Why can you trust Google?



Similar documents
Google Apps Overview

Data safety at UXprobe. White Paper Copyright 2015 UXprobe bvba

Security Overview Enterprise-Class Secure Mobile File Sharing

Dropbox for Business. Secure file sharing, collaboration and cloud storage. G-Cloud Service Description

HIPAA Compliant Infrastructure Services. Real Security Outcomes. Delivered.

Data Protection: From PKI to Virtualization & Cloud

PROTECTING YOUR VOICE SYSTEM IN THE CLOUD

Ensuring Enterprise Data Security with Secure Mobile File Sharing.

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

Secure, Scalable and Reliable Cloud Analytics from FusionOps

A COMPLETE GUIDE HOW TO CHOOSE A CLOUD-TO-CLOUD BACKUP PROVIDER FOR THE ENTERPRISE

Security Controls for the Autodesk 360 Managed Services

Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)?

Addressing Legal Discovery & Compliance Requirements

How does IBM deliver cloud security? An IBM paper covering SmartCloud Services 1

CONTENTS. Security Policy

GoodData Corporation Security White Paper

Trust but Verify. Vincent Campitelli. VP IT Risk Management

Cloud Security. Peter Jopling IBM UK Ltd Software Group Hursley Labs. peterjopling IBM Corporation

Electronic Records Storage Options and Overview

Addressing Cloud Computing Security Considerations

SMS. Cloud Computing. Systems Management Specialists. Grupo SMS option 3 for sales

Uni Vault. An Introduction to Uni Systems Hybrid Cloud Data Protection as a Service. White Paper Solution Brief

ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary

Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider

The Essential Security Checklist. for Enterprise Endpoint Backup

2015 USER GROUP CONFERENCE

Enterprise Architecture Review Checklist

Security Information & Policies

Symantec Enterprise Vault.cloud Overview

Anypoint Platform Cloud Security and Compliance. Whitepaper

KUIDAS KAITSTA ANDMEID EMC TARKVARAGA?

With Eversync s cloud data tiering, the customer can tier data protection as follows:

TECHNICAL AUDITS FOR CERTIFYING EUROPEAN CITIZEN COLLECTION SYSTEMS

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST

Enterprise level security, the Huddle way.

STRONGER AUTHENTICATION for CA SiteMinder

Google Identity Services for work

Cloud Contact Center. Security White Paper

AVLOR SERVER CLOUD RECOVERY

Symantec Enterprise Vault and Symantec Enterprise Vault.cloud

The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing

Protecting Sensitive Data Reducing Risk with Oracle Database Security

Supplier Information Security Addendum for GE Restricted Data

Transporter from Connected Data Date: February 2015 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Sr. Lab Analyst

plantemoran.com What School Personnel Administrators Need to know

Symantec Enterprise Vault.cloud Overview

AVeS Cloud Security powered by SYMANTEC TM

Public Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

5 Things to Look for in a Cloud Provider When it Comes to Security

The Webcast will begin at 1:00pm EST.

Birst Security and Reliability

Top. Reasons Legal Firms Select kiteworks by Accellion

Technical Brief: Virtualization

Webrecs IT infrastructure. The Webrecs IT backend explained and how we store, backup, protect and deliver your documents to you

Cloud Computing In a Post Snowden World. Guy Wiggins, Kelley Drye & Warren LLP Alicia Lowery Rosenbaum, Microsoft Legal and Corporate Affairs

Google Apps Premier Edition. Included Yes Yes Yes Storage 25 GB Varies by deployment

Time to Value: Successful Cloud Software Implementation

Things You Need to Know About Cloud Backup

The data which you put into our systems is yours, and we believe it should stay that way. We think that means three key things.

Making the leap to the cloud: IS my data private and secure?

Securing sensitive data at Rest ProtectFile, ProtectDb and ProtectV. Nadav Elkabets Presale Consultant

Enterprise Data Protection

White Paper How Noah Mobile uses Microsoft Azure Core Services

Identity & Access Management The Cloud Perspective. Andrea Themistou 08 October 2015

Securing SaaS Applications: A Cloud Security Perspective for Application Providers

Security Architecture Whitepaper

CloudDesk - Security in the Cloud INFORMATION

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

5 Things You Didn t Know About Cloud Backup

The Most Complete Data Protection Platform for MSPs

Computing: Public, Private, and Hybrid. You ve heard a lot lately about Cloud Computing even that there are different kinds of Clouds.

Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security

ClickTale Security Standards and Practices: Delivering Peace of Mind in Digital Optimization

Paxata Security Overview

Securing The Cloud With Confidence. Opinion Piece

Every Cloud Has A Silver Lining. Protecting Privilege Data In A Hosted World

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Transform EMC Object Storage Into Enterprise Storage Services

Securing Data in Oracle Database 12c

Asigra Cloud Backup V13 Delivers Enhanced Protection for Your Critical Enterprise Data

IBM Cognos TM1 on Cloud Solution scalability with rapid time to value

John Essner, CISO Office of Information Technology State of New Jersey

How To Protect Your Data From Being Hacked

IT Security. Muscat 15+ ABOUT US IN A GLANCE

Transcription:

Why can you trust Google? Przemek Sienkiewicz Head of Enterprise CEE, Russia & CIS

