10/29/2019
01:40 PM

Google Cloud Adds New Security Management Tools to G Suite

Desktop devices that log into G Suite will have device management enabled by default, streamlining processes for IT admins.



Google Cloud today debuted a new release of security and identity management tools for G Suite in an effort to give enterprise IT administrators more streamlined control over devices.  

Desktop devices that log into G Suite will have fundamental device management enabled by default. When a user logs in to G Suite through any browser on a Windows, Mac, Chrome, or Linux machine, it will automatically be registered with endpoint management. Users don't have to install agents or profiles on the device. Admins can view device type, operating system, first sync time, and last sync time via the admin console. They can also sign users out from a device.

The idea behind fundamental device management is to give admins a clearer picture of all machines accessing corporate data and help them make security and policy decisions about how to manage enterprise devices. Through the console, admins can identify which devices need operating system updates or remotely log someone out if a computer is lost or stolen.

Today's update also gives admins the ability to filter for devices that don't have endpoint verification, which can help them identify which are accessing corporate data without it. Google Cloud points out this can aid in the deployment of context-aware access control, which relies on endpoint verification and lets admins create granular control policies for apps based on factors like user identity, location, device security status, and IP address. Context-aware access for G Suite is now generally available for G Suite Enterprise and G Suite Enterprise for Education.

Fundamental device management begins rolling out today. An extended rollout could take longer than 15 days for feature visibility; Google says it could take up to six months to reach all domains.

Read more details here.

This free, all-day online conference offers a look at the latest tools, strategies, and best practices for protecting your organization’s most sensitive data. Click for more information and, to register, here.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Email This  | 
Print  | 
RSS
More Insights
Copyright © 2019 UBM Electronics, A UBM company, All rights reserved. Privacy Policy | Terms of Service