The Lighter Side Of The Cloud – Recovery Backup
The Lighter Side Of The Cloud – Help Desk
The Lighter Side Of The Cloud – Accountability

Practically Speaking About Cloud Computing: Google Apps Part II

Advantages of Google Apps:

In September 2010, Google announced that over 30 million people are using Google Apps.

The top ten advantages as listed by Google are:

  • 1. Cloud computing is in Google’s DNA.
  • 2. Faster access to innovation drives higher productivity.
  • 3. Users adopt new functionality with less disruption.
  • 4. Employees can be productive from anywhere.
  • 5. Google’s cloud enables faster collaboration.
  • 6. Google’s immense security investments help protect customers.
  • 7. Less data is stored on vulnerable devices.
  • 8. Customers get higher reliability and uptime.
  • 9. Google Apps offers extensive flexibility and control.
  • 10. Customers spend less through Google’s economies of scale.

Security First: SAS 70 Certified and Two Step Verification: Already long time back, we know that Google Apps is certified with SAS 70 Type II Audit.

This assures the users on:

  • Logical security: Controls provide reasonable assurance that logical access to Google Apps production systems and data is restricted to authorized individuals
  • Privacy: Controls provide reasonable assurance that Google has implemented policies and procedures addressing the privacy of customer data related to Google Apps
  • Data center physical security: Controls provide reasonable assurance that data centers that house Google Apps data and corporate offices are protected
  • Incident management and availability: Controls provide reasonable assurance that Google Apps systems are redundant and incidents are properly reported, responded to, and recorded
  • Change management: Controls provide reasonable assurance that development of and changes to Google Apps undergo testing and independent code review prior to release into production
  • Organization and administration: Controls provide reasonable assurance that management provides the infrastructure and mechanisms to track and communicate initiatives within the company that impact Google Apps

Last month, Google introduced two step verification methods for apps users. We know that security is one of the prime concern in cloud computing. When we try making data accessible from anywhere through many devices, securing the information with proven access control systems becomes a critical one. It is felt that the traditional access methods like authenticating through a user name and password is not enough in all circumstances. Google Apps has introduced a more secure sign in capability: Two Step Verification. When this is enabled by administrator of the Google Apps account, it requires two means of identification to sign in. For example it may be something you know like password coupled with your mobile phone. After entering your password, a verification code is sent to your mobile phone via SMS, voice calls, or generated on an application you can install on your Android, BlackBerry or iPhone device. This makes it much more likely that you’re the only one accessing your data: even if someone has stolen your password, they’ll need more than that to access your account. Two-step verification is built on an open standard designed to allow integration with other vendors’ authentication technologies in the future. We are also open sourcing our mobile authentication app so that companies can customize it as they see fit. Adding an extra layer of security puts on par with some of the security systems used by banks.

As mentioned in the Google Security Whitepaper, the information stored on Google Apps Systems is safe and secure. Each of the ten components of Google’s multi-layered security strategy is endorsed and defended throughout the organization. Google Apps provides controls at each level of data storage, access, and transfer. Millions of organizations, including Google, Motorola Mobile Division, Salaesforce.com, Avago Technologies etc., run their businesses on Google Apps, and Google invests in that trust every day. With Google Apps, users can rest assured that Google values the privacy, confidentiality, integrity and availability of their data.

By Glenn Blake

Follow Us

Glenn Blake

Glenn Blake is a writer for CloudTweaks and has been writing about technology trends for over 25 years.
Follow Us

Latest posts by Glenn Blake (see all)

Sorry, comments are closed for this post.

Popular Archives

Using Big Data To Make Cities Smarter

Using Big Data To Make Cities Smarter

Using Big Data To Make Cities Smarter The city of the future is impeccably documented. Sensors are used to measure air quality, traffic patterns, and crowd movement. Emerging neighborhoods are quickly recognized, public safety threats are found via social networks, and emergencies are dealt with quicklier. Crowdsourcing reduces commuting times, provides people with better transportation…

Public vs. Private vs. Hybrid: Which Cloud Is Right for Your Business?

Public vs. Private vs. Hybrid: Which Cloud Is Right for Your Business?

Public vs. Private vs. Hybrid The debate surrounding the deliverability of cloud computing is coming to a close. Businesses have begun to rapidly adopt the use of cloud services, courtesy the ROI this disruptive technology brings to the table. They have finally realized they cannot afford to ignore the cloud. A Forrester study found that…

The Global Rise of Cloud Computing

The Global Rise of Cloud Computing

The Global Rise of Cloud Computing Despite the rapid growth of cloud computing, the cloud still commands a small portion of overall enterprise IT spending. Estimates I’ve seen put the percentage between 5% and 10% of the slightly more than $2 trillion (not including telco) spent worldwide in 2014 on enterprise IT. Yet growth projections…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

Cloud Migration – 10 ‘Do it Right’ Tips

Cloud Migration – 10 ‘Do it Right’ Tips

Cloud Migration – 10 ‘Do it Right’ Tips Businesses continue to adopt the cloud at break neck speed. Inherent benefits like lower operational costs, no infrastructure overheads, and quick access to better technology make cloud a very attractive proposition for businesses, especially start-ups and SMEs. However moving from legacy to the cloud environment has its…

Recent

Cloud Security Hottest Issue At RSA

Cloud Security Hottest Issue At RSA

Cloud Security Hottest Issue The integral integration of cyber security and cloud technology seemed to be the hottest issue at the busy RSA 2015 Conference in San Francisco. Interested parties packed security and cloud service booths for the duration of the conference. Several prominent publications covered the increased importance of securing their private information that’s…

Imperfect Security: The RSA Conference And The Illusion Of Safety

Imperfect Security: The RSA Conference And The Illusion Of Safety

The RSA Conference And The Illusion Of Safety This year’s 2015 RSA Conference is taking place from April 20th to 24th, in San Francisco, California. Here, security leaders from across the vast expanse of tech, politics, and more will gather to discuss the past, present, and future of security. From application security to technology infrastructure,…

The Lighter Side Of The Cloud – Day 5

The Lighter Side Of The Cloud – Day 5

By David Fletcher Are you looking to supercharge your Newsletter, Powerpoint presentation, Social media campaign or Website? Our universally recognized tech related comics can help you. Contact us for information on our commercial licensing rates. About Latest Posts Follow UsGlenn BlakeGlenn Blake is a writer for CloudTweaks and has been writing about technology trends for…

Contact Us

Sending

Technology Sponsors

hp Logo CityCloud-PoweredByOpenstack-Bluesquare_logo_100x100-01
cisco_logo_100x100 vmware citrix100
Site 24x7 200px-KPMG

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

CloudTweaks Comic Library

Advertising