Category Archives: Google for Work Blog

Work is going Google

Announcing Google Cloud Security Talks during RSA Conference 2018

In light of the many security incidents we can read about in the press, security continues to be a formidable challenge for many businesses. We believe that the move to a professionally managed secure Cloud infrastructure can help address this challenge.

Last week, Urs shared his thoughts on security, and we announced new initiatives such as Access Transparency as part of more than 20 security updates and enhancements to help enterprises protect their data and stay secure. Frequently, it’s better to learn about these topics in person and we can help with that.

Next month, many security professionals will come to San Francisco to the RSA Conference 2018, and we’ll offer our own Google Cloud Security Talks at Bespoke in Westfield San Francisco Centre, a five-minute walk from Moscone Center, where the RSA Conference will be held.

This series of 15 talks over two days will cover security across Google Cloud, the complex compliance and regulatory environment, shared responsibility, and best practices from Google’s own internal security processes. We’ll share more on our approach to security, as well as our roadmap from the beginning of this year through Next ‘18. Among others, featured presenters include Ben Hawkes, who heads up Project Zero, and Mark Risher, who leads Google’s Identity and Account Security team. You can see the full agenda below and register for the event on our website.

We’ll also have several interactive demos on hand to demonstrate how organizations can address security challenges such as ransomware attacks and data exfiltration.

RSA Conference 2018

We’re also excited that Googlers will be giving talks or participating on panels at the RSA Conference itself:

Threat Hunting Strategy: How to Catch Bears and Pandas [AIR-T10]
Heather Adkins
Tuesday, April 17, 2018 | 3:30 PM - 4:15 PM

Post-Quantum Cryptography [CRYP-W14]
Guillaume Endignoux
Wednesday, April 18, 2018 | 3:00 PM - 3:45 PM

How to Successfully Harness Machine Learning to Combat Fraud and Abuse [MLN-R12]
Elie Bursztein
Thursday, April 19, 2018 | 1:45 PM - 2:30 PM

Security and Privacy of Machine Learning [MLN-R14]
Ian Goodfellow
Thursday, April 19, 2018 | 3:00 PM - 3:45 PM

Google and Microsoft Debut: Replacing Passwords with FIDO2 Authentication [IDY-F02]
Sam Srinivas
Friday, April 20, 2018 | 10:15 AM - 11:00 AM

Google on BeyondCorp: Empowering Employees with Security for the Cloud Era [EXP-F02]
Jennifer Lin
Friday, April 20, 2018 | 10:15 AM - 11:00 AM

If you’re planning on attending RSA Conference 2018, please stop by—we’d love to say hello. For more information, or to register, visit our website.

Source: Google Cloud


Helping G Suite customers stay secure with new proactive phishing protections and management controls

Security tools are only effective at stopping threats if they are deployed and managed at scale, but getting everyone in your organization to adopt these tools ultimately hinges on how easy they are to use. It’s for this reason that G Suite has always aimed to give IT admins simpler ways to manage access, control devices, ensure compliance and keep data secure.

Today we announced more than 20 updates to deepen and expand Google Cloud customers’ control over their security. Many of these features will be turned on by default for G Suite so that you can be sure the right protections are in place for your organization. And, even better, in most cases your users won’t have to do a thing. Here’s the break down.

1. Helping to protect your users and organization with new advanced anti-phishing capabilities

We're applying machine learning (ML) to billions of threat indicators and evolving our models to quickly identify what could be a phishing attack in the making. Information from these self-learning ML models helps us flag suspicious content. At the same time, updated phishing security controls can be configured to automatically switch on the latest Google-recommended defenses.

These new default-on protections can:

  • Automatically flag emails from untrusted senders that have encrypted attachments or embedded scripts.
  • Warn against email that tries to spoof employee names or that comes from a domain that looks similar to your own domain.
  • Offer enhanced protections against spear phishing attacks by flagging unauthenticated email.
  • Scan images for phishing indicators and expand shortened URLs to uncover malicious links.

With the protections we have in place, more than 99.9% of Business Email Compromise (BEC) scenarios—or when someone impersonates an executive to get sensitive information—are either automatically moved to the spam folder or flagged with anomaly warnings to users.

GIF 1: Project POM G Suite

2. Giving you more control over mobile devices with default-on mobile management

Securing endpoints like mobile devices is one of the best ways for businesses to keep data safe. More than 7 million devices are already managed with G Suite’s enterprise-grade mobile management solution. With new proactive security settings, basic device management is automatically enabled for your mobile devices that access G Suite.

This means employees don’t have to install profiles on iOS and Android devices. It also means admins get added security management controls to help them:

  • See which devices access corporate data in a single dashboard.
  • Enforce pass codes and erase confidential data with selective account wipe for Android and iOS.
  • Automatically protect Android and iOS devices, with no user intervention or device profile required.

And you may have noticed we launched updates to Cloud Identity—a way for enterprises to manage users, apps and devices centrally. Cloud Identity includes user lifecycle management, account security, SSO, robust device and app management and unified reporting. Check it out.

