Google Identity Services for work

Similar documents
Basic. $5/user per mo.

WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365

Securing Today s Mobile Workforce

Executive Summary Spear 150 Spear Street, Street, Suite 1400, San Francisco, CA CA

Top. Reasons Legal Teams Select kiteworks by Accellion

Centrify for Dropbox Deployment Guide

How Microsoft s Enterprise Mobility Suite Provides helps with those challenges

[ Sean TrimarcSecurity.com ]

Microsoft 365 Business FAQs

Maintain Data Control and Work Productivity

White Paper Securing and protecting enterprise data on mobile devices

Crash course in Azure Active Directory

Related Labs: Introduction to Universal Access and F5 SAML IDP (Self-paced)

SECURING AWS ACCESS WITH MODERN IDENTITY SOLUTIONS

#1 Enterprise File Share, Sync, Backup and Mobile Access for Business

Centrify for Google G Suite Deployment Guide

BlackBerry Enterprise Identity

SECURE, CENTRALIZED, SIMPLE

Microsoft: What s new and cool FY16

Go mobile. Stay in control.

Secure single sign-on for cloud applications

Unlocking Office 365 without a password. How to Secure Access to Your Business Information in the Cloud without needing to remember another password.

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS

Best Practices for Augmenting IDaaS in a Cloud IAM Architecture PAM DINGLE, PING IDENTITY OFFICE OF THE CTO

#1 Enterprise File Share, Sync, Backup and Mobile Access for Business

THE SECURITY LEADER S GUIDE TO SSO

Salesforce1 Mobile Security White Paper. Revised: April 2014

Google on BeyondCorp: Empowering employees with security for the cloud era

Deploying Lookout with IBM MaaS360

Secure Access for Microsoft Office 365 & SaaS Applications

VMware Identity Manager Administration. MAY 2018 VMware Identity Manager 3.2

Citrix ShareFile Share, store, sync, and secure data on any device, anywhere

Phil Schwan Technical

Hybrid Identity de paraplu in de cloud

Quick Heal Mobile Device Management. Available on

Symantec Endpoint Protection Family Feature Comparison

VMware AirWatch Google Sync Integration Guide Securing Your Infrastructure

Mobile Devices prioritize User Experience

Managing Microsoft 365 Identity and Access

Android Enterprise Device Management with ZENworks 2017 Update 2

VMware AirWatch Integration with Apple School Manager Integrate with Apple's School Manager to automatically enroll devices and manage classes

Salesforce Mobile App Security Guide

GLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications

WebSphere Puts Business In Motion. Put People In Motion With Mobile Apps

Office 365: Modern Workplace

Securing Office 365 with MobileIron

VMware AirWatch Chrome OS Platform Guide Managing Chrome OS Devices with AirWatch

About This Document 3. Overview 3. System Requirements 3. Installation & Setup 4

KODO for Samsung Knox Enterprise Data Protection & Secure Collaboration Platform

Adaptacyjny dostęp do aplikacji wszędzie i z każdego urządzenia

Enterprise Ready. Sean Yarger. Sr. Manager, Mobility and Identity. Making Android Enterprise Ready 1

A Practical Step-by-Step Guide to Managing Cloud Access in your Organization

Managing Windows 8.1 Devices with XenMobile

News and Updates June 1, 2017

DreamFactory Security Guide

Centrify Identity Services for AWS

Partner Center: Secure application model

Guide to Deploying VMware Workspace ONE. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager 3.1

Your Guide to EMS. Applied Tech: Your Guide to EMS. Contents

Guide to Deploying VMware Workspace ONE. VMware Identity Manager VMware AirWatch 9.1

VMware AirWatch Chrome OS Platform Guide Managing Chrome OS Devices with AirWatch

Sophos Mobile Control startup guide. Product version: 7

Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting

Integrating Okta and Preempt Detecting and Preventing Threats With Greater Visibility and Proactive Enforcement

The CISO s Guide to Deploying True Password-less Security. by Bojan Simic and Ed Amoroso

IT Security Training MS-500: Microsoft 365 Security Administration. Upcoming Dates. Course Description. Course Outline $2,

VMware AirWatch Integration with Apple School Manager Integrate with Apple's School Manager to automatically enroll devices and manage classes

Inside Symantec O 3. Sergi Isasi. Senior Manager, Product Management. SR B30 - Inside Symantec O3 1

Five Reasons It s Time For Secure Single Sign-On

GLBA Compliance. with O365 Manager Plus.

Enterprise Product Guide

VMware AirWatch Google Sync Integration Guide Securing Your Infrastructure

Maximize your move to Microsoft in the cloud

A Mobile Security Checklist: The Top Ten Threats to Your Enterprise Today. White Paper

Six Ways to Protect your Business in a Mobile World

Guide to Deploying VMware Workspace ONE with VMware Identity Manager. SEP 2018 VMware Workspace ONE

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 7

Deploying VMware Workspace ONE Intelligent Hub. October 2018 VMware Workspace ONE

Microsoft SharePoint Server 2013 Plan, Configure & Manage

Speaker Introduction Who Mate Barany, VMware Manuel Mazzolin, VMware Peter Schmitt, Deutsche Bahn Systel Why VMworld 2017 Understanding the modern sec

How Identity as a Service Makes UCaaS/SaaS Integrations More Scalable, Productive, and Secure

SAP Security in a Hybrid World. Kiran Kola

Product Brief. Circles of Trust.

