Reduce IT Risk with G Suite Enterprise

The cloud offers enterprises huge advantages and gives their teams a flexibility that is as large as their desire. G Suite offers such organizations around the globe with our work together suite of business applications. Today, more than 3 million paying organizations depend on G Suite to make collaboration less demanding. With G Suite Enterprise, Enterprises get to control all the important aspects of security.

Scan and protect Drive files using DLP rules

As a super administrator, you don't want to share sensitive content within Google Drive files outside your company domain. Now you can define rules that protect privacy using Data Loss Prevention (DLP). DLP for Drive scans your organization’s Google Drive files for sensitive content.  You'll set up policy-based actions that will be triggered when any sensitive content is detected. Available actions include sending an email to super administrators, sending an email to the user who created, edited, or uploaded a file with sensitive content, or blocking sharing of any file with sensitive content.



Predefined Content detectors in G Suite DLP.

Screen Shot 2017-07-24 at 2.40.04 PM.png


As an administrator, when you’re setting up a data loss protection (DLP) rule you can use content detectors to specify the types of sensitive content to scan and flag. Some rule templates contain predefined content detectors that automatically scan and flag this sensitive data. How the content is scanned and flagged depends on what type of content it is.

How Gmail DLP works in the background

Screen Shot 2017-07-24 at 2.40.24 PM.png

Enable hosted S/MIME for enhanced message security.

Screen Shot 2017-07-24 at 2.41.08 PM.png

You can enhance the integrity and confidentiality of your organization's email messages by enabling Secure/Multipurpose Internet Mail Extensions (S/MIME). For S/MIME encryption to work, each sender and recipient must have it enabled. They also need to exchange information, called keys, to uniquely identify each other.

Security Key Enforcement

Screen Shot 2017-07-24 at 2.41.36 PM.png

With 2-step verification, admins can opt for their company to use Security Keys, which are both easier for users and more secure against common (phishing) attacks than other methods. Security Keys plug directly into a laptop or pair with a mobile device using Bluetooth or NFC, instead of receiving a code via text. Today, we’re adding the ability for admins to enforce this measure by restricting login solely to users with a Security Key. Admins will also be able to manage the deployment of Security Keys and view usage reports.

Nisha Rajpurohit