Gif 2: Project POM G Suite

3. Offering you more visibility and insights to stay ahead of potential threats

IT admins who operate in the cloud seek tools, visibility and assistive insights to stop threats or gaps in operations before they become security incidents. This is why we introduced the security center for G Suite earlier this year. The security center is a tool that brings together security analytics, actionable insights and best practice recommendations from Google to help you protect your organization, data and users.

Today, we’re introducing additions to the security center for G Suite including:

  • New security charts to show OAuth activity and Business Email Compromise (BEC) scam threats that are specifically focused on phishing emails that may not have links.
  • New mobile management charts to help IT admins examine activity analytics and show when devices have been hijacked, rooted or jailbroken, as well as when other suspicious device activity has been detected.
  • Ways to reorganize the dashboard to focus on what is most important to your organization.
  • Ways to analyze your organization’s security health and get custom advice on security key deployment and protection against phishing scams.

Gif 3: Project POM G Suite

If you’re new to using the G Suite security center, check out these instructions to get started.

4. Providing built-in protections and controls for Team Drives

Enterprises share and store an enormous amount of content, which means admins need more controls to keep this data protected. That’s why we’re enhancing Team Drives with new security controls to give you more ways to safeguard highly-sensitive content. Now, your data can be protected by Information Rights Management (IRM) controls so you can feel confident that your company’s ideas stay “yours.”

Gif 4: Project POM G Suite

Specific updates include the ability to modify settings for Team Drives to:

  • Limit file access privilegesto Team Drives members, or only to users within your domain.
  • Add IRM controls to prevent users from printing, downloading and copying files within Team Drives.

These new security features for Team Drives will roll out over the next few weeks.

Get started

Phishing and mobile management controls are available now across all G Suite versions, and you’ll be able to use Team Drives controls in the coming weeks. If you’re a G Suite Enterprise customer, you can access the security center in the Admin console.

Source: Google Cloud


New ways to secure businesses in the cloud

From collaboration tools that accelerate productivity, to platforms that spur innovation, to AI-powered tools that drive better customer insights, the cloud is increasingly where we turn to transform businesses. It’s also where an increasing number of enterprises are turning to help protect their data and stay secure.

As Urs shared earlier this week, it’s been our belief from the beginning that if you put security first, everything else will follow. We continue to develop new ways to give our customers the capabilities they need to keep up with today’s ever-evolving security challenges. That’s why today we’re announcing more than 20 enhancements aimed to deepen and expand the control businesses have over their security environment. You can read all of our announcements in more detail on our posts covering Google Cloud Platform, G Suite and Chrome Enterprise updates. Here, we’d like to highlight three unique examples of our security functionality.

Unprecedented control to better protect your data

Google Cloud was designed, built, and is operated with security top of mind—from our custom hardware like our Titan chip, to data encryption both at rest and in transit by default. On top of this foundation, our customers have the freedom to deploy their own security controls based on their unique needs and the level of assurance they require. Today, we’re announcing VPC Service Controls to add to our broad set of protections.

Currently in alpha, VPC Service Controls help enterprises keep their sensitive data private while using GCP’s fully managed storage and data processing capabilities. Imagine constructing an invisible border around everything in an app that prevents its data from escaping, and having the power to set up, reconfigure and tear down these virtual perimeters at will. You can think of it like a firewall for API-based services on GCP. Well-defined VPC service controls can give admins a greater level of control to prevent data exfiltration from cloud services as a result of breaches or insider threats.

With this managed service, enterprises can configure private communication between cloud resources and hybrid VPC networks. By expanding perimeter security from on-premise networks to data stored in GCP services, enterprises can feel confident running sensitive data workloads in the cloud.

VPC Service Controls give admins even more precise control over which users can access GCP resources with Access Context Manager. Enterprises can create policies to grant access based on contextual attributes like user location, IP address and endpoint security status. These policies help ensure the appropriate level of protection is in place when allowing access to data in cloud resources from the internet.

Google Cloud is the first cloud provider to offer virtual security perimeters for API-based services with simplicity, speed and flexibility that far exceeds what organizations can achieve in a physical, on-premises environment.


Visibility into data risks, with actionable security insights


As use of cloud services continues to grow, clear visibility into an organization’s cloud footprint and the security status of its infrastructure is more important than ever. Businesses need the right data and actionable insights to stop threats before security incidents turn into damaging breaches. To that end, we’re announcing Cloud Security Command Center, currently in alpha.

Cloud Security Command Center is a security and data risk platform for GCP that helps enterprises gather data, identify threats and act on them before they result in business damage or loss. First, Cloud Security Command Center gives enterprises consolidated visibility into their cloud assets across App Engine, Compute Engine, Cloud Storage and Cloud Datastore. People can quickly understand the number of projects they have, what resources are deployed, where sensitive data is located, and how firewall rules are configured. With ongoing discovery scans, enterprises can view the history of their cloud assets to understand exactly what changed in their environment and act on unauthorized modifications.

Cloud Security Command Center also provides powerful security insights into cloud resources. For example, security teams can determine things like whether a cloud storage bucket is open to the internet or contains personally identifiable information, or whether cloud applications are vulnerable to cross-site scripting (XSS) vulnerabilities—to name just a few.

