during halftime. Here's how it will work.During the Final Four, our Google Cloud team (yes, The Wolfpack included) will be on site in San Antonio, closely following the games. We’ll use our workflow to analyze our observations from the first half of each game against NCAA historical data to hone in on a stat-based prediction for the second half that we think is highly probable.As halftime starts, the real work begins. We’ll have only minutes to turn our prediction into a TV spot. Our creative team will take the prediction generated by our team of data scientists and data analysts and create the ad right there in the Alamodome, using a real-time rendering system built by Cloneless and Eleven Inc. (Fun fact: Cloneless’ rendering system is also built on Google Cloud Platform.)Before the end of halftime, we’ll hand off our newly-created TV ad to CBS and Turner for airing on TBS right before the beginning of the second half. This is likely the first time a company has used its own real-time predictive analytics to create ads during a live televised sporting event—wish us luck!One of the exciting things about running an experiment like this in real time is we don’t know for sure what will happen. In this way, it’ll be a little like what it takes to play a game of basketball—thinking on your feet, reacting quickly to new data, and working together as a team. Which, if you think about it, is also true for businesses.Although this story is about March Madness, we hope it’ll be inspiring well beyond the basketball court. There’s so much to learn from applying cloud technology to data—and that’s true whether you’re an enterprise organization, a nonprofit, or even a sports team.To learn more, you can check out our site or read our post on the Big Data blog. And if you’re curious to see what happens, tune in to the Final Four on Saturday and Monday to see our predictions as they air. We’ll report back once the tournament is over and let you know what happened—and what we learned. Game on![...]We're applying our own data analytics and machine learning technologies [...]


Media Files:
https://storage.googleapis.com/gweb-uniblog-publish-prod/images/2018-03-29.max-600x600.png




Announcing Google Cloud Security Talks during RSA Conference 2018Announcing Google Cloud Security Talks during RSA Conference 2018Distinguished Engineer

Fri, 30 Mar 2018 16:00:00 -0000

In light of the many security incidents we can read about in the press, security continues to be a formidable challenge for many businesses. We believe that the move to a professionally managed secure Cloud infrastructure can help address this challenge.Last week, Urs shared his thoughts on security, and we announced new initiatives such as Access Transparency as part of more than 20 security updates and enhancements to help enterprises protect their data and stay secure. Frequently, it’s better to learn about these topics in person and we can help with that.Next month, many security professionals will come to San Francisco to the RSA Conference 2018, and we’ll offer our own Google Cloud Security Talks at Bespoke in Westfield San Francisco Centre, a five-minute walk from Moscone Center, where the RSA Conference will be held.This series of 15 talks over two days will cover security across Google Cloud, the complex compliance and regulatory environment, shared responsibility, and best practices from Google’s own internal security processes. We’ll share more on our approach to security, as well as our roadmap from the beginning of this year through Next ‘18. Among others, featured presenters include Ben Hawkes, who heads up Project Zero, and Mark Risher, who leads Google’s Identity and Account Security team. You can see the full agenda below and register for the event on our website.We’ll also have several interactive demos on hand to demonstrate how organizations can address security challenges such as ransomware attacks and data exfiltration.We’re also excited that Googlers will be giving talks or participating on panels at the RSA Conference itself:Threat Hunting Strategy: How to Catch Bears and Pandas [AIR-T10]Heather AdkinsTuesday, April 17, 2018 | 3:30 PM - 4:15 PMPost-Quantum Cryptography [CRYP-W14]Guillaume EndignouxWednesday, April 18, 2018 | 3:00 PM - 3:45 PMHow to Successfully Harness Machine Learning to Combat Fraud and Abuse [MLN-R12]Elie BurszteinThursday, April 19, 2018 | 1:45 PM - 2:30 PMSecurity and Privacy of Machine Learning [MLN-R14]Ian GoodfellowThursday, April 19, 2018 | 3:00 PM - 3:45 PMGoogle and Microsoft Debut: Replacing Passwords with FIDO2 Authentication [IDY-F02]Sam SrinivasFriday, April 20, 2018 | 10:15 AM - 11:00 AMGoogle on BeyondCorp: Empowering Employees with Security for the Cloud Era [EXP-F02]Jennifer LinFriday, April 20, 2018 | 10:15 AM - 11:00 AMIf you’re planning on attending RSA Conference 2018, please stop by—we’d love to say hello. For more information, or to register, visit our website.[...]Join us for our Google Cloud Security Talks during RSA Conference 2018.


