Prevent abuse, unauthorized access, or transfer of data by implementing 2-step verification, which greatly reduces the risk of unauthorized access by asking users for additional proof of identity when signing in. Security key enforcement also offers another layer of security for user accounts by requiring a physical key.
Prevent against unauthorized access by controlling access rights and roles for Google Cloud Platform resources. For cloud applications running on Google Cloud Platform, Cloud Identity-Aware Proxy (Cloud IAP) does this by verifying a user’s identity.
Cloud DLP discovers, classifies, and de-identifies your data to help meet the principles of data protection by design and by default.
Logging, monitoring, alerting, and anomaly detection systems are integrated into Google Cloud Platform and give you the information necessary to assist with your GDPR needs.
We provide you with near real-time logs when Google Cloud Platform administrators access your content.
View and monitor an inventory of your cloud assets, scan storage systems for sensitive data, detect common web vulnerabilities, and review access rights to your critical resources from a single, centralized dashboard.
Add an extra layer of security to your users’ managed Google accounts by implementing 2-step verification, which greatly reduces the risk of unauthorized access by asking users for additional proof of identity when signing in. With security key enforcement, you add the security of 2-step verification without users needing to re-type codes from their phones.
We help prevent and protect against unauthorized access by detecting suspicious logins using robust machine learning capabilities.
Require email messages to be signed and encrypted using Secure/Multipurpose Internet Mail Extensions (S/MIME), ensuring appropriate security, confidentiality, and integrity of personal data.
DLP protects sensitive information within Gmail and Drive from unauthorized sharing.
Disable downloading, printing, and copying of files from the advanced sharing menu in Drive.
Continuous system monitoring and alerts in case of suspicious device activity help maintain the ongoing confidentiality, integrity, and availability of your data.