Finally, Cloud Security Command Center helps enterprises leverage and act on intelligence from Google and other leading security vendors. Administrators can identify threats like botnets, cryptocurrency mining and suspicious network traffic with built-in anomaly detection developed by the Google Security team, as well as integrate insights from vendors such as Cloudflare, CrowdStrike, Dome9, RedLock, Palo Alto Networks, and Qualys to help detect DDoS attacks, compromised endpoints, compliance policy violations, network intrusions and instance vulnerabilities and threats. With ongoing security analytics and threat intelligence, enterprises can better assess their overall security health in a central dashboard or through APIs, and immediately act on risks.

This is just one example of how we’re providing enterprises more visibility. Earlier this year, we announced the security center for G Suite, which provides security analytics and recommendations for our G Suite customers. Today we’re introducing additions to security center, including new charts which highlight phishing threats and suspicious device activity. You can read more about these improvements in our G Suite and GCP posts.

Transparency into how we interact with your data

Trust is paramount when choosing a cloud provider. We want to be as open and transparent as possible, allowing customers to see everything that happens to their data. Cloud Audit Logging helps answer the question of which administrators did what, where, when and why on your GCP projects.

And now, Access Transparency offers an immutable audit trail of actions taken by Google engineers and support whenever they interact with your content on GCP. Access Transparency builds on our already robust controls that restrict Google administrator activity to actions only with valid business justifications, such as responding to a specific ticket our customers have initiated or recovering from an outage.

Together, Cloud Audit Logs and Access Transparency Logs provide a more comprehensive view of admin activity in your cloud environment. We believe that trust is created through transparency, which is why we’re proud that GCP is the first to offer this level of visibility into cloud provider administrative activity.

What cloud security means for businesses

Today’s updates are just a few examples of how we’re making it easier and more secure for businesses to build and grow in the cloud—with many more still to come.

“Businesses’ path to cloud adoption relies heavily on trust; CEOs and CIOs need to feel comfortable that they are gaining significant benefit from the cloud without giving up control,” says Doug Cahill, Senior Analyst, ESG. “With these announcements, Google Cloud is continuing to provide more control and insight to customers—and commendable visibility into administrative activity within their cloud environments through Access Transparency—while offering them the peace of mind that many of the fundamental aspects of security are taken care of and constantly evolving along with the threat landscape.”

Customers like Credit Karma, Lahey Health, and Sanmina Manufacturing are working with Google Cloud to help secure their data.

“A strong security posture plays a critical role in helping us fulfill our mission of helping our members navigate the complex personal finance landscape through a predictive, data-driven recommendation system,” says Credit Karma Chief Technology Officer Ryan Graciano. “User trust is crucial to our business so security was hugely important when selecting a cloud provider. Google Cloud’s end-to-end approach met our high standards. This enables us to spend more time focusing on building the best products for our customers.”

We believe a more secure business landscape is better for everyone, and we’ll continue to develop ways to help businesses be more secure. For a closer look at all our security-related announcements today, read our in-depth posts on GCP, G Suite and Chrome Enterprise.

Source: Google Cloud


Google Cloud Next ’18—Registration now open!

Registration for Google Cloud Next ’18 isnow open—we hope you’ll join us July 24-26, 2018 at Moscone Center in San Francisco.

Each year at Next, we bring together a community of leaders, developers, and entrepreneurs to explore the ways we can build the future of the cloud, together. Join us to hear an inspiring line-up of industry innovators and Google executives including Diane Greene, CEO of Google Cloud.

Building on the energy of Next ‘17 with over 12,000 attendees, Next ‘18 will bring even more interesting keynotes, hundreds of hands-on learning opportunities, and 400 breakout and spotlight sessions on topics ranging from accessible machine learning to advances in security. We look forward to hearing from customers and partners building their businesses with Google Cloud Platform (GCP), G Suite, Maps and the latest technology across all of Google.

Space is limited, so we encourage you to secure your spot early and take advantage of the early-bird rate of $999, a savings of $500 off full-priced admission. You can learn more on the Next ’18 website.

We can’t wait to see you in July!

Source: Google Cloud


Security in the cloud

Security is one of the biggest issues of our time. Countless companies and governments have lost data because of security incidents. And just one breach could cost millions in fines and lost business—and most importantly, lose customer trust.

As a result, security is increasingly top of mind for CEOs and Boards of Directors. That’s why, this week, I’ll join Google Cloud CEO Diane Greene and many of our colleagues in New York, where we’ll meet with more than 100 CEOs to discuss security in the cloud.

At its most basic level, security is a human issue. Whether performed by individuals or organizations, cybersecurity attacks are ultimately carried out by people, regardless of motive.

Often these attacks rely on exploiting human nature, such as through phishing emails. And it’s people that they ultimately affect. By some accounts, 179 million personal records were exposed just in 2017 through data breaches.

And as a human issue, security is something we can tackle together.


