B2B Payments

Google Turns Back On Traditional Enterprise Mobility Security


Some 61,000 employees across the globe are using Google-powered mobile devices at the workplace, said Google, which outlined its approach to mobile security in a new white paper.

Reports Thursday (April 20) highlighted a company blog post by the tech conglomerate detailing the three tiers of enterprise mobility security Google deploys to safeguard those employees and employer data.

This tiered-access strategy means services and devices used within the enterprise are categorized into tiers to determine accessibility. Those tiers are determined based on the sensitivity of the data within that service or device. The second tier involves credential verification.

Google uses a variety of sources to capture as much data as possible about the devices in use within the enterprise, including operation system agents, asset management inventories and sources from within the device itself. That information is analyzed every time someone tries to access and use a particular device, reports explained.

“On successful user verification, access to services is granted only if the assessed risk profile of the device matches the required trust tier,” Google explained.

According to the company, this approach is not only more secure than traditional all-or-nothing access models, but is also more convenient for employees. Tiered access means the level of access and usability of a single device can change over time depending on who’s using it and for what purpose.

Google has fixed its vision on enterprise security in recent years. In February the company announced new security features for its range of enterprise apps in G Suite, enabling managers and administrators to have greater control over the data stored in these apps. Admin can control not only how employees use security keys to access a service on G Suite, but also who gets those keys.

The new features were announcing in conjunction with new research from Google, which concluded that the use of security keys is more effective than two-factor authentication at preventing hacks.



The PYMNTS Cross-Border Merchant Friction Index analyzes the key friction points experienced by consumers browsing, shopping and paying for purchases on international eCommerce sites. PYMNTS examined the checkout processes of 266 B2B and B2C eCommerce sites across 12 industries and operating from locations across Europe and the United States to provide a comprehensive overview of their checkout offerings.

Click to comment