Use these Chrome Enterprise security resources to better secure endpoints
Editor’s note: We’re nearing the end of Cybersecurity Awareness Month, which is a great time to reflect on your organization’s upcoming security goals, particularly when it comes to endpoint security. In this post, we’ll hear about some great (and free!) resources that can be helpful if you’re looking to establish an informed, endpoint security strategy for your organization.
According to IDC, approximately 70% of security breaches originate from endpoints. Companies who lead the way in modern OS and browser security are the ones that understand and adopt tools that provide built-in, proactive management controls. Google has always prioritized endpoint security with Chrome Enterprise, which is why businesses like HackerOne and Blue Cross Blue Shield of North Carolina use Chrome devices and Chrome Browser—they’re secure by design.
Gartner recently conducted a comprehensive security review in its “May 2019 Mobile OSs and Device Security: A Comparison of Platforms” report of leading operating systems and devices platforms. Based on an evaluation of “the core OS security features that are built into various mobile device platforms, as well as enterprise management capabilities,” Chrome OS received strong ratings for 27 out of 30 criteria.
We’ve built proactive protections in place with tools like Safe Browsing to help deter users from falling for harmful attacks. And with features like sandboxing, admins can rest assured that endpoints in their fleet can mitigate the impact of an attack if one occurs. With Chrome Enterprise, businesses have access to hundreds of user, browser and device policies to provide administrators with the oversight they need to keep their business data secure.
If you are looking to evaluate your endpoint security strategy, there are some important considerations to bear in mind.
First, are your endpoints secure by design? In a modern computing landscape with threats coming from every direction, it’s important that your browser and OS both proactively deter end users from falling for attacks, as well as limit the impact if one does prevail.
Next, do your endpoints work with diverse application ecosystems to ensure applications are trusted? Apps can require permissions and gain unintended access to corporate data, so it is important to provide IT with control to help ensure harmful apps stay out of the hands of users.
Finally, are your endpoints positioned to eliminate and protect against current threats? Security breaches are on the rise, increasing by as much as 27% in recent years, and bad actors continue to use common methods prevalent on legacy tools such as malware, ransomware and phishing attacks.
Improve your organization’s security with Chrome Enterprise
Chrome OS and Chrome Browser have built-in security features that give admins the control they need to help keep endpoints secure and users productive. As you consider what endpoint option is best for your business, here are some great resources that can help.
For an overview on cloud-native security for endpoints, as well as deep-dive information on Chrome OS and Chrome Browser security features, read this whitepaper.
If you’re looking for pointers on how best to decide which browser policies to enable or disable, check out the Chrome Browser Security Configuration Guide or the Center for Internet Security’s (CIS) Chrome Browser Benchmark.
To understand privacy mode options more specifically, check out the Chrome Browser privacy guide for enterprises. This resource explains how admins can deploy privacy modes, as well as policies to help separate employees work vs. personal profiles. This guide also provides an overview of tools you can use to help employees understand how their browser is being managed.
If you work in a highly regulated environment, you can find ISO and SOC compliance materials on the Google Cloud security and trust website.