As a cloud pioneer, Google fully understands the security implications of the cloud model. That’s why we designed our cloud services to deliver better security than many traditional on-premises solutions. We make security a priority to protect our own operations. Our customers run on that same Google infrastructure, so your organization directly benefits from these protections.
Security and data protection drive our organizational structure, training priorities and hiring processes. These principles shape our data center operations and technology. They’re central to our everyday operations and disaster planning, including how we address threats. They’re prioritized in the way we handle customer data. And they’re the cornerstone of our account controls, our compliance audits and the certifications we offer our customers. Our commitments to your business and your data are captured in our Google Cloud Trust Principles and affirm how we protect the privacy of customers whenever they use Google Workspace and Google Cloud Platform.
Google builds security into its structure, technology, operations and approach to customer data. Our robust security infrastructure and systems become the default for each and every Google Workspace customer. Beyond these levels, users are actively empowered to enhance and customize their individual security settings to meet their business needs through dashboards and account security wizards.
Google Workspace also offers administrators full control to configure infrastructure, applications, and system integrations in a single dashboard via our Admin Console—regardless of the size of the organization—simplifying administration and configuration. Consider the deployment of DKIM (a phishing prevention feature) in an on-premise email system. Traditionally, administrators would need to patch and configure every server separately, with any misconfiguration causing a service outage. Using our Admin Console, however, DKIM can be configured in minutes across thousands, or hundreds of thousands, of accounts with peace of mind and no outage or maintenance window required.
That’s just one example. Administrators have many powerful tools at their disposal, including authentication features like 2-step verification and single sign-on, and email security policies like secure transport (TLS) enforcement, which can be configured to meet the security and system integration requirements of any organization.
Resources