Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Improve your ROI with G Suite Enterprise

UpCurve Cloud
December 11, 2018

Improve your ROI with G Suite Enterprise

Learn how upgrading to G Suite Enterprise can improve your teams overall productivity and ROI.

We'll cover:
- New functionality
- Improved Scalability
- Enhanced Security
- Automated Workflows
- Digital Transformation with Google Cloud

UpCurve Cloud

December 11, 2018
Tweet

More Decks by UpCurve Cloud

Other Decks in Technology

Transcript

  1. © UpCurve Cloud | www.upcurvecloud.com Presenters Joey Maller Google Cloud

    Sales UpCurve Cloud [email protected] Brandon Ferreira Customer Success Manager UpCurve Cloud [email protected] Devon Anthony Google Cloud Account Manager Google [email protected]
  2. © UpCurve Cloud | www.upcurvecloud.com • What's New in G

    Suite • What's in G Suite Enterprise • New functionality ⁃ Meeting Experience, MDM, Archiving, Security, DLP, Use Management, Reports and Workflows • End of Year Promotional Pricing • Q&A and Next Steps Agenda
  3. Focus areas Confidential Mode Secure • Prevent malicious access from

    hijacked accounts with message expiration and revocation • Prevent accidental leaks with integrated IRM • Optional 2FA SMS for added data protection
  4. © UpCurve Cloud | www.upcurvecloud.com What’s in G Suite Enterprise?

    End Users Enterprise-class file sync and share Google Cloud Search (G Suite apps) Enterprise-class meetings IT eDiscovery and compliance Device management Data loss prevention (DLP) Advanced controls Rapid app dev platform Customization and extensibility
  5. Dial-in access to meetings hangouts.google.com/hgw-ibeg • If you share the

    URL with someone, they can request to join a meeting • Unique number and PIN associated with each meeting • Tap-to-join dialing in Calendar and Meet make it easy to join on the go Now with up to 100 participants
  6. Live stream (up to 100,000 participants) • Live stream a

    Hangouts Meet video meeting to allow up to 100,000 people to watch in view-only mode • To stream a meeting, add a stream URL in the Calendar event and send it to view-only guests
  7. Record meeting and save in Drive • Any participant in

    the same domain as the organizer can start and stop a recording from web or Hangouts Meet hardware • All participants are notified that the meeting is being recorded • Meetings can be recorded for up to 4 hours • Recordings are saved to a “Meet Recordings” folder in the Drive of the meeting owner and the recording is automatically attached to the Calendar event and shared with all invited guests in the same domain
  8. Bulk enrollment of company-owned devices • Easy for admins to

    enroll all company owned devices for MDM • Easily enforce device-owner mode on multiple Android company-owned devices • Not be dependent on the end user to enable device-owner mode • gather info on each and every Android device/app accessing G Suite
  9. Automate device workflows - Examples Block Work Access Complete Enterprise

    Wipe Automate with our APIs Wipe corporate devices Remove Google Account Remove managed 3rd party apps Block G Suite access Revoke Google Auth token Time based work access Access based on min OS/App version Custom device approval workflow Account Wipe after X failed unlocks
  10. eDiscovery, archiving and compliance • Archiving Messages and on-the-record chats

    are securely managed in-place, with no need to duplicate the data • Retention Define retention policies to ensure business critical data is preserved and properly managed • eDiscovery Search, identify, preserve and collect data based on custodian, content and metadata
  11. Third-party email archiving • Store and discover mission critical email

    in a third party archiving tool • Comply with email requirements for regulated industries • Grant user access to archives as needed
  12. Gmail Log Analysis in BigQuery • Analyze gmail logs via

    sophisticated, high performing custom queries • Retain data for a configurable period • Create custom reports and dashboards using analytics tools such as Data Studio, Tableau, etc
  13. Gmail Log Analysis in BigQuery - Examples Insight Core Product

    Usage Collaboration Engagement Security Risk assessment Example: List the top 10 domains our account exchanged mail within the last 30 days Example: Message summary view for up to 1,000 records marked as spam Example: Message summary view for up to 1,000 records matching a given subject
  14. Export G Suite logs and reports to BigQuery • Create

    highly customized reports BigQuery enables more customizable reports than those available in existing pre-defined reports in the Admin console. • Keep and analyze a longer data history BigQuery enables indefinite data storage (existing Admin console reports cover 180 days) to help long-term trend analysis. • Join Google apps data with other datasets BigQuery enables users to join other data sets, for example Payroll or Finance, to create comprehensive reports
  15. Protecting assets at scale 1-Online Trust Alliance. 2016. OTA Releases

    2016 Data Protection & Breach Guide: 91 Percent of Breaches Avoidable. 2- Gartner. 2017. The transformative impact of cloud adoption. The average IT organization has to manage 1,427 cloud services2 30% Of Data breaches caused by employees due to a lack of internal controls1
  16. Data Loss Prevention (DLP) for Gmail & Drive Easily detect

    sensitive data and apply rules to alert administrators or prevent sharing
  17. DLP for Gmail Prevents data leakage • Scans outbound email

    traffic for sensitive data, such as credit card, social security numbers, or custom rules Predefined content detectors • Covers personally identifiable information (PII) in several countries and HIPAA data • Custom content detectors using regex • Content detection thresholds • Specify appropriate action Attachment scanning • Documents, presentations, spreadsheets
  18. DLP for Drive Predefined content detectors • Detectors for PII,

