Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Application Security

Google Workspace Gets New Security Features

Google this week announced adding new security features to its Google Workspace collaboration and productivity solution, to provide administrators with more capabilities and controls for protecting users and organizations.

Google this week announced adding new security features to its Google Workspace collaboration and productivity solution, to provide administrators with more capabilities and controls for protecting users and organizations.

Admins can now access VirusTotal reports directly from the Alert Center in Google Workspace, through a new enrichment widget (VT Augment) that will be displayed for notifications that contain supported VirusTotal entities (including domains, file attachment hashes, or IP addresses).

For paid VirusTotal subscribers, an enhanced version of the report will become available, offering indicators of compromise and details on their relations with other artifacts in the VirusTotal dataset; a graph view of those connections; reputation information; geographical and time-spread data; and the ability to launch VirusTotal Enterprise advanced searches with a single click.

“It’s important to note that VirusTotal provides an investigation layer on top of alerts but isn’t being used directly for detection or alerting. No customer information is shared from Google to VirusTotal except when an admin clicks to retrieve a VirusTotal report for a specific entity,” the Internet giant explains.

In the coming weeks, the new feature will become available for Google Workspace Business Plus, Enterprise Standard and Plus, and Education Standard and Plus licenses.

Rolling out in the next few months in Google Workspace is the ability to block users in Google Drive, which will allow users to remove other users’ access to their content, to block others from sharing content with them, and to remove any files and folders that others might have shared with them.

The third security improvement that the company is launching for Google Workspace involves the ability to restrict access to Workspace resources, through app access control (blocking OAuth 2.0 API access) and new context-aware access for both desktop and mobile apps.

A new setting now generally available on Google Workspace allows administrators to block all third-party API access to Workspace. By blocking all OAuth 2.0 scopes, the setting prevents users from signing in with their Google Workspace accounts to third-party apps.

Advertisement. Scroll to continue reading.

For Google Workspace Enterprise Standard, Enterprise Plus, Education Plus, and Cloud Identity Premium, the company is expanding context-aware access to its own desktop and mobile apps, thus offering increased control over the manner in which users access Google Workspace resources.

Related: ATT&CK v9 Introduces Containers, Google Workspace

Related: Google Readies Redesigned Security Alerts for Google Accounts

Related: Google Launches New Cloud Security Services

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Conversations

SecurityWeek talks to Billy Spears, CISO at Teradata (a multi-cloud analytics provider), and Lea Kissner, CISO at cloud security firm Lacework.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.