Technology Background

Locked Down: Google Chrome Delivers Secure Cloud Computing

Posted by Steve Holly, Product Manager, Chrome & Devices on Sep 6, 2018

chromebookThe last time we discussed Google Chrome here in the Onix blog, we looked at its speed. Now let’s talk security. Simply put...Google Chrome is secure. How secure? Here’s a look at how it provides some of the cloud’s tightest security.

Google built Chrome OS and its related devices for the web, focusing on four key pillars: Speed, Simplicity, Shareability and Security. I don’t have to tell you that security in the cloud is a big deal and will continue to undergo close scrutiny.

As Google noted in a blog post back in March, “...[in 2017] alone, 98 percent of businesses were affected by malware, and employee endpoints — like laptops, tablets, and smartphones — were increasingly the target of attacks.”

That’s where Google Chrome comes in. These workplace collaboration devices and the browser have security built into every level so it offers end-to-end protection across your enterprise. As Google says, this security isn’t “bolted on.”

Chrome addresses the concerns cybersecurity pros have about the cloud, while eliminating the need for cyclical security patches, virus definitions updates, storage encryption and malware scanning.

Out of the box, Chrome devices deliver unbeatable security across your collaboration tools and endpoints from boot to shut-down, including…

  • Hardware-backed cryptographic proof of verified boot and enterprise enrollment status
  • Quick, ephemeral user sessions
  • Automatic full-disk and user profile encryption
  • Theft prevention

But, as they say on those “As Seen on TV” ads, “Wait! That’s not all!”

With Chrome, you can create custom per-user encryption and access policies. Seamless updates ensure you are running the latest, most-protected version of Google Chrome. And Google’s own firmware ensures a verified boot at every startup.

Chrome’s sandboxing feature prevents malware, spyware and viruses from spreading to other open tabs. It does this on a site-by-site and app-by-app basis, so each affected tab or app is contained.

And if a threat or vulnerability is identified, Google engineers can quickly push a fix to every Chrome user thanks to the power of the cloud.

Chrome OS also gives administrators per-permission blacklisting extensions, allows them to disable sign-ins from an outdated OS — and gives them the option for forced, re-enrollment for Chrome devices that have been wiped or recovered — free of administrator credentials.

These are just a few of the enhancements that have helped Chrome turn up the heat on Microsoft Windows. It hasn’t gone unnoticed. The word is out about Chrome’s fantastic security features.

Change can be daunting. And it’s often easy to keep doing the same thing as always — like maintaining a Microsoft-based enterprise solution across your organization.

But when it comes to cloud security, a change to Chrome is a change for a better, more secure cloud experience.

Topics: Google Chrome, Workplace Cloud Collaboration

cta placeholder

Request a Consultation

MEET THE AUTHOR

Steve Holly, Product Manager, Chrome & Devices

Steve Holly, Product Manager, Chrome & Devices

Since 2008, Steve has been on the forefront of the transition to cloud-based services. He has helped companies like Whirlpool, Lexmark, Fujifilm America, Celestica, The New York Times, and the Canadian Broadcast Corporation make the transition to Google’s cloud-based services. Steve spent six years in the Navy, where he got his start in computers. During his service, he visited Japan, Thailand, Bali, Austrailia, Hong Kong, and more.

MORE POSTS BY STEVE HOLLY, PRODUCT MANAGER, CHROME & DEVICES