108.ua
Your guide to
the world of Google

0 800 800 108

Security

GOOGLE — a highly loaded network of services that can withstand:

  • over 100 billion searches per month
  • 100 hours of new videos uploaded to YouTube every minute
  • billions of users of Gmail, which is available 99.978% of the time and operates without planned downtime

Cloud storage

Millions of businesses, schools, and governments trust Google’s innovative technologies. With information increasingly stored in the cloud, customers need to be confident that their data is protected from loss and leakage. Google is committed to maintaining our customers’ trust and delivering on our data retention commitments.

Security

Over 700 security professionals, including global experts in their fields, work around the clock to identify and eliminate all kinds of potential threats.

Google's infrastructure is world-leading in terms of reliability and security, and we've invested a lot of effort into its development. Over 700 full-time specialists, including world-class computer security experts, worked on the systems to protect your information. Google constantly researches software vulnerabilities and implements protection systems, such as data encryption and two-step authentication.

Google's data centers use unique equipment, as well as special operating and file systems with increased levels of security. Each of these components is optimized for maximum security and performance. All equipment is monitored by Google specialists, who instantly respond to any system vulnerabilities and external threats.

Google was the first major cloud service provider to use Perfect Forward Secrecy, an algorithm for encrypting data when exchanging information with other companies' servers. Many companies have since followed suit or announced plans to do so.

Google encrypts email, attachments, and files in Google Drive not only while they’re in transit between your devices and Google’s servers, but also while they’re in transit between Google’s data centers.

In 2013, to protect against the latest cryptanalysis algorithms, Google doubled the length of its RSA encryption keys to 2048 bits and began changing them every few weeks.

Privacy

Google protects your information from any unauthorized access.

Independent auditor EY has confirmed that our privacy practices and contractual obligations for Google Workspace and Google Workspace for Education are compliant with ISO/IEC 27018:2014.

Google protects the information of its customers — businesses, educational institutions, and government agencies — from unauthorized access, regardless of who is trying to obtain it: from hackers to government officials.

The issue of information privacy is closely related to the issue of ownership. All data hosted on Google’s system is, by definition, the property of Google’s customer: a business, educational institution, or government agency. Google has no rights to user data, whether it is corporate intellectual property, personal information, or any other information. Google also does not sell user data to third parties.

Google does not collect, analyze, or use Google Workspace customer data for advertising purposes. However, this approach is different from the one that Google uses in its free products and services for private users.

However, Google’s automated systems scan and process emails and data in Google Workspace services to help protect information and ensure access to services. Scanning helps detect spam and malware, organizes emails into folders, and quickly provides users with search results across their accounts. Free services for individuals have additional purposes for scanning data.

When Google receives a request from a government agency to provide customer data, in accordance with its policies, Google encourages government agencies to request the data directly from the customer. Google has a rigorous process for evaluating and deciding on such requests, including requests for data under the CLOUD Act.

Reliability

Service Level Agreement Google Workspace guarantees the performance and availability of core services for 99.9% of the time

To minimize service interruptions caused by hardware failures, natural disasters, and other events, we have built a highly redundant data center infrastructure. Google Workspace customers are targeted for a recovery point objective (RPO) of zero and a recovery time objective (RTO) of zero or zero.

Google’s application and network architecture is designed to provide maximum system reliability and uptime. Google’s computing platform remains operational even in the event of hardware failures, natural disasters, or other unforeseen events, and its software has a robust failover mechanism built in.

The company’s data centers are located in different countries around the world, ensuring that all services are available 24/7, 365 days a year.

Each subsystem is not dependent on a single physical or logical server for its uptime. Multiple copies of data are distributed across groups of active Google servers, which are clustered together. In addition, information is duplicated in auxiliary data centers. Thus, in the event of a hardware failure, the data will be available from another node.

Google services are designed to be used simultaneously by millions of people. This creates special requirements for their performance and stability. Therefore, Google constantly conducts various performance tests, including testing applications under prolonged high loads to observe their impact on factors such as memory allocation and response time. In addition, stress testing is performed to verify the system's operation in unusual situations, including testing its operation under extremely high loads, a large number of repetitions of certain actions, as well as when entering large numerical values ​​and complex database queries.

The company has developed a plan to ensure uninterrupted operation for its data centers and technological processes. This plan is created in the event of major disasters (such as earthquakes) and epidemics. It is designed for the absence of necessary specialists and services for a period of up to 30 days and provides for the continuous operation of all services.