Leveraging the cloud to protect against threats


Cloud providers offer a vast army of experts to protect against threats—one far larger than almost any internal team a company could invest in. In fact, if businesses were to go it alone, there wouldn’t be enough security professionals in the world to adequately protect every single company and their users.

In industries from financial services to healthcare to retail, companies are relying on the automation and scale offered by the cloud to protect their data and that of their customers—allowing their employees to focus on building their business. Many are coming to the same conclusion we have: In many cases, if you’re not moving to the cloud, you’re risking your business.

Take the CPU vulnerabilities that were disclosed in January, for example. These were major discoveries; they rocked the tech industry. But for the most part, cloud customers could go about their business. Here at Google Cloud, we updated our infrastructure through Live Migration, which required no reboots, no customer downtime, and did not materially impact performance. In fact, we got calls from customers asking if we had updated our systems to protect against the vulnerabilities—because they experienced no impact.

These won’t be the last security vulnerabilities to be uncovered; humans will never write perfect code. But the cloud makes it much easier to stay on top of them. The scale of the cloud security teams that find and mitigate emerging threats, the ability to update many systems at scale, and the automation to scan, update and protect users all contribute to cloud’s unique position to keep information and people secure.


Security at Google Cloud


Security has been paramount to Google from the very beginning. (I would know!) We’ve been operating securely in the cloud for almost 20 years, and we have seven apps with more than a billion users that we protect from threats every single day, and GCP itself connects to more than a billion IPs every day. We believe that security empowers innovation—that if you put security first, everything else will follow.

Security is in the details—and we pay attention at the most granular level. We were the first to introduce SSL email by default in 2010, we created the U2F security token standard in 2014, Chrome was the first browser to support post-quantum crypto in 2016, and in 2017 we introduced Titan, a purpose-built chip to establish hardware root of trust for both machines and peripherals on cloud infrastructure. These examples show the level of depth that we go into when thinking about security, and the role we take in pushing the industry forward to stay on top of evolving threats.

In addition, Google’s Project Zero team hunts for vulnerabilities across the internet, and have been behind the discoveries of “Heartbleed” as well as the recently-discovered “Spectre” and “Meltdown.” We also provide incentives to the security community to help us look for and find security bugs through our Vulnerability Reward Program.

We know how complex the security landscape is, and we’ve spent a lot of time thinking about how to solve this tough challenge. We’ve developed principles around security that define how we build our infrastructure, how we build our products, and how we operate.

For example, we believe it’s not enough to build something and try to make it secure after the fact. Security should be fundamental to all design, not bolted on to an old paradigm. That’s why we build security through progressive layers that deliver true defense in depth, meaning our cloud infrastructure doesn’t rely on any one technology to make it secure.

Now more than ever, it’s important for companies to make security an utmost priority and take responsibility for protecting their users. That’s true for Google too. At the end of the day, any organization is accountable to people above all, and user trust is crucial to business. If we don’t get security right, we don’t have a business.

That’s one of the reasons why I’m so passionate about cloud as a means to improve security. Google has always worked to protect users across the internet. With Google Cloud, we’re extending those capabilities to help businesses protect their users as well.

In the coming days, we'll share more about how we're pushing cloud security forward. Stay tuned.

Source: Google Cloud


Security in the cloud

Security is one of the biggest issues of our time. Countless companies and governments have lost data because of security incidents. And just one breach could cost millions in fines and lost business—and most importantly, lose customer trust.

As a result, security is increasingly top of mind for CEOs and Boards of Directors. That’s why, this week, I’ll join Google Cloud CEO Diane Greene and many of our colleagues in New York, where we’ll meet with more than 100 CEOs to discuss security in the cloud.

At its most basic level, security is a human issue. Whether performed by individuals or organizations, cybersecurity attacks are ultimately carried out by people, regardless of motive.

Often these attacks rely on exploiting human nature, such as through phishing emails. And it’s people that they ultimately affect. By some accounts, 179 million personal records were exposed just in 2017 through data breaches.

And as a human issue, security is something we can tackle together.

Leveraging the cloud to protect against threats

Cloud providers offer a vast army of experts to protect against threats—one far larger than almost any internal team a company could invest in. In fact, if businesses were to go it alone, there wouldn’t be enough security professionals in the world to adequately protect every single company and their users.

In industries from financial services to healthcare to retail, companies are relying on the automation and scale offered by the cloud to protect their data and that of their customers—allowing their employees to focus on building their business. Many are coming to the same conclusion we have: In many cases, if you’re not moving to the cloud, you’re risking your business.

Take the CPU vulnerabilities that were disclosed in January, for example. These were major discoveries; they rocked the tech industry. But for the most part, cloud customers could go about their business. Here at Google Cloud, we updated our infrastructure through Live Migration, which required no reboots, no customer downtime, and did not materially impact performance. In fact, we got calls from customers asking if we had updated our systems to protect against the vulnerabilities—because they experienced no impact.

These won’t be the last security vulnerabilities to be uncovered; humans will never write perfect code. But the cloud makes it much easier to stay on top of them. The scale of the cloud security teams that find and mitigate emerging threats, the ability to update many systems at scale, and the automation to scan, update and protect users all contribute to cloud’s unique position to keep information and people secure.


