Check out the DLP whitepaper for more information including the full list of predefined content creators, and learn how to get started. Gmail DLP is the first step in a long-term investment to bring rule-based security across Google Apps. We’re working on bringing DLP to Google Drive early next year, along with other rule based security systems.

As we round out the year, let’s take a look at what we did in 2015 to enhance the security, privacy and control you have over your information.

  • To verify the good work we do on privacy, we were one of the first cloud providers to invite an independent auditor to show that our privacy practices for Google Apps for Work and Google Apps for Education comply with the latest ISO/IEC 27018:2014 privacy standards. These confirm for example, that we don’t use customer data for advertising.
  • To make security easier for all, we've expanded our security toolset:
    • We introduced Security Keys to make two-step verification more convenient and provide better protection against phishing. For admins, we released Google Apps identity services, which allows secure single sign on access with SAML and OIDC support and we delivered device (MDM) and app (MAM) Mobile Management across Google Apps.
    • We launched Postmaster tools to help Gmail users better handle large volumes of mail and report spam.
    • For Google Cloud developers, the Cloud Security Scanner allows you to easily scan your application for common vulnerabilities (such as cross-site scripting (XSS) and mixed content).
    • For those who want the power and flexibility of public cloud computing and want to bring their own encryption keys, we announced Customer-Supplied Encryption Keys for Google Cloud Platform.
    • To give more transparency on how email security, even beyond Gmail, is changing over the years we published the Safer Email report.
  • We introduced new sharing features, alerts and audit events to Google Drive for Google Apps Unlimited customers. For example, administrators can now create custom alerts and disable the downloading, printing or copying of files with Information Rights Management (IRM). New sharing settings give employees better control within their organization unit and now admins can let them reset their own passwords.
  • Google Groups audit settings allow better tracking of Groups memberships. For all, the launch of google.com/privacy gives better control over personal data and Android for Work makes it easier to keep personal and work data separate on employee devices.

Companies are moving to the Cloud for all kinds of reasons, but Security and Trust remain critical and predominant differentiators between providers. That’s why millions of businesses trust Google to do the daily heavy lifting in security ─ preventing, testing, monitoring, upgrading and patching, while working towards the future. Because Google was born in the cloud, we’ve built security from the ground up across our entire technology stack, from the data centers to the servers to the services and features we provide across all of your devices. No other Cloud provider can claim this degree of security investment at every single layer.

While 2015 was a great year, there’s a lot more in store for 2016. To learn more about how our technology is evolving, please join us at the Enigma conference in San Francisco on January 25th to discuss electronic crime, security and privacy ideas that matter.


Admins can order Security Keys from online retailers or directly from a manufacturer. Multiple models are available and prices start at $6 per key. You can have a smaller model permanently in the USB slot, so it’s available at your fingertips or carry a larger removable model on your keychain or in your wallet. We hope you also take advantage of what the Security Key can do to help protect your organization. Learn more.

Share on Google+ Share on Twitter Share on Facebook

We are also launching the security wizard for Google for Work accounts. The security wizard guides users through steps they can take to turn on or adjust security features, like providing contact info for account recovery (if the domain security policy allows it), or reviewing recent account activity and account permissions. Plus, it only takes minutes for users to update their settings. This tool prioritizes all administrator settings for security features that end users are permitted to turn on. Access the wizard at g.co/accountcheckup.
Security in the cloud is a shared responsibility and keeping your company information secure is at the core of what we do everyday. By making users more aware of their security settings and the activity on their devices, we can work together to stay a step ahead of any bad guys.
Share on Google+ Share on Twitter Share on Facebook


iOS Sync will be available for Google Apps for Work, Google Apps for Education and Google Apps for Government beginning next week. Administrators should go to the Admin console to enable these new functions.

Work from anywhere, safely on your favorite device while keeping your work information secure with Google’s mobile management tools.
Share on Google+ Share on Twitter Share on Facebook

Share on Google+ Share on Twitter Share on Facebook

Share on Google+ Share on Twitter Share on Facebook

Bring your own device (BYOD) is no longer just a trend — it’s how business gets done. With thousands of mobile applications to choose from and an increasing number of websites optimized for mobile, today’s employees can work whenever and wherever they choose. It also means IT organizations now have the dual challenge of both helping employees be more productive and protecting corporate data.