Transparency

Your data belongs to you and you have the right to know how it is used.

We’re committed to making the internet industry more transparent for our users. You can track the health of our services in real time, see the results of our system audits, and learn how our data centers are performing. Your data belongs to you, and you have the right to know how it’s being used.

Customers and regulators need to be confident that Google’s systems are secure, private, and compliant. That’s why Google regularly undergoes independent audits, where an independent auditor reviews our data centers, infrastructure, and operations. Google Workspace and Google Cloud Platform are certified to SOC1™, SOC2™, and SOC3™ (audited by the American Institute of Certified Public Accountants, AICPA), as well as ISO/IEC 27001, 27017, and 27018. Each customer can access copies of these certificates in their account through the Compliance Report Manager.

Since 2010, Google has published regular reports on the availability of services and data, providing information on how government agencies can request data and how they and other parties affect the security and privacy of data on the Internet.

Google was the first major cloud provider to launch a program that invites organizations to independently audit Google’s security systems. Moreover, any information security professional who sends Google information about a vulnerability found in their network services will receive a reward.

Google has developed a special protocol for actions in case of a breach of confidentiality, integrity, and availability of systems or data. This is a set of measures and procedures designed to eliminate and document problems, eliminate their consequences, and also notify the parties concerned about the problems that have arisen. Google’s information security service works 24/7. If the confidentiality, integrity, or availability of your data is violated, a specialist of this service or a product manager will contact you.

Endpoint management

This feature is supported in all Frontline, Business, Enterprise, and Education version packages.

When configuring Google endpoint management rules, you can choose basic or advanced mode for mobile devices, and set individual settings based on device types

Modern realities and the pace of life have radically changed the standards of work. Now employees have more freedom: they are allowed to work when it is convenient and where it is convenient. Against this background, the issue of corporate information security has become more acute.

Users of Google Workspace cloud services have access to corporate information from any device. Using Google's endpoint management feature, you can protect your organization's data on mobile devices, computers, laptops, and more.

  • Basic mobile device security
    Basic mobile device management features are enabled by default. They provide basic protection, for example, against hacking. Thanks to this, your users do not need to install a device management application.
  • Advanced mobile device security and application management features
    To better control your organization's data, use advanced mobile device management features: require stronger passwords, remotely wipe devices, manage iOS applications, work with work profiles on Android devices, and more.
  • Computer Security
    You can choose which laptops, desktops, and other endpoints can access your organization's data, and get insights about those devices. You can also lock devices, remotely sign out users, and enforce context-aware access.
  • Corporate Device Management
    You can manage all your corporate devices (mobile, laptops, and desktops) from a single place - the Google Workspace Admin Console.

Mobile app management

This feature is supported in all Frontline, Business, Enterprise, and Education version packages.

You can decide which apps Android and iOS users can find and install on their managed devices

Admins can control which apps Android and iOS users can find and install for work or school by adding them to the list of mobile and web apps in the Google Admin console. These apps can be public, including third-party security, business, and document management apps, as well as private apps. You can also include paid public apps in the list.

For more features, use Google’s advanced mobile management for Android. If you manage iOS apps, all iPhone and iPad users in your organization must install the Google Device Policy app.

You can then:

  • Force app installation
  • Prevent installation of unmanaged apps
  • Prevent users from uninstalling apps
  • Add app widgets
  • Configure apps as VPN services
  • Configure app settings for groups and sub-organizations

FAQ
Important Questions About Cloud Enterprise Storage

  • How does consolidated storage work?
  • What content counts towards your storage quota? What doesn't?
  • What happens if a user or organization exceeds the storage limit?
  • Google Drive Data Security
  • Privacy of data in Google Drive, Docs, Sheets, Slides and Vids
  • Transparent Access: View logs of Google employees' access to users' content
  • How does consolidated storage work?

    Pooled storage is shared between all users to store data such as Google Drive files, Gmail, Google Photos, and more.

    Each additional user license increases the amount of storage. Because it is pooled, users have access to more storage than their licenses allow.

    The combined storage is provided in stages:
    • At the time of purchase, you will receive access to a portion of the storage.
    • As subscription payments are made on time, the amount of space provided will increase to the total storage amount. It may take up to 72 hours from the time of payment until additional space is provided.