Security at Google Cloud

Security has been paramount to Google from the very beginning. (I would know!) We’ve been operating securely in the cloud for almost 20 years, and we have seven apps with more than a billion users that we protect from threats every single day, and GCP itself connects to more than a billion IPs every day. We believe that security empowers innovation—that if you put security first, everything else will follow.

Security is in the details—and we pay attention at the most granular level. We were the first to introduce SSL email by default in 2010, we created the U2F security token standard in 2014, Chrome was the first browser to support post-quantum crypto in 2016, and in 2017 we introduced Titan, a purpose-built chip to establish hardware root of trust for both machines and peripherals on cloud infrastructure. These examples show the level of depth that we go into when thinking about security, and the role we take in pushing the industry forward to stay on top of evolving threats.

In addition, Google’s Project Zero team hunts for vulnerabilities across the internet, and have been behind the discoveries of “Heartbleed” as well as the recently-discovered “Spectre” and “Meltdown.” We also provide incentives to the security community to help us look for and find security bugs through our Vulnerability Reward Program.

We know how complex the security landscape is, and we’ve spent a lot of time thinking about how to solve this tough challenge. We’ve developed principles around security that define how we build our infrastructure, how we build our products, and how we operate.

For example, we believe it’s not enough to build something and try to make it secure after the fact. Security should be fundamental to all design, not bolted on to an old paradigm. That’s why we build security through progressive layers that deliver true defense in depth, meaning our cloud infrastructure doesn’t rely on any one technology to make it secure.

Now more than ever, it’s important for companies to make security an utmost priority and take responsibility for protecting their users. That’s true for Google too. At the end of the day, any organization is accountable to people above all, and user trust is crucial to business. If we don’t get security right, we don’t have a business.

That’s one of the reasons why I’m so passionate about cloud as a means to improve security. Google has always worked to protect users across the internet. With Google Cloud, we’re extending those capabilities to help businesses protect their users as well.

In the coming days, we'll share more about how we're pushing cloud security forward. Stay tuned.

Source: Google Cloud


Google Cloud for Healthcare: new APIs, customers, partners and security updates

Google Cloud’s goal for healthcare is very much a reflection of Google’s overall mission: to organize the world’s information and make it universally accessible and useful. Applying this mission to healthcare means using open standards to help enable data sharing and interactive collaboration, while also providing a secure platform. Just imagine if all healthcare providers could easily, securely and instantaneously collaborate while caring for you. Ultimately, we hope that better flow of data will inspire new discoveries with artificial intelligence (AI) and machine learning (ML), leading to insights that improve patient outcomes.

This week at HIMSS we’re showcasing our progress toward serving this mission through our Google Cloud Platform (GCP), G Suite and Chrome solutions, our work with customers and partners, and our focus on compliance and security.

Unlocking data with the new Cloud Healthcare API

We’ve recently launched the new Cloud Healthcare API, which addresses the significant interoperability challenges in healthcare data. The new API provides a robust, scalable infrastructure solution to ingest and manage key healthcare data types—including HL7, FHIR and DICOM—and lets our customers use that data for analytics and machine learning in the cloud.  

As part of our early access launch, we’re already working with a group of customers and partners, including the team at the Stanford School of Medicine. Here’s what Somalee Datta, Ph.D., Stanford School of Medicine Director of Research IT, had to say about our work together:

"Open standards are critical to healthcare interoperability as well as for enabling biomedical research. We have been using the Google Cloud Genomics API for a long time and are very excited to see Google Cloud expanding its offerings to include the new Cloud Healthcare API. The ability to combine interoperability with Google Cloud’s scalable analytics will have a transformative impact on our research community."

Our goal with the Cloud Healthcare API is to help transform the healthcare industry through the use of cloud technologies and machine learning. Healthcare is increasingly moving to the cloud, and the adoption of machine learning will allow the industry to unlock insights that can lead to significant clinical improvements for patients. The Cloud Healthcare API is currently available in an early access release, but over the next year, we plan to roll it out to more customers and partners—let us know if you’re interested.  

In addition to the the Cloud Healthcare API, we have a long history of supporting open APIs directly on GCP. Our Cloud Genomics API has provided an implementation of the Global Alliance for Genomics & Health APIs for many years now. Through an API-first approach, we can help healthcare enterprises simplify data interoperability by providing a strong foundation with cloud infrastructure and services. For example, Apigee enables healthcare enterprises to manage and deploy FHIR (Fast Healthcare Interoperability Resources) APIs on top of their existing electronic health record systems.  

How our healthcare customers are using Google Cloud

Beyond our work on APIs, our approach is to give healthcare customers the tools they need to accelerate projects in areas like population health, personalized medicine and clinical research. At HIMSS we’ll talk in more detail about how our customers are using Google Cloud. Here are a few examples:

M*Modal is working with Google Cloud to reinvent the experience of healthcare and mitigate widespread physician burnout. The collaboration leverages M*Modal’s success in adoption of its physician-assistive, AI-based solutions with Google Cloud’s expertise in AI at scale to align innovation with market needs. M*Modal solutions deliver AI-powered, real-time contextual understanding and more enhanced, actionable insights from clinical data to the doctor directly at the point of care.

