Locked Down: Google Chrome Delivers Secure Cloud Computing

Posted by Steve Holly, Product Manager, Chrome & Devices

Sep 06, 2018


The last time we discussed Google Chrome here in the Onix blog, we looked at its speed. Now let’s talk security. Simply put...Google Chrome is secure. How secure? Here’s a look at how it provides some of the cloud’s tightest security.

Google built Chrome OS and its related devices for the web, focusing on four key pillars: Speed, Simplicity, Shareability and Security. I don’t have to tell you that secure cloud computing is a big deal and will continue to be one into the foreseeable future.

As Google noted in a blog post back in March, “...[in 2017] alone, 98 percent of businesses were affected by malware, and employee endpoints — like laptops, tablets, and smartphones — were increasingly the target of attacks.”

How Does Google Chrome Provide a Secure Cloud Experience?

That’s where Google Chrome comes in. These workplace collaboration devices and the browser have security built into every level so it offers end-to-end protection across your enterprise. As Google says, this security isn’t “bolted on.”

Google Chrome satisfies the concerns cybersecurity pros have about the cloud, while eliminating the need for cyclical security patches, virus definitions updates, storage encryption and malware scanning.


Out of the box, Chrome devices deliver unbeatable security across your collaboration tools and endpoints from boot to shut-down, including…

  • Hardware-backed cryptographic proof of verified boot and enterprise enrollment status
  • Quick, ephemeral user sessions
  • Automatic full-disk and user profile encryption
  • Theft prevention

Are There Other Benefits to Google Chrome's Built-In Security?

But, as they say on those “As Seen on TV” ads, “Wait! That’s not all!”

as seen on tv

With Chrome, you can create custom per-user encryption and access policies. Seamless updates ensure you are running the latest, most-protected version of Google Chrome. And Google’s own firmware ensures a verified boot at every startup.

Chrome’s sandboxing feature prevents malware, spyware and viruses from spreading to other open tabs. It does this on a site-by-site and app-by-app basis, so each affected tab or app is contained.

And if a threat or vulnerability is identified, Google engineers can quickly push a fix to every Chrome user thanks to the power of the cloud.

Chrome OS also gives administrators per-permission blacklisting extensions, allows them to disable sign-ins from an outdated OS — and gives them the option for forced, re-enrollment for Chrome devices that have been wiped or recovered — free of administrator credentials.

These are just a few of the enhancements that have helped Chrome turn up the heat on Microsoft Windows. It hasn’t gone unnoticed. The word is out about Chrome’s fantastic security features.

Change can be daunting. And it’s often easy to keep doing the same thing as always — like maintaining a Microsoft-based enterprise solution across your organization.

But when it comes to cloud security, a change to Chrome is a change for a better, more secure cloud experience.

Subscribe for Updates

Steve Holly, Product Manager, Chrome & Devices

Since 2008, Steve has been on the forefront of the transition to cloud-based services. He has helped companies like Whirlpool, Lexmark, Fujifilm America, Celestica, The New York Times, and the Canadian Broadcast Corporation make the transition to Google’s cloud-based services. Steve spent six years in the Navy, where he got his start in computers. During his service, he visited Japan, Thailand, Bali, Austrailia, Hong Kong, and more.

Popular posts

AWS 101: What is Amazon S3 and Why Should I Use It?

Kubernetes 101: What are Nodes and Clusters?

Google Workspace vs. Microsoft 365: A Comparison Guide (2022)