Media Files:
https://storage.googleapis.com/gweb-uniblog-publish-prod/images/gcsecuritytalks_blog.max-600x600.png




We've been busy! 20+ Google Cloud security announcements from MarchWe've been busy! 20+ Google Cloud security announcements from MarchVP of Marketing

Thu, 29 Mar 2018 15:00:00 -0000

As Urs said last week, security is one of the biggest issues of our time, and with the cloud, we are able to tackle it together. At Google Cloud, we’re always working to help organizations keep up with evolving threats, protect their sensitive data, and empower innovation—all while giving them control and visibility. That’s why over the past several days we’ve announced a broad range of security products and enhancements. With so much to share, we thought it would be helpful to put all the news in one handy location.Here’s a recap of our security announcements in March.Chrome Enterprise1. New enterprise mobility management (EMM) partnershipsWe announced four new partnerships with EMM providers to help IT admins manage and implement security policies across their full fleet of devices from a single place. Cisco Meraki, Citrix XenMobile, IBM MaaS360 with Watson, and ManageEngine Mobile Device Manager Plus now support Chrome Enterprise.2. Chrome OS Active Directory enhancementsBuilding on our initial integration with Active Directory last August, we’ve added a number of enhancements to help admins manage Chrome OS alongside legacy infrastructure. These include the ability to authenticate to Kerberos and NTLMv2 endpoints on local networks directly from Chrome OS, support for common enterprise Active Directory setups like multiple domain scenarios, and improved existing certificate enrollment flows.3. Expanded management capabilities in Chrome Browser and Chrome OSChrome Enterprise lets admins fine tune more than 200 security policies and grant secure, authorized employee access to online resources. This month, we added even more controls, including per-permission extension blacklisting, disabled sign-ins, and device-wide certificates.Cloud Identity4. Cloud IdentityCloud Identity is a new, standalone Identity as a Service (IDaaS) solution that offers premium features such as account security, application management and device management in one place. With Cloud Identity, employees get simple, secure access to their business-critical apps and devices, while administrators get the tools they need to manage it all in one integrated console.Google Cloud Platform5. Access TransparencyTrust is paramount when choosing a cloud provider, and we want to be as open and transparent as possible. Access Transparency gives you near real-time logs when Google Cloud Platform administrators access your content, offering an audit trail of actions taken by Google engineers and support whenever they interact with your content on GCP.6. Cloud ArmorCloud Armor, our new Distributed Denial of Service (DDoS) and application defense service, is based on the same technologies and global infrastructure that we use to protect services like Search, Gmail and YouTube. Global HTTP(S) load balancing provides built-in defense against infrastructure DDoS attacks. Cloud Armor works in conjunction with global HTTP(S) load balancing and enables you to customize defenses for your internet-facing applications. Its capabilities include IP blacklisting/whitelisting, geo-based access control, custom rules via a rules language and defense against application-aware attacks like SQL Injection.7. Cloud Security Command Center (alpha)The new Cloud Security Command Center (Cloud SCC) is a security and data risk platform that lets you view, analyze, and monitor an inventory of your cloud assets, scan storage systems for sensitive data, detect common web vulnerabilities and review access rights to your critical resources—all from a single, centralized dashboard. Detect threats and suspicious activity with Google anomaly detection as well as security partners s[...]


Media Files:
https://storage.googleapis.com/gweb-uniblog-publish-prod/images/POM20announce_blog.max-600x600.png




Recruiting gets easier with candidate discovery in Hire by GoogleRecruiting gets easier with candidate discovery in Hire by GoogleProduct Manager, Hire

Wed, 28 Mar 2018 16:00:00 -0000

On average, companies engage with 250 candidates before finding the single candidate they want to hire. Often, many of the 249 that don’t get hired are a great fit for future openings—but companies haven’t always had an easy way to identify past candidates that might be a good match for new jobs.

That’s why we’re excited that today, Hire by Google is introducing candidate discovery in beta. Candidate discovery is an intuitive search capability that gives recruiters a head start by helping them quickly create a short list of past candidates who are a fit for new positions. This saves recruiters time, because they can now easily identify and re-engage known candidates instead of spending time trying to find new ones.

With this new candidate discovery functionality, recruiters and hiring managers can now:

  • Find qualified candidates immediately upon opening a job. The first step in filling a role should be checking who you already know that fits the job criteria. Candidate discovery creates a prioritized list of past candidates based on how their profile matches to the title, job description and location.
  • Use a search capability that understands what they are looking for.Candidate discovery understands the intent of what recruiters and hiring managers are looking for. It takes a search phrase like “sales manager Bay Area” and immediately understands the skills and experiences relevant to that job title, as well as which cities are part of the Bay Area. That means the search results will include candidates with sales management skills even if their past job titles are not an exact keyword match.
  • Easily search by previous interactions with candidates. Hire lets recruiters search and filter based on the previous interactions with the candidate, such as the type of interview feedback they received or whether you extended them an offer before. Candidates with positive feedback will rank higher in search results than those without, and candidates who received an offer in the past but declined it will rank higher than those who were previously rejected.