The Mobile Risk Management Company. Overview of Fixmo and Mobile Risk Management (MRM) Solutions

Access Management Handbook

Enhancing cloud applications by using external authentication services. 2015, 2016 IBM Corporation

SIEM: Five Requirements that Solve the Bigger Business Issues

Mozy. Administrator Guide

Managing Your Privileged Identities: The Choke Point of Advanced Attacks

SAML-Based SSO Solution

7 Keys to Comparing Google Apps Premier Edition with Microsoft Exchange Server 2003/2007

The Device Has Left the Building

VMware Workspace ONE UEM Integration with Apple School Manager

Accessing CharityMaster data from another location

Google Sync Integration Guide. VMware Workspace ONE UEM 1902

Cloud Computing. An introduction using MS Office 365, Google, Amazon, & Dropbox.

Overview. Premium Data Sheet. DigitalPersona. DigitalPersona s Composite Authentication transforms the way IT

BYOD: BRING YOUR OWN DEVICE.

Lookout Mobile Endpoint Security. Deploying Lookout with BlackBerry Unified Endpoint Management

Virtual Machine Encryption Security & Compliance in the Cloud

Transcription:

INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new level of intelligence to make security effortless.

Introduction Millions of businesses and schools rely on G Suite identity services (IDaaS) every day when they sign in to Google products like Google Drive and Gmail. G Suite offers core identity services across all editions that make it simple, secure and reliable for users to log in and for administrators to manage usage across the organization. These core features fall into six main areas, where we focus. Single sign-on (SSO) Provisioning Directory administration Multi-factor authentication Reporting and Analytics Endpoint management SSO Endpoint Management Provisioning Reporting & Analytics Directory Administration Multi-factor Authentication Google came through for us big time. G Suite SAML support is making our Canvas authentication completely seamless for students and staff. -Tim White, Director of IT, Webb City R-VII School District On September 29, 2016, Google Apps for Work was renamed as G Suite. Original references in this document to the names Google Apps or Google Apps for Work may have been updated to reflect this change.

Single sign-on (SSO) G Suite provides customers a single sign-on service (SSO) that enables their users to leverage Google s strong authentication to access multiple apps using the same credentials. G Suite currently supports over 1,000 SAML 2.0 and OpenID Connect (OIDC) apps in addition to custom apps that use Google as an identity provider. Users can discover and connect apps through the G Suite Marketplace and administrators can manually connect apps from the Google Admin console. SSO Security (SAML 2.0) G Suite SSO is based on SAML 2.0, an XML standard that allows secure web domains to exchange user authentication and authorization data. For additional security, SSO accepts public keys and certificates generated with either the RSA or DSA algorithm. OAuth 2.0 and OpenID Connect (OIDC) G Suite supports OAuth 2.0 and OIDC, an open protocol for authentication and authorization. This allows customers to configure one SSO for multiple cloud solutions. Users can log on to third-party applications through G Suite without re-entering their credentials or sharing sensitive password information. G Suite identity services has made single sign-on to services we use every day like Salesforce and Zendesk much easier for end users, who save an hour per month, for our support team, which has seen a 25% reduction in support tickets, and for our IT team, which has experienced 20% time savings. - Vadim Solovey, Founder & CTO, DoIT International On September 29, 2016, Google Apps for Work was renamed as G Suite. Original references in this document to the names Google Apps or Google Apps for Work may have been updated to reflect this change.

Provisioning Users are the core of any identity platform and easily creating those users is important for administrators. G Suite makes user creation and provisioning easy with the unified Google Admin console and APIs. Organizations moving from Active Directory can use Google Cloud Directory Services to migrate or sync data. Once a user is provisioned, user details automatically flow throughout G Suite and are available to third-party apps or custom apps that need user attributes. For more advanced needs, third-party solutions like Ping Identity can add additional federation and integration into existing cloud or on premise services. Directory Administration The Google Admin console makes it easy to manage users. Everything from setting permissions to resetting passwords is in one location so administrators can quickly complete common tasks. Individual Google services and third-party services can be enabled at an individual or organizational unit level. This makes it easy to manage unique app permissions for different departments, like marketing and finance. For advanced needs, G Suite s identity directory provides a user management API to create, retrieve, update and delete users. The user object is extensible and the Admin console/ API provides rich search on various core and extensible user attributes so administrators can add and find details that are unique to their needs. Google provides business-critical solutions like serving as the central secure access point for cloud apps, while also providing infrastructure for these services like the identity directory. I trust Google to play this foundational role, but wouldn t expect it to meet unique needs that fall between the directory and the login. This is where best-of-breed partners like Ping come in to help us solve complex challenges unique to our business. -Justin Slaten, Manager, Enterprise Technology & Client Systems at Netflix

