Choose between G suite versus Office 365 :

IT admins are facing a war for their IT infrastructure.The question they have is, which cloud productivity platform is better for their organisation? comparing G Suite vs. Office 365 is an oft-performed exercise.In this case we can help you for how to think about the issue.

The challenge is far less about the technical features than about the overall strategy of your organisation. Furthermore, a core question to ask is, “How will you centrally manage G Suite or Office 365 users?” It is vital to look at the broader picture when contemplating G Suite vs. Office 365.

Why upgrade to G suite Business(unlimited) edition:

In addition to all the features included with G Suite Basic, when you upgrade to G Suite Business you'll receive a number of premium business-grade services, including:

  • Unlimited storage

  • Google Vault

  • Advanced Drive controls

  • Audit and reporting features

  • Mobile features:

    • Audits  

    • Alerts

Differences between G-Suite basic, G suite Business and G Suite Enterprise:

    With the 'Basic' plan, you get

  • Business email addresses (

  • Video and voice calls

  • Shared online calendars

  • Online documents, spreadsheets and slides

  • 30 GB of online storage for file syncing and sharing

  • Project sites (a way to build simple websites or intranet)

  • Security and admin controls

  • 24/7 phone and email support.

    With the 'Business' plan, in addition to the above you get

  • Unlimited file storage (or 1TB if your organisation has less than 5 users)

  • Audit and reporting insights for Drive content and sharing

  • Google Vault: eDiscovery covering emails, chats, docs and files

  • Email archives / message-retention policies

    With the 'Enterprise' plan, you get all the features of the 'Basic' and 'Business' plans plus

  • data loss prevention for files and email

  • integration with third party tools

  • advanced admin controls and security

  • additional reporting on email usage via BigQuery

Best deployment and change management practices for 300 plus users migration:

Evonence puts a great deal of emphasis on developing successful change management programs for our clients.Our G Suite change management experts use Google’s proven change management methodology.

  • Effective Scope and Resource

Establish a working group for G Suite change management project work streams with tracker and project timeline delivery. This creates a solid project foundation which delivers a firm plan and incorporates communications and training strategy with key audience group identification.

  • Documentation

Identify audience group training material based upon group learning objectives. Customised G Suite material and relevant delivery platforms are established, incorporating a secure Web based G Suite training portal and user documentation etc.

  • Communications Planning

Establish a timeline per audience group / geography / language with communication mechanisms. Utilise highly effective customised G Suite user communication channels such as intranet, poster material with channels established and delivered.

  • Hands on Training

Establish the appropriate training delivery model. Evonence employ fully certified change management resources to deliver effective training. This incorporates design and development of G Suite training materials, logistics management, delivery and evaluation. The outcome is an execution of the G Suite training delivery strategy and audience delivered learning objectives.

  • Ongoing Support

We understands the importance of an ongoing support infrastructure to maximise the benefit of G Suite to assist the users. As part of the ongoing support program, a strategy for keeping users up-to-date of G Suite service developments, best practice sharing and the up-skill of new employees is defined.

  • Successful Evaluation

Evaluation processing are continuously applied throughout the entire change management process. User readiness gauged through evaluation surveys, deployment feedback documents and post live date forms are utilised to ensure the work force has effectively adopted G Suite for Business.

Reduce Technology cost with G suite adoption:

  • Run your business instead of running your IT systems.

Google Apps is 1/3 the total cost of competing solutions,no special hardware or software is required for this, so you can totally focus on your business only.This will provide better reliability than on-premises solutions, with a 99.9% up-time guarantee (Premier edition)data can remain on Google's infrastructure, rather than on unsecured devices save the high costs of employing or buying in IT support.

According to Google, “Google Apps offers simple, powerful communication and collaboration tools for any size business – all hosted by Google to streamline setup, minimise maintenance, and reduce IT costs.”By running your email through Google Apps you will no longer need to pay a separate fee for email from places like GoDaddy. Google Apps lets you run up to business emails with affordable price.

G suite Admin capabilities review:

  • G Suite Admin can Manage G Suite for your organisation

Easily add users, manage devices, and configure security and settings so your data stays safe. Administration shouldn't need a manual.

  • Security and control

Centralised administration makes setup and management fast and easy. Add and remove users, set up groups, and add security options like 2-step verification and SSO.

  • Mobile device management

Distribute apps to employees and keep data secure on employee’s iOS and Android devices. Use mobile management to distribute apps and get employees up and running quickly, check usage, manage security settings, and lock or wipe devices remotely.