Lahey Health is making the move to G Suite for its many benefits, including innovation, scalability, collaboration, security and productivity. From the security perspective, they chose G Suite for our team of dedicated security professionals, malware scanning for early detection of global campaigns, and secure end-to-end infrastructure that has built-in protections across many layers.

The Chilean Health Ministry is using Google Cloud’s Apigee platform to provide a nationwide API-based connectivity to help ensure data, applications and services are easily, yet securely, available when and where needed. This connectivity helps secure access to patient information, regardless of whether it’s needed in one of Chile’s 1,000 remote medical facilities or in one of its connected health centers.

Cleveland Clinicis using Google Cloud’s Apigee platform to realize the full potential of their underlying electronic medical record through FHIR APIs. Using a secure, scalable and industry-grade API platform, Apigee allows Cleveland Clinic to enable, augment and extend functionality of their EHR. It’s also enabling them to run advanced analytics and ML-based predictive models, revealing insights to clinicians that help them deliver improved patient care.

Rush University Medical Center is also using Apigee to enhance many aspects of patient care and patient experience. They're looking to optimize scheduling, identify excess costs, reduce emergency department wait times, reducing readmissions and identifying and predicting cybersecurity threats using Google Cloud's capabilities in AI and ML.

Color is using Variant Transforms—a new open source tool we recently released that helps export genomic variants directly into BigQuery—to discover new capabilities for their cancer diagnostic service. When the Broad Institute of MIT and Harvard first brought the GATK Best Practices pipeline to GCP in 2015, it was $45 to analyze a single genome. Since then, Broad has steadily brought down the cost to a little over $5 by optimizing its use of GCP, while maintaining (and even improving) the quality of the output, and has recently made this same pipeline—at the same cost—available to researchers around the world.

Middlesex Hospital and Chapters Health System are using Chrome to provide a secure, future-proof entry point to the cloud, connecting their staff to data-driven systems so they can focus on what’s most important: delivering great patient care.

How we're working with partners

Partners are essential to the work we do with healthcare customers. Here are a few that we’re talking about at HIMSS:

Flex introduced BrightInsight, a secure, managed services platform running on GCP. BrightInsight aggregates data to deliver real-time intelligence and optimize the value of connected drug, device or combination products. It’s designed to support CE-marked and FDA-regulated medical devices, combination products and Software as a Medical Device requirements for pharmaceutical and medtech companies. Flex is partnering with Google Cloud to deliver insights with customizable analytics dashboards that take advantage of our advanced machine learning and AI capabilities.

Imagia is transforming the way researchers can investigate disease characterization, progression and treatment response.

To address the increased demand for genomics, Kanteron Systems has introduced telegenomics on GCP as an addition to its Precision Medicine Platform.

Client Outlook has integrated their eUnity medical imaging viewer with the new Cloud Healthcare API, enabling them to provide a seamless visualization experience for medical images stored on GCP.

WuXi NextCODE’s massively scalable genomics database management system and clinical and research applications will be available to all Google Cloud users later this year.

And, on the hardware front, with Chrome solutions and technology partnerships, we’re also announcing a new collaboration between Healthcast, Citrix and Chrome OS that aims to provide a more secure and economical approach to data access. In another example, using VMware’s Digital Clinical Workspace and Point of Care solutions with a Chromebook allows users to securely access sensitive data and apps.

How we’re focusing on security and compliance

We can’t talk about improving healthcare without addressing security and compliance. We’re continuing to expand HIPAA compliance coverage across G Suite and GCP. Today, we announced that Google App Engine and Cloud Machine Learning Engine are covered, joining more than two dozen other HIPAA-compliant GCP services

https://cloud.google.com/security/compliance/hipaa/

, including Google Compute Engine, Google Cloud Storage and BigQuery.

Come by and say hello at HIMSS

There have been a lot of developments in our work in healthcare over the last year. We’re excited to be back at HIMSS and looking forward to working with everyone there. Stop by our booth and check out our sessions if you’re at HIMSS this week.

Source: Google Cloud


New research: How to evolve your security for the cloud

This week, McKinsey released a report titled “Making a secure transition to the public cloud,” the result of interviews with IT security experts at nearly 100 enterprises around the world. Leveraging the expertise of Google Cloud and McKinsey security experts, the research presents a strategic framework for IT security in cloud and hybrid environments, and provides recommendations on how to migrate to the cloud while keeping security top of mind.

The research shows what many already know: that public cloud adoption is accelerating thanks to increased technical flexibility, simpler scaling, and lower operating costs. What’s exciting is that the research also reveals that many Chief Information Security Officers (CISOs) no longer view security as an inhibitor to adoption but instead an opportunity—“In many cases [CISOs] acknowledge that cloud service providers’ security resources dwarf their own,” the authors write—and now these companies are focused on how to best adopt and configure cloud services for increased security.