Multi-factor Authentication Google builds security into our structure, technology, operations and approach to customer data. Our robust security infrastructure and systems become the default for each and every G Suite customer. And beyond these measures, users are actively empowered to enhance and customize their individual security settings to meet their business needs through dashboards and account security wizards. G Suite also offers administrators full control to configure infrastructure, applications and system integrations in a single dashboard via our Admin console regardless of the size of the organization. This approach simplifies administration and configuration. 2-step verification 2-step verification adds an extra layer of security to G Suite accounts by requiring users to enter a verification code in addition to their username and password when they sign in. This can greatly reduce the risk of unauthorized access if a user s password is compromised. Verification codes are delivered on a one-time basis to a user s Android, BlackBerry, iphone, or other mobile phone. Administrators can choose to turn on 2-step verification for their domain at any time. Security Key Security Key is an enhancement for 2-step verification. Google, working with the FIDO Alliance standards organization, developed the Security Key an actual physical key used to access your Google Account. It sends an encrypted signature rather than a code and helps ensure that your login cannot be phished. Google Cloud administrators can easily deploy, monitor and manage the Security Key at scale with new controls in the Admin console with no additional software to install. IT administrators can see where and when employees last used their keys with usage tracking and reports. If Security Keys are lost, administrators can easily revoke access to those keys and provide backup codes so employees can still sign-in and get work done.

Risk-based account profiling To make accounts even more secure, Google provides additional risk-based account profiling. On detection of suspicious login attempts, a variety of login challenges will be presented automatically, while separately alerting users to the suspicious activity. Smart Lock Google is continually advancing security along multiple dimensions and recently introduced Google Smart Lock, a feature which can help employees manage their passwords and protect their devices. Smart Lock is even able to distinguish between passwords for work accounts and personal accounts on personal devices. Reporting and Analytics G Suite administrators have access to security reports that provide vital information on their organization s exposure to data compromise. They can quickly discover which particular users pose security risks by eschewing 2-step verification, installing external apps, or sharing documents indiscriminately. Administrators can also choose to receive alerts when suspicious login activity occurs, indicating a possible security threat. G Suite audit and reporting help administrators track important activities. Log-in activity for third-party apps is included so administrators have a complete picture in one place. At ExtraHop, our mantra is Security in everything we do. Enabling Google SAML was very straightforward and lets us effortlessly enforce our security policies, for example, implementing two-factor authentication for third-party SaaS services that don t support advanced security features. -Bri Hatch, Director of IT at ExtraHop Networks

Endpoint Management Mobile device management (MDM) Mobile device management in G Suite eliminates the need for on-premises device or thirdparty management solutions. Administrators can enforce policies over mobile devices in their organization, encrypt data on devices and perform actions like remotely wiping or locking lost or stolen devices. This type of control helps ensure the security of business data, even if employees choose to work on their personal phones and tablets. MDM in G Suite works with Android, ios, Windows Phone and smartphones and tablets using Microsoft Exchange ActiveSync, such as BlackBerry 10. Policy-based Chrome browser security All of the tools and features in G Suite are best supported by Google Chrome. Administrators can apply security and usage policies across Windows, OSX, Linux, ios and Android. Chrome s standard security features include Safe Browsing, sandboxing and managed updates that protect users from malicious sites, viruses, malware and phishing attacks. There are also measures in place to prevent cross-site scripting, which attackers can use to steal private data. G Suite administrators can deploy Chrome for Work across their organization and customize it to meet their needs. Over 280 policies help administrators control how employees use Chrome across devices. For example, administrators can enable automatic updates to get the latest security fixes, block or allow specific apps and configure support for legacy browsers. Chrome device management The Google Admin console applies policy to Chrome devices such as Chromebooks, Chromeboxes and Chromebox for meetings, which are fast, secure and cost-effective computers that run Chrome as an operating system. Administrators can easily manage security and other settings for their organization s Chrome devices from a single place. They can configure Chrome features for their users, set up access to VPNs and WiFi networks, pre-install apps and extensions, restrict sign-in to certain users and more.

FAQ s What does Google s identity service cost to use? Google s identity services are included in G Suite at no additional charge. G Suite starts at $5/user/ month for the basic plan and offers a premium plan at $10/user/month that includes unlimited storage, advanced audit and reporting capabilities and Google Vault for ediscovery and retention. How can I learn more about G Suite security and compliance? The Google Cloud Security and Compliance Whitepaper describes how Google protects your data, meets regulatory and compliance needs, and empowers users and administrators. Who owns the data I put into G Suite? To put it simply, the data that companies, schools and governments agencies put into our systems is theirs, whether it s corporate intellectual property, personal information or a homework assignment, Google does not own that data. That means three key things: 1. We do not use your information for any other purpose than deliver you the service you pay for. There are no Ads in Google Cloud. 2. You have control over your data. We provide you with tools to delete and export your data so that you can take your data with you at any time, use external services in conjunction with G Suite or stop using our services altogether. 3. We protect your information from third-party requests and government access. Learn more Visit get.google.com/smartlock If you are not already a G Suite customer, you can start a free 30-day trial to try all of the identity services.