Virtual Event Today: Cyber AI & Automation Summit - Register/Login Now
Connect with us

Hi, what are you looking for?


Data Protection

Google Workspace Gets Client-Side Encryption

Google this week announced the introduction of client-side encryption in Google Workspace, which is meant to provide users with control over the encryption keys used to keep their data safe.

Google this week announced the introduction of client-side encryption in Google Workspace, which is meant to provide users with control over the encryption keys used to keep their data safe.

Google’s collaboration and productivity solution was already encrypting data, both when at rest and in transit, but the new feature is meant to provide additional control and ease of mind over the security of data.

In addition to increasing the confidentiality of data, the feature also helps customers meet sovereignty and compliance requirements, as it also offers control over the identity service used to access the encryption keys.

“With Client-side encryption, customer data is indecipherable to Google, while users can continue to take advantage of Google’s native web-based collaboration, access content on mobile devices, and share encrypted files externally,” the Internet giant notes.

Organizations that store sensitive or regulated data (including financial data, healthcare records, and intellectual property) will benefit the most from the new feature, which helps them meet compliance requirements for CJIS, EAR, IRS 1075, ITAR, and TISAX.

Client-side encryption works with key access service partners Flowcrypt, Futurex, Thales, and Virtru, which will be responsible for holding the key to decode Google Workspace data. However, organizations will also be able to build or integrate in-house key services. Google will publish key access service API specifications later this year.

In the coming weeks, Client-side encryption will become available in beta for Google Workspace Enterprise Plus and Education Plus customers, and will support Google Docs, Drive, Sheets, and Slides.

Furthermore, Google is getting ready to provide administrators with additional choices regarding the sharing of files, courtesy of trust rules for Drive. The feature will be rolling out in beta in the coming months, for Enterprise and Education Plus customers.

Advertisement. Scroll to continue reading.

Now available in Google Workspace is Drive labels, which allows users to classify the files stored in Google Drive, so that they are handled correctly. The feature is integrated with Google Workspace’s data loss prevention (DLP) capabilities, so that admins can set retention policies. Files can also be automatically classified, based on admin-defined DLP rules.

Currently in beta, the Drive labels feature has been released for Google Workspace Business Standard, Business Plus, Enterprise, Education Standard, and Education Plus customers.

In the coming weeks, Google Workspace administrators will have the option to implement phishing and malware protection for content within their organizations, the Internet giant announced.

Related: Google Workspace Gets New Security Features

Related: New Google Tool Helps Developers Visualize Dependencies of Open Source Projects

Related: ATT&CK v9 Introduces Containers, Google Workspace

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join us as we delve into the transformative potential of AI, predictive ChatGPT-like tools and automation to detect and defend against cyberattacks.


As cybersecurity breaches and incidents escalate, the cyber insurance ecosystem is undergoing rapid and transformational change.


Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.


The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Many developers and security people admit to having experienced a breach effected through compromised API credentials.

Cybersecurity Funding

Los Gatos, Calif-based data protection and privacy firm Titaniam has raised $6 million seed funding from Refinery Ventures, with participation from Fusion Fund, Shasta...