Suite • What's in G Suite Enterprise • New functionality ⁃ Meeting Experience, MDM, Archiving, Security, DLP, Use Management, Reports and Workflows • End of Year Promotional Pricing • Q&A and Next Steps Agenda
End Users Enterprise-class file sync and share Google Cloud Search (G Suite apps) Enterprise-class meetings IT eDiscovery and compliance Device management Data loss prevention (DLP) Advanced controls Rapid app dev platform Customization and extensibility
URL with someone, they can request to join a meeting • Unique number and PIN associated with each meeting • Tap-to-join dialing in Calendar and Meet make it easy to join on the go Now with up to 100 participants
Hangouts Meet video meeting to allow up to 100,000 people to watch in view-only mode • To stream a meeting, add a stream URL in the Calendar event and send it to view-only guests
the same domain as the organizer can start and stop a recording from web or Hangouts Meet hardware • All participants are notified that the meeting is being recorded • Meetings can be recorded for up to 4 hours • Recordings are saved to a “Meet Recordings” folder in the Drive of the meeting owner and the recording is automatically attached to the Calendar event and shared with all invited guests in the same domain
enroll all company owned devices for MDM • Easily enforce device-owner mode on multiple Android company-owned devices • Not be dependent on the end user to enable device-owner mode • gather info on each and every Android device/app accessing G Suite
Wipe Automate with our APIs Wipe corporate devices Remove Google Account Remove managed 3rd party apps Block G Suite access Revoke Google Auth token Time based work access Access based on min OS/App version Custom device approval workflow Account Wipe after X failed unlocks
are securely managed in-place, with no need to duplicate the data • Retention Define retention policies to ensure business critical data is preserved and properly managed • eDiscovery Search, identify, preserve and collect data based on custodian, content and metadata
sophisticated, high performing custom queries • Retain data for a configurable period • Create custom reports and dashboards using analytics tools such as Data Studio, Tableau, etc
Usage Collaboration Engagement Security Risk assessment Example: List the top 10 domains our account exchanged mail within the last 30 days Example: Message summary view for up to 1,000 records marked as spam Example: Message summary view for up to 1,000 records matching a given subject
highly customized reports BigQuery enables more customizable reports than those available in existing pre-defined reports in the Admin console. • Keep and analyze a longer data history BigQuery enables indefinite data storage (existing Admin console reports cover 180 days) to help long-term trend analysis. • Join Google apps data with other datasets BigQuery enables users to join other data sets, for example Payroll or Finance, to create comprehensive reports
2016 Data Protection & Breach Guide: 91 Percent of Breaches Avoidable. 2- Gartner. 2017. The transformative impact of cloud adoption. The average IT organization has to manage 1,427 cloud services2 30% Of Data breaches caused by employees due to a lack of internal controls1
traffic for sensitive data, such as credit card, social security numbers, or custom rules Predefined content detectors • Covers personally identifiable information (PII) in several countries and HIPAA data • Custom content detectors using regex • Content detection thresholds • Specify appropriate action Attachment scanning • Documents, presentations, spreadsheets
e.g., Credit Card, Tax File Number etc. in multiple countries Custom rules • Easy to create custom rules with keywords and regular expressions Optical Character Recognition (OCR) • Common image types and scanned documents are analysed for DLP Content thresholds • Reduce false positives with custom frequency and confidence thresholds
organizations that you trust by whitelisting their domain example.co.jp company.com factory.com Share files and folders with users in the trusted domain
analytics to flag threats Example use cases: 1) Your team can have visibility into which users are being targeted by phishing so that you can head off potential attacks 2) When Google Drive files trigger DLP rules, you have a heads up to avoid risking data exfiltration
Device Usability One Per Site, Expensive, Fragile User Experience Users find it hard Phishable OTPs are increasingly phished $ ? The reality of One Time Passwords Protecting Accounts With Unphishable Security Keys
web sessions for Google services (e.g. four hours, seven days, or infinite) • Unless a user logs out on their own beforehand, they’ll be automatically signed out at the end of that duration and prompted to re-enter their login credentials
◦ Get an overview of key security metrics like spam volume, email authentication, and Drive sharing • Security health page ◦ Understand how your organization’s security settings are configured, and get suggestions based on best practices
suspicious device activity, visibility into how spam and malware are targeting users within your organization and metrics to demonstrate comprehensive security effectiveness—all in a unified dashboard
POP/IMAP access, whitelists Drive Apply policies around file sharing, Drive add-ons, offline availability, stringent sign-in requirements Device Management Comprehensive action list for Mobile Device Management to mandate secure access Security Understand how 2-step verification is being used across users and admins Hangouts Checks around out of domain Hangout warnings being in place for all users Sites and Groups Check group sharing options and allow public groups on a case by case basis
insights Proactive health check Security analytics, actionable insights and best practice recommendations from Google in a single comprehensive dashboard.
is being exposed through file sharing • Visibility into phishing messages targeting users within your organization • Metrics to demonstrate your security effectiveness
meet your organization’s authentication standard • Insight into the Drive files triggering DLP rules • Take action against potential data exfiltration - intended and unintended • Visibility into BEC scams threats and device compromise
shared outside your domain and the DLP rules that have been triggered on the shared files. Authentication Find out how many messages don’t meet your authentication standards - DMARC, DKIM, SPF. Encryption Ensure that that messages sent by your domain are encrypted by TLS. Info on domains that are sending unencrypted messages to you. Email Delivery See what percentage of incoming messages were accepted and whether whitelisting caused any suspicious messages to get delivered. Spam and malware classification Deeper dive into messages spam, phishing, suspicious or malware. User perception Re-evaluate whitelists by finding out whether users are tagging delivered messages as spam/not spam or phishing.
content, communication, mobility and user security. See which organizational units (OUs) are adhering to security best practices and the ones that could be improved. Quickstart guide to recommended security settings that outlines consequences of inaction.
monitor the configuration of your security-related Admin console settings - all from one location in the Google Admin console - and make changes to those settings if needed. Gmail settings Calendar settings Drive settings Sites settings Hangouts settings Groups settings Security settings Device management settings Marketplace apps settings
12 Month Agreement — 33% discount ($16.67/user) 24 Month Agreement — 38% discount ($15.63/user) G Suite Enterprise promos available today for companies of any sizes until December 21, 2018 G Suite Enterprise $25/user