When implemented properly, public-cloud adoption can significantly reduce the total cost of ownership (TCO) for IT security.

This requires enterprises, cloud providers, and third-party service providers to work together collaboratively and transparently within a shared security model. Google Cloud has long believed in creating trust through transparency, previously releasing a detailed overview of our infrastructure security, explaining our shared responsibility model, and how we already protect our users and customers at the lower layers of the stack—and we’re thrilled to see McKinsey’s detailed endorsement of the same approach.

Common security approaches, and their tradeoffs.

Every company has different IT needs, but the report found two common security decisions companies take when adopting cloud services: (1) defining the perimeter, and (2) deciding whether to re-architect applications for greater manageability, performance, and security in the cloud (interestingly, only 27% of companies surveyed actually do this—change is hard).

The research identifies three common archetypes for perimeter security: backhauling, cleansheeting, and adopting cloud provider controls by default.


  • Backhauling allows companies to continue managing IT security on-prem, with an external gateway connecting the data center to the public cloud. Approximately half of the companies surveyed currently use this model, but only 11% plan to continue doing so, since it can keep companies from realizing certain cloud benefits, such as agility.

  • Cleansheeting requires greater investment and expertise, as it calls for redesigning IT security around a “virtual perimeter” and leveraging multiple cloud-native tools and services.

  • Using cloud provider controls is the most cost-effective solution, but—depending on the cloud provider—can limit autonomy and may offer limited capabilities.

McKinsey uses these three models, along with the decision to re-architect applications for the cloud, to identify six “archetypes” for cloud security. Each archetype has its own tradeoffs:

mckinsey-1

There isn’t a “right answer” for security when making a move to the cloud—it depends on your company’s expertise, flexibility, and cost decisions.


And, you don’t have to use only one archetype. For example, Evernote describes in their migration story to Google Cloud Platform:

“For most of our controls we found an equivalent, cloud platform version. For data encryption at rest, we gained a security control that we hadn’t engineered on our own. For some controls, like IP whitelisting, we had to adapt our security architecture to not rely on traditional network controls.”

— Rich Tener, Director of Security, Evernote


The economics of cloud security.

Relying on cloud service provider security controls is “the most cost-effective approach,” the authors write. “As organizations move more and more applications to the public cloud and lean towards using native CSP controls, a decrease in security operating and capex costs is likely.” Eighty percent of companies that choose to rely primarily on the cloud provider’s controls and re-architect their applications in parallel see cost savings.


mckinsey-2

So, if you’re planning a cloud migration, where should you focus your security efforts? McKinsey asked respondents about their approach to applying cloud security controls in several areas to find out what companies are doing:


  • Identity & access management (IAM): 60% of enterprises are using on-premises IAM solutions; in just three years respondents expect that number to be cut in half. At Google, we provide a tool called Google Cloud Directory Sync, which helps users bring existing identities to Google Cloud and manage cloud permissions natively with IAM.

  • Encryption: The majority of respondents encrypt data both at rest and in transit—and even more (upwards of 80% in both categories) will do so three years from now. Google Cloud already encrypts data at rest by default, and in transit when it crosses a physical boundary.

  • Perimeter security: Today, 40% of enterprises are backhauling data traffic and using existing on-premises network security controls—but that will decrease, with only 13% expecting to be using the same approach in 3 years. To help enterprises make the move to cloud-based perimeter control, Google Cloud lets users connect to their on-premises environment using Dedicated Interconnect, an IPsec VPN tunnel, direct peering or carrier peering. Google Cloud users can also control their perimeter with a Virtual Private Cloud (VPC).

  • Application security: 65% of respondents define security configuration standards for cloud-based applications, but less than 20% are using tools or template-based enforcement. To address this, Google Cloud offers Cloud Security Scanner, an automated way to scan apps for common vulnerabilities.

  • Operational monitoring: 64% of respondents use existing SIEM tools to monitor cloud applications rather than creating a new set for the cloud. Google Cloud users can export logs from Stackdriver to the SIEM of their choice.

  • Server-side endpoints: 51% of respondents have a high level of confidence in their cloud service provider’s approach to server-side endpoint security. Google Cloud customers can use a variety of partner tools for endpoint security.

  • User endpoints: 70% of respondents believe that public-cloud adoption will require changes to user endpoints. Google created the BeyondCorp enterprise security model to allow its employees to work from anywhere, and our customers can do the same with Identity Aware Proxy. In addition, Chromebooks provide automatic software updates, and run applications in a restricted sandbox.

  • Regulatory governance: When adopting public cloud, companies must navigate governance and compliance requirements, with data location and financial regulations topping respondents’ list of concerns. Google Cloud has a broad spectrum of compliance, including PCI, SOX, and HIPAA.

The report also includes a tactical 10-step plan for successful cloud migration. To learn more, download the full report.

Source: Google Cloud


Freedom of data movement in the cloud era

In January, we joined an amicus brief with other technology companies in a case pending before the Supreme Court involving Microsoft and the U.S. Department of Justice. The companies that joined the brief argue that Congress must act to resolve the complicated policy questions raised by the case, as Congress is best-suited to weigh the important interests of law enforcement, foreign countries, service providers and, of course, the people who use the services.