Hire customers who participated in the Trusted Tester program for this capability have found that it helps them fill jobs faster. Teresa Olsen, Director of Talent Acquisition at Productive Edge, says: “Candidate discovery is intuitive in a way I’ve never seen before. I’ve never had a system find relevant candidates so quickly, even understanding acronyms. I’m really impressed that it pulls up the different iterations with a single search term.”

The new candidate discovery capability is available in beta to all Hire by Google customers. Learn more about how Hire can help you recruit faster today.

(image)


Media Files:
https://storage.googleapis.com/gweb-uniblog-publish-prod/images/CasualCafe_2025_v1.max-600x600.jpg




Extending GCP security to U.S. government customers through FedRAMP authorizationExtending GCP security to U.S. government customers through FedRAMP authorizationDirector

Fri, 23 Mar 2018 16:00:00 -0000

Google Cloud Platform (GCP), like all our products, is built with security as a core design and development principle. We go to great lengths to document how our infrastructure and platforms can help our customers keep their data safe. But third-party validation helps! That's why we're excited to announce that GCP and Google’s underlying common infrastructure have received the FedRAMP Rev. 4 Provisional Authorization to Operate (P-ATO) at the Moderate Impact level from the FedRAMP Joint Authorization Board (JAB).

FedRAMP is a U.S. government-wide program that provides a standardized approach to security assessment, authorization and continuous monitoring for cloud products and services. FedRAMP compliance is an involved process with a high quality bar for cloud data security, and a JAB Provisional Authorization requires a rigorous technical review process.

Google runs on the same infrastructure that we make available to our customers. With this authorization, we’re demonstrating our commitment to extending the benefit of GCP security to United States federal, state and local government customers. While the ATO formally meets requirements applicable to U.S. government agencies, the detailed FedRAMP documentation and audit validation is a useful standard regarding our approach to security. This authorization also enables vendors seeking their own FedRAMP certification to inherit IaaS and PaaS controls from GCP. This significantly reduces their costs and barriers for FedRAMP authorization on top of GCP. GCP’s certification encompasses data centers in many countries, so customers can take advantage of this certification from multiple Google Cloud regions.

G Suite and parts of GCP have had current FedRAMP Moderate authorizations from the U.S. General Services Administration (GSA). This JAB P-ATO expands these authorizations, and makes 49 GCP products now FedRAMP-approved. Google’s FedRAMP status is posted on the FedRAMP Marketplace, and the complete list of validated products and services can be found on our compliance page. And we’ll continue to update you as we add more services to the authorization.

Agencies and federal contractors can request access to the JAB P-ATO package by submitting a FedRAMP Package Access Request Form and begin to move through the authorization process to achieve an ATO using GCP.

We know our customers and regulators expect independent verification of our security, privacy and compliance controls, and we’re committed to continued investment in third-party certifications and validations while maintaining our focus on best-in-class security. For more information on our ongoing compliance efforts, visit our compliance page.

(image)


Media Files:
https://storage.googleapis.com/gweb-uniblog-publish-prod/images/FEDRamp-hero.max-600x600.png




Cloud Identity: Manage users, devices and apps in one locationCloud Identity: Manage users, devices and apps in one locationSenior Product Manager

