Book Image

Google Workspace User Guide

By : Balaji Iyer
Book Image

Google Workspace User Guide

By: Balaji Iyer

Overview of this book

Google Workspace has evolved from individual Google services to a suite of apps that improve productivity and promote efficient collaboration in an enterprise organization. This book takes you through the evolution of Google Workspace, features included in each Workspace edition, and various core services, such as Cloud Identity, Gmail, and Calendar. You’ll explore the functionality of each configuration, which will help you make informed decisions for your organization. Later chapters will show you how to implement security configurations that are available at different layers of Workspace and also how Workspace meets essential enterprise compliance needs. You’ll gain a high-level overview of the core services available in Google Workspace, including Google Apps Script, AppSheet, and Google Cloud Platform. Finally, you’ll explore the different tools Google offers when you’re adopting Google Cloud and migrating your data from legacy mail servers or on-premises applications over to cloud servers. By the end of this Google Workspace book, you’ll be able to successfully deploy Google Workspace, configure users, and migrate data, thereby helping with cloud adoption.
Table of Contents (14 chapters)
1
Part 1: Getting Started – Google Workspace
4
Part 2: Data Security
7
Part 3: Data Integrations
9
Chapter 6: Designing Custom Applications
10
Part 4: Migrating Data

Data loss prevention

DLP is a technique that Google has woven into its products to detect and alert users and administrators about sensitive data that needs to be safeguarded within the company and not shared externally. This is a critical feature that improves the security posture so that administrators and users can sleep peacefully at night.

There have been so many instances where employees accidentally lose data – for example, perhaps they share a file that contains social security numbers to people that should not be seeing them. Or it could be users that intentionally leak data, or hackers that could be looking for the weakest link and trying to steal data. In all these instances, it is imperative that data be handled and stored carefully at rest and when sharing it.

DLP helps companies prevent data loss. It allows administrators to define policies that can detect sensitive data. These policies could be based on any of the following:

  • Predefined detectors...