Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

10/29/2019
01:40 PM
50%
50%

Google Cloud Adds New Security Management Tools to G Suite

Desktop devices that log into G Suite will have device management enabled by default, streamlining processes for IT admins.

Google Cloud today debuted a new release of security and identity management tools for G Suite in an effort to give enterprise IT administrators more streamlined control over devices.  

Desktop devices that log into G Suite will have fundamental device management enabled by default. When a user logs in to G Suite through any browser on a Windows, Mac, Chrome, or Linux machine, it will automatically be registered with endpoint management. Users don't have to install agents or profiles on the device. Admins can view device type, operating system, first sync time, and last sync time via the admin console. They can also sign users out from a device.

The idea behind fundamental device management is to give admins a clearer picture of all machines accessing corporate data and help them make security and policy decisions about how to manage enterprise devices. Through the console, admins can identify which devices need operating system updates or remotely log someone out if a computer is lost or stolen.

Today's update also gives admins the ability to filter for devices that don't have endpoint verification, which can help them identify which are accessing corporate data without it. Google Cloud points out this can aid in the deployment of context-aware access control, which relies on endpoint verification and lets admins create granular control policies for apps based on factors like user identity, location, device security status, and IP address. Context-aware access for G Suite is now generally available for G Suite Enterprise and G Suite Enterprise for Education.

Fundamental device management begins rolling out today. An extended rollout could take longer than 15 days for feature visibility; Google says it could take up to six months to reach all domains.

Read more details here.

This free, all-day online conference offers a look at the latest tools, strategies, and best practices for protecting your organization’s most sensitive data. Click for more information and, to register, here.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Our Endpoint Protection system is a little outdated... 
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-16246
PUBLISHED: 2019-12-12
Intesync Solismed 3.3sp1 allows Local File Inclusion (LFI), a different vulnerability than CVE-2019-15931. This leads to unauthenticated code execution.
CVE-2019-17358
PUBLISHED: 2019-12-12
Cacti through 1.2.7 is affected by multiple instances of lib/functions.php unsafe deserialization of user-controlled data to populate arrays. An authenticated attacker could use this to influence object data values and control actions taken by Cacti or potentially cause memory corruption in the PHP ...
CVE-2019-17428
PUBLISHED: 2019-12-12
An issue was discovered in Intesync Solismed 3.3sp1. An flaw in the encryption implementation exists, allowing for all encrypted data stored within the database to be decrypted.
CVE-2019-18345
PUBLISHED: 2019-12-12
A reflected XSS issue was discovered in DAViCal through 1.1.8. It echoes the action parameter without encoding. If a user visits an attacker-supplied link, the attacker can view all data the attacked user can view, as well as perform all actions in the name of the user. If the user is an administrat...
CVE-2019-19198
PUBLISHED: 2019-12-12
The Scoutnet Kalender plugin 1.1.0 for WordPress allows XSS.