Google Workspace helps create flexible workspaces that scale, no matter where you are or what device or browser you're using. At the same time, its security helps easily protect your organization's critical data. Google Workspace gives administrators greater visibility and control.
6 essential security features of Google Workspace:
-
Meet security features for users and administrators
To prevent abusive users from disrupting meetings, it is possible to classify users who were flagged as abusive and banned from previous meetings, and prevent similar users from joining meetings in the future. Administrators can investigate any abuse their users may be seeing. They have audit trails of instances where users in their domain report abuse in Meet.
Control for abusive users on Google Meet -
Chat security features to help administrators stay informed
Abusive or spammy chat rooms are also classified as such to help ensure that users are not added to those rooms. Administrators can view Chat, Meet, Groups and Calendar related logs in an integrated manner in the Security Center Investigation Tool.
-
-
Audit logs for Gmail. Â
These show when users enable automatic email forwarding outside the domain. Which could indicate a potential data loss due to a policy violation, malicious insider information or a hijacked account. This way it is possible to determine if anything needs to be done to mitigate the chances of data loss or data leakage.
-
Information on data protection.
Reports can be proactively created to understand the sensitive information stored in the organization. These insights help make more informed decisions on how to protect data. There are also fully customizable templates for quick creation and configuration of rules based on best practices.
Data protection information reports
-
-
ISO / IEC 27701 accredited certification for Google Cloud Platform as a data processor.
Google Workspace is the first major productivity suite to receive this certification. It provides guidance for implementing, maintaining and continually improving a Privacy Information Management System (PIMS), and can be used by both data controllers and data processors, a key consideration for organizations that must align with GDPR. It provides users with benefits that include simplified audit processes, universal privacy controls and greater clarity around privacy-related roles and responsibilities.
-
Access control of business applications.
Organizations often use other business applications in the cloud along with Google Workspace. In order to maintain a more secure ecosystem, Google Workspace has contextual access for SAML applications. This makes it possible to create granular access control policies for pre-built or custom SAML applications based on specific attributes, including user, geographic location, device security status and IP address. This reduces the chances of unintended access to specific applications or the data within them.
There are applications that, if they meet specific requirements, are considered "verified by Google". With application access control, it is possible to choose which applications can access Google Workspace data, restricting or allowing access to data for non-verified applications.
Showing Google verified applications in the Administration Console
Google Workspace enables increased visibility for administrators into data security issues to aid security decision making.