    e.g., Credit Card, Tax File Number etc. in multiple countries Custom rules • Easy to create custom rules with keywords and regular expressions Optical Character Recognition (OCR) • Common image types and scanned documents are analysed for DLP Content thresholds • Reduce false positives with custom frequency and confidence thresholds
  19. Advanced DLP for Gmail and Drive files 2. Specify conditions

    to check for 1. Set the Scope 3. Specify the appropriate action Apply based on • Domain or • organizational unit • Predefined content detectors • Custom content detectors • Detection thresholds • Gmail ◦ Reject emails ◦ Quarantine emails • Drive ◦ Block external sharing ◦ Warn user ◦ Send notification To Admins ◦ Audit sensitive files
  20. Domain Whitelisting • Allow file sharing in Google Drive for

    organizations that you trust by whitelisting their domain example.co.jp company.com factory.com Share files and folders with users in the trusted domain
  21. Stay ahead of potential threats Admins can now examine security

    analytics to flag threats Example use cases: 1) Your team can have visibility into which users are being targeted by phishing so that you can head off potential attacks 2) When Google Drive files trigger DLP rules, you have a heads up to avoid risking data exfiltration
  22. • Pre-delivery scanning of email attachments and links • Opens

    in a private, secure sandbox to identify malicious files that conventional scanning misses Pre-delivery deep scanning of attachments
  23. Security key enforcement SMS Usability Coverage Issues, Delay, User Cost

    Device Usability One Per Site, Expensive, Fragile User Experience Users find it hard Phishable OTPs are increasingly phished $ ? The reality of One Time Passwords Protecting Accounts With Unphishable Security Keys
  24. Session Length control The ability to specify the duration of

    web sessions for Google services (e.g. four hours, seven days, or infinite) • Unless a user logs out on their own beforehand, they’ll be automatically signed out at the end of that duration and prompted to re-enter their login credentials
  25. Security analytics and best practices • Security dashboard and reports

    ◦ Get an overview of key security metrics like spam volume, email authentication, and Drive sharing • Security health page ◦ Understand how your organization’s security settings are configured, and get suggestions based on best practices
  26. See a snapshot of important security metrics Get insights into

    suspicious device activity, visibility into how spam and malware are targeting users within your organization and metrics to demonstrate comprehensive security effectiveness—all in a unified dashboard
  27. Security Health Gmail Checks around automatic email forwarding, DMARC settings,

    POP/IMAP access, whitelists Drive Apply policies around file sharing, Drive add-ons, offline availability, stringent sign-in requirements Device Management Comprehensive action list for Mobile Device Management to mandate secure access Security Understand how 2-step verification is being used across users and admins Hangouts Checks around out of domain Hangout warnings being in place for all users Sites and Groups Check group sharing options and allow public groups on a case by case basis
  28. Security Center for G Suite Unified security dashboards Actionable security

    insights Proactive health check Security analytics, actionable insights and best practice recommendations from Google in a single comprehensive dashboard.
  29. Unified security dashboards • Insight into how your domain's data

    is being exposed through file sharing • Visibility into phishing messages targeting users within your organization • Metrics to demonstrate your security effectiveness
  30. Actionable security insights • Analyze email messages that do not

    meet your organization’s authentication standard • Insight into the Drive files triggering DLP rules • Take action against potential data exfiltration - intended and unintended • Visibility into BEC scams threats and device compromise
  31. Dashboards & Insights File Exposure Know which files have been

    shared outside your domain and the DLP rules that have been triggered on the shared files. Authentication Find out how many messages don’t meet your authentication standards - DMARC, DKIM, SPF. Encryption Ensure that that messages sent by your domain are encrypted by TLS. Info on domains that are sending unencrypted messages to you. Email Delivery See what percentage of incoming messages were accepted and whether whitelisting caused any suspicious messages to get delivered. Spam and malware classification Deeper dive into messages spam, phishing, suspicious or malware. User perception Re-evaluate whitelists by finding out whether users are tagging delivered messages as spam/not spam or phishing.
  32. Security Dashboard The security dashboard provides an overview of the

    many different report types in separate panels. File exposure report Authentication report Custom settings report Encryption report Message delivery report Spam filter reports - All - User report Failed device login attempts report Compromised device events report Spam filter reports - Phishing - Spam filter reports - Malware - Suspicious device activities report
  33. Proactive security health Customized advice on security best practices for

    content, communication, mobility and user security. See which organizational units (OUs) are adhering to security best practices and the ones that could be improved. Quickstart guide to recommended security settings that outlines consequences of inaction.
  34. Security Health page The security health page enables you to

    monitor the configuration of your security-related Admin console settings - all from one location in the Google Admin console - and make changes to those settings if needed. Gmail settings Calendar settings Drive settings Sites settings Hangouts settings Groups settings Security settings Device management settings Marketplace apps settings
  35. • Data exfiltration • Data leaks • Data deletion •

    Malicious insider • Account breach • Elevation of privilege • Password cracking • Phishing/whaling ◦ Phishing attack ◦ Spear Phishing attack ◦ Whaling attack • Spoofing • Malware Threat types
  36. © UpCurve Cloud | www.upcurvecloud.com Integrate with apps in G

    Suite Encryption Corporate & Social Portal Identity Access Business Communications
  37. © UpCurve Cloud | www.upcurvecloud.com Special End of Year Pricing

    12 Month Agreement — 33% discount ($16.67/user) 24 Month Agreement — 38% discount ($15.63/user) G Suite Enterprise promos available today for companies of any sizes until December 21, 2018 G Suite Enterprise $25/user