Pending legislation in the U.S. Congress—the Clarifying Lawful Overseas Use of Data (CLOUD) Act—would make important strides in addressing the issues raised in the Microsoft case by updating the decades-old Electronic Communications Privacy Act. Notably, the bill clarifies that the physical location of data is not a relevant criterion in determining the data disclosure obligations of U.S. service providers.

We wanted to share a little more information on why we think this is important and what it means for our customers and users. Modern distributed networks function in ways that do not focus on data location. As more people and businesses turn to the cloud to keep their data secure and ensure their services are dependable, infrastructure has had to grow and evolve to meet those demands. Global networks offer end users a level of dependability that previously required the most sophisticated backup technologies and significant individual hardware investment. Understanding how a global distributed network like ours works is key to understanding the benefits it offers and the challenges that are presented by laws that focus on where data is stored.

Growth of the public cloud

It’s been an important goal of Internet companies like ours to offer services that can be accessed by hundreds-of-millions of users no matter where they are. These services have to be fast, reliable, robust, and resilient. From our earliest days, it was essential that our index, with its links to vast swaths of content, be as comprehensive as possible. But beyond that, it was also critical that the service be fast. Increasing the speed of search meant a vastly improved experience for users otherwise accustomed to long load times over slow internet connections.

Through the years, we’ve worked hard to continually improve how we serve users in all corners of the world. From an infrastructure perspective, this has meant focusing on how best to route data securely, balance processing loads and storage needs, and prevent data loss, corruption, and outages.

Public cloud services operate on a global basis, using geographically distributed infrastructure to ensure that the services that run on them have maximum availability and uptime. Data typically no longer resides on a single hard drive or server rack, or even in a single data center. Instead, it must be stored, secured, and made available in a way that allows it to be accessed by the users who depend on it just as easily in India as in Germany.


Focus on the user

The way we handle data is driven by what’s best for our users, regardless of whether that user is an individual or a large enterprise. To provide them with the reliability, efficiency, resiliency, and speed they depend on, data might need to be stored in many different configurations across a global network.

Cloud infrastructure also offers business customers more control over where and how their data is stored, depending on their needs. These customers may choose to store their data in a country or data center near their corporate headquarters, or as close to their users as possible.

With customer needs in mind, cloud providers balance factors ranging from internet bandwidth, the likelihood of power outages over available networks, and network throughput. This short video explains how these considerations come to life on a distributed network, using the photo a Gmail user attaches to a message as an example.

Enhancing the security and integrity of your data

As this video explains, individual data files may be broken up into smaller pieces, stored, or moved to keep them safe and accessible. Modern internet networks increasingly transmit and store data intelligently, often moving and replicating data seamlessly between data centers and across borders in order to protect the integrity of the data and maximize efficiency and security for users.

This technological reality underscores why it’s important that legislative solutions not use data location as a way of determining whether a particular country can exercise jurisdiction over a service provider. As internet providers continue to improve their global networks to better serve their users—whether they’re individuals, businesses, educational institutions or others—it’s important that the law reflects an understanding of technological innovation, and how modern distributed systems function.  

Source: Google Cloud


ICYMI in January: here’s what happened in G Suite

We’re teeing off a monthly series to help you keep up with G Suite news. Here’s what happened in January.

We introduced the security center for G Suite

Organizations are constantly dealing with security incidents, but with the right tools, IT professionals can focus more on long-term prevention and less on tactical firefighting. This month, we announced the security center for G Suite to help.

The security center is a central place for IT administrators to see important security analytics, like usage, as well as insights to help them take action quicker, like if files are shared externally. It also shares best practices from Google on how to improve cyber-safety. G Suite enterprise customers can access a bird’s eye view of their organization’s security all from within the Admin console. Get started.

Subhead 1 ICYMI G Suite

While we’re on the topic of security, enabling and encouraging second-factor (2SV) authentication can help protect your accounts if passwords are compromised. Learn how to easily enable 2SV and enforce its use across your organization.

Looking for more security tips? Here’s some guidance to help secure company information in the Admin console and these tips are handy for preventing phishing attempts.

Subhead 2 ICYMI G Suite

Jamboard is a core service within G Suite. Welcome to the family!

→ Now you can use Hangouts Meet on Android and iOS tablets, and dial in from nine new countries: Austria, Belgium, Czech Republic, Finland, Ireland, Norway, Romania, Switzerland and Turkey. This brings the total to 24 countries where Meet is available, with more to come. Learn more.

→ We’ve made it easier to search for information within a specific folder in Google Drive. Now you can right click on a folder title in your Drive and select “Search within [title of folder].” Type terms into the search bar and track down your files faster. Here are some more tricks to help you save time searching.

GIF 1 ICYMI

→ Everyone should have a “say” in team collaboration, which is why we’re continuously improving our products to be more accessible. This month, we’ve added Braille support in Sheets and a way to magnify your screen in Slides. Check out a full list of accessibility features.

Until next time.

Source: Google Cloud