We're adding new features to Google Apps Mobile Management for Android to help your organization meet these challenges head on:

  1. Inactive account wipe: Set policies that will wipe an inactive account from a device if it has not been synced for a predetermined number of days, so a lost device that wasn’t reported or the old device left in a drawer does not cause a security risk.
  2. Support for EAP-based WiFi Networks: Configure settings and distribute certificate authority (CA) based certs for EAP networks.
  3. Compromised device detection: Set policies that will detect signals for common forms of a compromised device, such as “rooting” or installing a custom "ROM", and block that device.
  4. Additional reporting fields: Access new reporting fields via the API and Admin console to better understand the devices that are in use and troubleshoot issues. Additional fields include: Serial number, IMEI, MEID, WiFi MAC address, baseband version, kernel version, build number, mobile operator/carrier, language settings, and account ownership/management.

To learn more about these mobile device management features visit our Help Center. You can also visit the Google Admin console at admin.google.com to enable this service to help you rest assured that your corporate data stays safe.
Share on Google+ Share on Twitter Share on Facebook

Share on Google+ Share on Twitter Share on Facebook

Share on Google+ Share on Twitter Share on Facebook

Share on Google+ Share on Twitter Share on Facebook

Share on Google+ Share on Twitter Share on Facebook

Share on Google+ Share on Twitter Share on Facebook


For example, we encrypt the Gmail and Google Search traffic between your computer and Google -- this protects your Google activity from being snooped on by others. We also make this protection, known as session-wide SSL encryption, the default when you’re signed into Google Drive. Because outdated software makes your computer more vulnerable to security problems, we built the Chrome browser to auto-update to the latest version every time you start it. It gives you up-to-date security protection without making you do any extra work.

Even if you don’t use Google, we work hard to make the web safer for you. Every day we identify more than 10,000 unsafe websites — and we inform users and other web companies what we’ve found. We show warnings on up to 14 million Google Search results and 300,000 downloads, telling our users that there might be something suspicious going on behind a particular website or link. We share that data with other online companies so they can warn their users.

We know staying safe online is important to you — and it is important to us too. That's why we've had independent third parties perform inspections and audits for the data protections in Google Apps.

Please take some time today to make your passwords stronger and turn on 2-step verification to protect your Google Account. Talk with friends and family about Internet safety. And visit our new Good to Know site to find more tips and resources to help you stay safe online.
Share on Google+ Share on Twitter Share on Facebook

In the early days of the cloud, security concerns were often at the top of business minds as they considered moving to Google Apps. More recently, though, security has become a major reason businesses are moving to the cloud. The reason for this shift is that businesses are beginning to realize that companies like Google can invest in security at a scale that's difficult for many businesses to achieve on their own. This investment has produced an infrastructure and a set of services with robust data protections for our customers.

Today we are proud to announce that Google Apps for Business has earned ISO 27001 certification. ISO 27001 is one of the most widely recognized, internationally accepted independent security standards and we have earned it for the systems, technology, processes and data centers serving Google Apps for Business. Our compliance with the ISO standard was certified by Ernst & Young CertifyPoint, an ISO certification body accredited by the Dutch Accreditation Council, a member of the International Accreditation Forum (IAF). Certificates issued by Ernst & Young CertifyPoint are recognized as valid certificates in all countries with an IAF member.

“As a multi-billion dollar, global provider of packaging and packaging solutions, MWV understands the value of international standards. Many of our own processes are ISO certified. So, I am thrilled that Google Apps, our core communications platform, is also now ISO certified with its recent ISO 27001 certification. This certification validates what I already knew, through due diligence, about Google Apps - that the technology, process and infrastructure offers good security and protection for the data that I store in Google Apps. I think it's important, find it assuring and am very pleased that Google Apps will be audited and certified to this Information Security Management System ISO standard on an ongoing basis”

- Chet Loveland, CISO and Global Compliance Officer, MWV
This new certification, along with our existing SSAE 16 / ISAE 3402 audits and FISMA certification for Google Apps for Government, help assure our customers that Google is committed to ongoing development and maintenance of a robust Information Security Management System (ISMS) that an independent, third-party auditor will regularly audit and certify. For more information on the security audits and certifications for Google Apps, please review our certification 1-pager.
Share on Google+ Share on Twitter Share on Facebook

Share on Google+ Share on Twitter Share on Facebook