Thu, 22 Mar 2018 16:00:00 -0000

Whether we’re collaborating with teammates in different parts of the world, troubleshooting client issues on location, or checking email on the way to the airport, cloud apps and mobile devices have fundamentally changed the way we work. But they’ve also changed the way businesses need to approach security.Today, the average user works on three or more devices, and needs quick access to the business apps they rely on so they can work wherever, and whenever, they need to. At the same time, IT administrators are challenged to stay on top of an ever-evolving ecosystem of users, apps and devices.At Google we’ve faced these challenges firsthand, and have applied what we learned from our experience managing billions of consumer and enterprise identities to bring you Cloud Identity. With Cloud Identity, employees get simple, secure access to their business-critical apps and devices, while administrators get the tools they need to manage it all in one unified location.Simple access for users, simple control for administratorsCloud Identity gives people simple, one-click access to the apps they need so they can work from anywhere, on any device. This means employees can focus on their work, while admins can manage identities, associated apps and devices at scale from one integrated console as people join, move within, and leave an organization.Cloud Identity’s single sign-on supports SAML 2.0 and OpenID, and works with hundreds of applications out of the box, including Salesforce, SAP SuccessFactors and Box as well as G Suite apps like Docs or Drive. And for organizations using GCP resources, Cloud Identity provides additional controls for managing users and groups across their hybrid on-premises and cloud infrastructures.Work anywhere, secure everywhereGone are the days when employees worked from one computer at their office to get the job done. Today, they need the freedom to work from anywhere, and understanding that context—what they need to do, where, and with what device—is what should guide enterprise access. Having the right mobile device and application management posture for this is paramount.Cloud Identity includes robust mobile device management for Android and iOS with many features like account wipe and passcode enforcement automatically enabled for users. Admins can use one integrated console to implement screen locks, find devices , enforce two-step verification and phishing-resistant security keys, and manage Chrome Browser usage. They also get security reports and analytics for things like suspicious logins, user activity reports and audits, and logins to third-party apps, sites and extensions.Integration partners like Salesforce have told us they’ve benefited from these additional security postures. “With the combination of the Salesforce Platform and Cloud Identity's robust support for Security Keys and Chrome management, companies can focus on delivering customer success with confidence that they're providing the right service, to the right user, at the right time,” says Chuck Mortimore, SVP of Identity & Security Product Management at Salesforce.Open standards, open ecosystemBecause of Google’s commitment to open standards in the security space, Cloud Identity was built to be open. It’s easy for customers to seamlessly integrate other cloud and on-premises directories with Cloud Identity. We’re also continuing to work with our strong ecosystem of identity partners so that customers can choose the best solutions to meet their requirements across hybrid-deployments.We’re a team of six, but Cloud Id[...]


Media Files:
https://storage.googleapis.com/gweb-uniblog-publish-prod/images/2017-05-05_1.max-600x600.png




Helping G Suite customers stay secure with new proactive phishing protections and management controlsHelping G Suite customers stay secure with new proactive phishing protections and management controlsDirector of Security, Trust and Privacy

Wed, 21 Mar 2018 13:00:00 -0000

Security tools are only effective at stopping threats if they are deployed and managed at scale, but getting everyone in your organization to adopt these tools ultimately hinges on how easy they are to use. It’s for this reason that G Suite has always aimed to give IT admins simpler ways to manage access, control devices, ensure compliance and keep data secure.Today we announced more than 20 updates to deepen and expand Google Cloud customers’ control over their security. Many of these features will be turned on by default for G Suite so that you can be sure the right protections are in place for your organization. And, even better, in most cases your users won’t have to do a thing. Here’s the break down.1. Helping to protect your users and organization with new advanced anti-phishing capabilitiesWe're applying machine learning (ML) to billions of threat indicators and evolving our models to quickly identify what could be a phishing attack in the making. Information from these self-learning ML models helps us flag suspicious content. At the same time, updated phishing security controls can be configured to automatically switch on the latest Google-recommended defenses.These new default-on protections can:Automatically flag emails from untrusted senders that have encrypted attachments or embedded scripts. Warn against email that tries to spoof employee names or that comes from a domain that looks similar to your own domain.Offer enhanced protections against spear phishing attacks by flagging unauthenticated email.Scan images for phishing indicators and expand shortened URLs to uncover malicious links.With the protections we have in place, more than 99.9% of Business Email Compromise (BEC) scenarios—or when someone impersonates an executive to get sensitive information—are either automatically moved to the spam folder or flagged with anomaly warnings to users.2. Giving you more control over mobile devices with default-on mobile managementSecuring endpoints like mobile devices is one of the best ways for businesses to keep data safe. More than 7 million devices are already managed with G Suite’s enterprise-grade mobile management solution. With new proactive security settings, basic device management is automatically enabled for your mobile devices that access G Suite.This means employees don’t have to install profiles on iOS and Android devices. It also means admins get added security management controls to help them:See which devices access corporate data in a single dashboard.Enforce pass codes and erase confidential data with selective account wipe for Android and iOS.Automatically protect Android and iOS devices, with no user intervention or device profile required.And you may have noticed we launched updates to Cloud Identity—a way for enterprises to manage users, apps and devices centrally. Cloud Identity includes user lifecycle management, account security, SSO, robust device and app management and unified reporting. Check it out.3. Offering you more visibility and insights to stay ahead of potential threatsIT admins who operate in the cloud seek tools, visibility and assistive insights to stop threats or gaps in operations before they become security incidents. This is why we introduced the security center for G Suite earlier this year. The security center is a tool that brings together security analytics, actionable insights and best practice recommendations from Google to help you protect your organization, data and users.Today, we’re introducing additions to the security center for G[...]


Media Files:
https://storage.googleapis.com/gweb-uniblog-publish-prod/images/blogheader_securitygsuite_2x.max-600x600.png