Practically Speaking About Cloud Computing: Google Apps Part II

Google Apps Part II

Advantages of Google Apps:In September 2010, Google announced that over 30 million people are using Google Apps.

The top ten advantages as listed by Google are:

  • 1. Cloud computing is in Google’s DNA.
  • 2. Faster access to innovation drives higher productivity.
  • 3. Users adopt new functionality with less disruption.
  • 4. Employees can be productive from anywhere.
  • 5. Google’s cloud enables faster collaboration.
  • 6. Google’s immense security investments help protect customers.
  • 7. Less data is stored on vulnerable devices.
  • 8. Customers get higher reliability and uptime.
  • 9. Google Apps offers extensive flexibility and control.
  • 10. Customers spend less through Google’s economies of scale.

Security First: SAS 70 Certified and Two Step Verification:

Already long time back, we know that Google Apps is certified with SAS 70 Type II Audit.

This assures the users on:

  • Logical security: Controls provide reasonable assurance that logical access to Google Apps production systems and data is restricted to authorized individuals
  • Privacy: Controls provide reasonable assurance that Google has implemented policies and procedures addressing the privacy of customer data related to Google Apps
  • Data center physical security: Controls provide reasonable assurance that data centers that house Google Apps data and corporate offices are protected
  • Incident management and availability: Controls provide reasonable assurance that Google Apps systems are redundant and incidents are properly reported, responded to, and recorded
  • Change management: Controls provide reasonable assurance that development of and changes to Google Apps undergo testing and independent code review prior to release into production
  • Organization and administration: Controls provide reasonable assurance that management provides the infrastructure and mechanisms to track and communicate initiatives within the company that impact Google Apps

Last month, Google introduced two step verification methods for apps users. We know that security is one of the prime concern in cloud computing. When we try making data accessible from anywhere through many devices, securing the information with proven access control systems becomes a critical one. It is felt that the traditional access methods like authenticating through a user name and password is not enough in all circumstances. Google Apps has introduced a more secure sign in capability: Two Step Verification. When this is enabled by administrator of the Google Apps account, it requires two means of identification to sign in. For example it may be something you know like password coupled with your mobile phone. After entering your password, a verification code is sent to your mobile phone via SMS, voice calls, or generated on an application you can install on your Android, BlackBerry or iPhone device. This makes it much more likely that you’re the only one accessing your data: even if someone has stolen your password, they’ll need more than that to access your account. Two-step verification is built on an open standard designed to allow integration with other vendors’ authentication technologies in the future. We are also open sourcing our mobile authentication app so that companies can customize it as they see fit. Adding an extra layer of security puts on par with some of the security systems used by banks.

As mentioned in the Google Security Whitepaper, the information stored on Google Apps Systems is safe and secure. Each of the ten components of Google’s multi-layered security strategy is endorsed and defended throughout the organization. Google Apps provides controls at each level of data storage, access, and transfer. Millions of organizations, including Google, Motorola Mobile Division, Salaesforce.com, Avago Technologies etc., run their businesses on Google Apps, and Google invests in that trust every day. With Google Apps, users can rest assured that Google values the privacy, confidentiality, integrity and availability of their data.

(To Be Contd.,)

Article By Malick with CloudTweaks.com

Follow Us!

CloudTweaks

Established in 2009, CloudTweaks.com is recognized as one of the leading authorities in cloud computing information. Most of the excellent CloudTweaks articles are provided by our own paid writers, with a small percentage provided by guest authors from around the globe, including CEOs, CIOs, Technology bloggers and Cloud enthusiasts. Our goal is to continue to build a growing community offering the best in-depth articles, interviews, event listings, whitepapers, infographics and much more...
Follow Us!

Sorry, comments are closed for this post.


CloudTweaks Sponsors - Find out more!

Popular

Top Viral Impact

5 Considerations You Need To Review Before Investing In Data Analytics

5 Considerations You Need To Review Before Investing In Data Analytics

Review Before Investing In Data Analytics Big data, when handled properly, can lead to big change. Companies in a wide variety of industries are partnering with data analytics companies to increase operational efficiency and make evidence-based business decisions. From Kraft Foods using business intelligence (BI) to cut customer satisfaction analysis time in half, to a…

Cloud Infographic – Cyber Security And The New Frontier

Cloud Infographic – Cyber Security And The New Frontier

Cyber Security: The New Frontier The security environment of the 21st century is constantly evolving, and it’s difficult to predict where the next threats and dangers will come from. But one thing is clear: the ever-expanding frontier of digital space will continue to present firms and governments with security challenges. From politically-motivated Denial-of-Service attacks to…

Forrester Releases Its “15 Emerging Technologies To Watch Before 2020” Report

Forrester Releases Its “15 Emerging Technologies To Watch Before 2020” Report

15 Emerging Technologies To Watch Before 2020 The cloud, big data, the internet of things, and wearable technology have all featured heavily in Forrester’s latest list of fifteen technologies to watch before 2020. It is becoming a reality for businesses that they need to adapt and change to an increasingly technologically-minded customer base. Traditional marketing…

Cloud Infographic: Cloud Computing Growth

Cloud Infographic: Cloud Computing Growth

An excellent infographic provided by AwesomeCloud which predicts a continued high level of growth in the cloud computing industry. Potentially staggering numbers for Public Cloud IT Services of $100 Billion by 2016. Infographic Source: AwesomeCloud About Latest Posts Follow Us!CloudTweaksEstablished in 2009, CloudTweaks.com is recognized as one of the leading authorities in cloud computing information. Most of the…


Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

You can help continue to support our community by social sharing, sponsoring, partnering or contributing to this great educational resource.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021
contact@cloudtweaks.com

Join our newsletter