G-Suite Security setup:

G Suite offers administrators extensive control over system configuration and application settings—all integrated into a dashboard that includes many easy-to-use security features.Here we will briefly describe few security features from G Suite:

  • Data Loss Prevention (DLP)

G Suite administrators can set up a DLP policy to protect sensitive information. A library of predefined content detectors is provided to make setup easy. Once the DLP policy is in place, for example, Gmail can automatically check all outgoing email and take action: either quarantine the email for review, tell users to modify the information, or block the email from being sent and notify the sender. These checks apply not only to text, but also to content within common attachment types. Learn more in our DLP whitepaper.

  • 2-step verification and Security Key

2-step verification greatly reduces the risk of unauthorised access by asking users for additional proof of identity when signing in. Our Security Key feature offers another layer of security for user accounts, by requiring a physical key. The key sends an encrypted signature rather than a code, helping to guard against phishing. G Suite administrators can easily deploy, monitor, and manage the Security Key at scale from within the Admin console — with no additional software to install.

  • G Suite identity services (IDaaS)

With the G Suite single sign-on service (SSO), customers can use one set of credentials to access multiple apps. Google products support SAML 2.0 (Security Assertion Markup Language) for more than 15 popular software as a service (SaaS) identity providers. Users can discover and connect with more than 1,000 SAML 2.0 and OpenID Connect (OIDC) apps through the G Suite Marketplace.

  • Information Rights Management (IRM)

To help admins maintain control over sensitive data, G Suite offer Information Rights Management in Google Drive. Administrators and users can disable downloading, printing, and copying from the advanced sharing menu.

  • Data Retention and eDiscovery

Google Vault lets you retain, archive, search, and export your organisation's email for your eDiscovery and compliance needs. Vault is entirely web-based, so there's no need to install or maintain extra software. With Vault, you can search your domain's email data; set custom retention policies; place user accounts (and related data) on litigation hold to preserve email data; and manage related searches.

  • Mobile Device Management (MDM)

The G Suite Admin console helps you manage your users' Android, iOS, Windows, and Blackberry devices. With MDM, you can enforce device policies throughout your organization and perform other security-related actions, such as remote wiping.

  • Suspicious login monitoring

Google uses its robust machine learning capabilities to help detect suspicious logins. When Google discover a suspicious login, they notify admins so they can work to ensure the accounts are secured.

  • Spam filters and malware detection

Google has one of the best spam filters available. G Suite use machine learning to detect and block even the most advanced types of spam. Less than 0.1% of email in the average Gmail inbox is spam, and incorrect filtering of mail to the spam folder is even less likely (under 0.05%).

To help prevent malware, Google automatically scans every attachment for viruses prior to a user downloading it. Gmail even checks for viruses in attachments queued for dispatch. This helps to protect everyone who uses Gmail, and prevents the spread of viruses.

  • Data access and restrictions

Only a small number of Google employees have access to customer data, and those who do are subject to comprehensive monitoring and logging. Access rights and levels are based on employee job function and role; G Suite use the concepts of least privilege and need-to-know to match access privileges to defined responsibilities.

  • Customer administrator roles

Customers can assign a variety of internal administrative roles and privileges to manage their users. This role-based access control in G Suite protects privacy by allowing individual team members to manage certain services or perform specific administrative functions without gaining access to all settings and data.

Chrome device management security policies set up:

The Google Chrome Management Console is a web-based management console that makes it easy to deploy and control users, devices, and apps across all your Chromebooks from a single place. By using your Google admin account, you can create user groups to apply policies for Chrome devices within your organisation. Through the User settings, you can block apps and extensions, as well as pre-install apps and extensions for the user's Chrome devices in your network.

Each purchase includes one license for enrolling a Chrome device into your organisation. The license on a damaged Chrome device can be transferred to a replacement of the same model using the de-provisioning feature within the Admin console. Licenses are not transferable from one device model to another, and license transfers will be audited.

  • Track assets

Assign devices to users and get configuration and usage reports.

  • Pre-install and block apps

Blacklist, white-list, or pre-install apps, extensions and URLs.

  • Create user groups

Apply policies, apps, and settings to different sets of users.

  • Control user access

Control who uses your Chromebooks: prevent outside users from logging in, disable Guest Mode, or designate the specific users within your domain that can use a Chromebook.

  • Configure network access

Set network and proxy settings to make it easy for users to get up and running and ensure they're protected by web filters and firewalls.

  • Customise user features

Modify user settings like bookmark and app sync across computers and brand your devices with custom Chrome themes.

Run the custom apps on Google Cloud Servers:

Google Cloud Platform is a suite of public cloud computing services offered by Google. The platform includes a range of hosted services for compute, storage and application development that run on Google server. Google Cloud Platform services can be accessed by software developers, cloud administrators and other enterprise IT professionals over the public Internet or through a dedicated network connection.

Google Cloud Platform lets you focus on what’s next for your business.It frees you from the overhead of managing infrastructure, provisioning servers and configuring networks.