Secure cloud entry points with Google Chrome Enterprise
March 27th, 2018
Security is a top priority for enterprises. Employee endpoints like laptops, tablets & smartphones are increasingly becoming the target of these attacks. With hardware, firmware, browsers, apps and networks to protect, admins now face more risks than ever, while managing more devices than ever.
To make Chrome Enterprise the most secure endpoint solution for businesses in the cloud Google is adding new enhancements and security features to its business-friendly solution.
Manage devices from a single unified management solution
For many businesses, managing a broad range of devices within one unified endpoint management solution is a necessity. Apart from the existing EMM partnership with VMware Airwatch, Google is expanding with four other EMM providers.
• Cisco Meraki
• Citrix XenMobile
• IBM MaaS360
• ManageEngine Mobile Device Manager Plus
This will give the IT admins the ability to manage and implement security policies across their full fleet of devices from a single place. Enterprises can pick the solution that fits their business best.
Manage Chrome OS alongside legacy infrastructure
Google is also adding support to manage Chrome OS on legacy infrastructure. Admins can configure managed extensions directly through Group Policy Objects so users can authenticate to Kerberos and NTLMv2 endpoints on their local network directly from the browser. Further, it’s extending support for common Active Directory setups, like multiple domain scenarios.
Expand management capabilities in Chrome Browser and Chrome OS
Chrome Enterprise is designed to give IT admins the ability to grant, manage and adjust user permissions at scale, with fewer repetitive tasks. Chrome Enterprise already lets admins fine tune more than 200 security policies and grant secure, authorized employee access to online resources, and they’re continuing to add additional controls to help. In recent months they have added additional features such as
• Per-permission extension blacklisting lets admins restrict access to extensions based on the permissions required, for example, extensions that require the use of a webcam.
• Sign-ins can be disabled from an outdated OS to help administrators comply with security policies that dictate how many versions behind their users are allowed to run on.
• Admins can ensure that only managed devices can connect to their single sign-on servers by gating that access with device-wide certificates.
• Newly added support for automatic forced re-enrollment will now allow a Chrome device that has been wiped or recovered to re-enroll into the corporate domain without requiring administrator credentials.
Continually managing vulnerabilities to help businesses stay protected
Chrome OS automatically deploys security updates to ensure all devices run the latest version of Chrome OS. Chrome Browser prevents exposure to phishing and malware, and if threats are detected on third-party apps, admins can uninstall apps remotely with managed Google Play.
The proactive protection, control, and endpoint management advantages offered by Chrome Enterprise are why enterprises are deploying Chrome across their businesses.
- Digitalization without Cyber Security
- The story of university data attacks
- What is Soar?
- When Protection Fails, Forensics can still win the game
- Drones are capable to capture your communications!
- 2019 The Year of Cyber Crime
- Email Security Gateways
- Introduction to SIEM
- Insider Threat
- A beginner’s guide to Blockchain
- NoSQL – High-performance, non relational database ...
- Leveraging Cloud for Disaster Recovery
- Application Performance Monitoring
- Cognitive Security AI Driven Cyber Security
- Introduction to Container Services
- Insider Threat Detection
- Build Secure and Governed Microservices with Kafka Streams
- Add and Manage photos in Outlook messages and contacts ...
- Security on a Budget
- About CodeTwo Email Signatures for Office 365
- Googles presence in China
- Check Point Software acquires Dome9 to beef up multi-cl ...
- Exploring the benefits and challenges of hyper converge ...
- Next Generation cloud backup and data protection for Of ...
- Backup for Office 365 with Code Two
- Email Security
- Cisco Issues Security Patch
- British Airways Hacked
- AutoML Vision
- Day 2 Keynote: Bringing the Cloud to You
- CI/CD in a Serverless World
- Keynote Google
- Google Cloud Next 2018 in Under 12 Minutes
- UAE Crowned as the most Digital Friendly Country
- Ransomware continues to prey on the UAE
- Chrome for all
- Machine Learning for a Future-Facing ZTS Revolution
- The Dawn of the Cloud
- Will Cryptocurrency Replace Conventional Currency
- Internet of Thing Under Attack
- Cloud Native Computing Transforming IT Infrastructure
- Cyber Security with Artificial Intelligence
- Understanding Cybersecurity at the Corporate level
- Cryptojacking on the rise
- Google discontinues Google Search Appliance (GSA)
- Secure cloud entry points with Google Chrome Enterprise
- Cloud Infrastructure to drive UAE Cloud Computing Market
- AI to contribute $320 billion USD to Middle East GDP by 2030
- Well begun for well being
- A Spin around the Space
- Oracle opens first innovation hub with a focus on AI
- AI to bring a world of opportunities to Dubai
- The BitCoin Revolution
- Annihilating to a Green Thought
- The Intelligent Move
- Looking Right at the Face of Facebook and Google