Why is Security So Tough? Data Problem: Users want to access their data anytime, from anywhere 60% 1-out-of-10 66% of corporate data resides unprotected on PC desktops and laptops laptop computers will be stolen within 12 months of purchase of USB thumb drive owners report losing them, over 60% with private corporate data on them

The Traditional Security Model is Broken Data often resides on unsecured end-points like laptops and USB thumb drives Companies support multiple operating systems, each with many applications, and numerous security patches may exist for each application Companies take an average of 25-56 days to deploy patches once available Companies often can't hire and retain the foremost experts in security Companies struggle to keep up with the latest data center and data security best-practices Companies spend more than 2 billion annually on patches

Why you can trust Google? - Physical and Personnel Security Dozens of data centers for redundancy Authorized employees & vendors only Protections in place 24/7 guard coverage Electronic key access Access logs Closed circuit televisions Alarms linked to Guards stations Internal and external patrols Dual utility power feeds Backup power UPS and generators

Why you can trust Google? - Hardware and Software Infrastructure Custom built, homogeneous systems Data distribution and multi-tenant model Custom built hardware Hardened, custom built Linux software stack Quick update of all systems Data sharing across servers No one server has full readable data for business Data obfuscation on disk Life of Disk Labeling and tracking disks Erasing data, media destruction Multiple checkpoints to validate

Why you can trust Google? - Data Structure Files are split up and stored in multiple files on many machines File names are random (do not match content type or owner) Obfuscate data so that it is not human readable Data distributed across multiple locations Many thousands of files email user 1 email user 2 email user 3 email user 4 File names are anonymous on filesystem GFS GFS GFS asdfasdf fljowijf jwoieyto ghlawefij idslkjwf owefjlkas rwdfasdl taqwdefj zswefasi awefwoi caowefkj eaweflkja ilijawefl mlkaswd oasdfl rawwfikl xefsasdf zewfokjl basfawe deasdflj fasdfjok hljlijawe jlkjasdfe nasdfjol poiwefjkla yzweflkja zefojasl Machine A (Netherlands) Machine B (Belgium) Machine C (Finland)

Google Apps Reliability SLA Commitments Gmail availability 99.99% in 2011 Zero scheduled maintenance 32x more reliable than average on-premise email 46x more reliable then MS Exchange Downtime (minutes)

Google Apps Data Center Tour

Single Sign-on (On-Premise System Integration) Organization responsible for user authentication (not Google) Supports VPN and Geographic Restriction Integrates with on premise systems for additional flexibility Biometrics User/Role based authorization logic Uses Industry standard SAML 2.0

2-Step Verification Enter verification code in addition to password when signing in, except from computers you designate as trusted Codes are generated on your mobile device or sent to you via SMS or voice call

Audit API

Independent Third Party Verification Google Apps has multiple third party audits All Audits cover the following: Data Centers & Infrastructure Applications (Google Apps) Operations Software Development Lifecycle

Google does not own customer data You remain Data Controller - data is owned by you and your end users You can delete or remove your data at any time You decide if and with whom data is shared

Internal Data Protection Software development process Least privilege access, VP oversight Background checks Security & privacy focused culture http://investor.google.com/corporate/code-of-conduct.html

External Data Protection Google does not sell your content or personal information http://www.google.com/privacy Government transparency report http://www.google.com/transparencyreport US / EU Safe Harbor certified http://www.export.gov/safeharbor

Google Apps Infrastructure Summary Encrypted access to the cloud means employees don't need to copy files to vulnerable end points No more patches or upgrades to keep up with Security of the environment is managed 24x7 by industry-recognized experts at Google Infrastructure is custom-built, hardened, rapidly updatable, and redundant. Data is replicated, obfuscated and sharded across disks.

EU Data Protection Directive Regulates the processing of personal data within EU Member states must transpose the directive into country-specific laws (each is slightly different) Each country has set up a "Data Protection Authority" which implements the Directive Restricts export of personal data No "inadequate countries" allowed

Article 29 Working Party Guidance The Article 29 Data Protection Working Party was set up under the Directive 95/46/EC of the EU Parliament regarding the protection of individuals with regards to processing personal data On July 1st the Working Party issued an opinion on Cloud Computing to provide DPA's and companies guidance on Data Protection The Article 29 Working Party Guidance: Risk Analysis Third Party Audits / Transparency Legal Framework Requirements Data Transfers

Google Apps Vault Google Apps Vault enables users to archive, manage and preserve Gmail and on the record chats for information governance, ediscovery and regulatory investigations designed to reduce costs and risks Archiving Messages and on-the-record chats are securely managed in-place, with no need to duplicate the data Retention Define retention policies to ensure business critical data is preserved and properly managed ediscovery Search, identify, preserve and collect data based on custodian, content and metadata

You can trust Google because security is Part of our DNA People 250+, 24x7 security team Some of the world s leading security researchers from F500 and academia Leverage Google s expertise in security Technology Process Centralized data reduced risk of data leakage due to lost devices ISO 27001 Certification ISAE 3402 audited Reduce end-point vulnerability and manual patching Purpose-built stack means no third-party security issues Vast automated attack detection and repulsion Integrates into your security policies Get the security that protects google.com