[[["易于理解","easyToUnderstand","thumb-up"],["解决了我的问题","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["很难理解","hardToUnderstand","thumb-down"],["信息或示例代码不正确","incorrectInformationOrSampleCode","thumb-down"],["没有我需要的信息/示例","missingTheInformationSamplesINeed","thumb-down"],["翻译问题","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["最后更新时间 (UTC):2025-09-05。"],[],[],null,["# Chrome Enterprise Premium overview\n\nAs organizations increasingly rely on web applications and remote workforces,\nsecure enterprise browsing is rapidly becoming the [standard](https://chromeenterprise.google/gartner-report-enterprise-browsers/) for\nprotecting corporate data and ensuring productive, secure user experiences\nfrom any location or device.\n\nChrome Enterprise Premium enhances Chrome's built-in security for enterprises by\nproviding:\n\n- **Configurable Data Loss Prevention:** Prevent data leaks by controlling\n actions such as copying, pasting, downloading, and printing.\n\n- **Real-time Phishing, Malware, and Sandboxing Protection:** Automatically\n detect and block phishing sites, malware, and unsafe downloads.\n\n- **Context-Aware Access Controls:** Enforce secure access to critical\n applications and resources based on user identity, device security\n posture, and geographic location.\n\nBenefits to users\n-----------------\n\nChrome Enterprise Premium presents a security model that allows for greater\nsecurity posturing and policy for both applications and devices, while providing\nend users a better user experience no matter where they access from or what type\nof device they use to do so:\n\n- For administrators:\n - Strengthen security posture to account for dynamic changes in a user's context.\n - Shrink the access perimeter to only those resources that an end user should be accessing.\n - Enforce device security postures for employees, contractors, partners, and customers for access, no matter who manages the devices.\n - Extend security standards with per-user session management and multifactor authentication.\n- For end users:\n - Allow all end users to be productive everywhere without compromising security.\n - Allow the right level of access to work applications based on their context.\n - Unlock access to personally-owned devices based on granular access policies.\n - Access internal applications without being throttled by segmented networks.\n\nCommon use cases\n----------------\n\nAs end users work outside of the office more often and from many different types\nof devices, enterprises have common security models they are looking to extend\nto all users, devices, and applications:\n\n- Allow non-employees to access a single web application deployed on Google Cloud or other cloud services platforms without requiring the use of a VPN.\n- Allow non-employees to access data from their personal or mobile devices as long as they meet a minimum security posture.\n- Ensure employees are prevented from copying and pasting sensitive data into email or saving data into personal storage such as Google Drive.\n- Only allow enterprise-managed devices to access certain key systems.\n- Provide DLP protections for corporate data.\n- Gate access based on a user's location.\n- Protect applications in hybrid deployments that use a mix of Google Cloud, other cloud services platforms, or on-premises resources.\n\nCommon signals\n--------------\n\nChrome Enterprise Premium offers common signals enterprises can take into account\nwhen making a policy decision, including:\n\n- User or group information\n- Location (IP or geographic region)\n- Device\n - Enterprise-managed devices\n - Personally-owned devices\n - Mobile devices\n- Third-party device signals from partners\n - Check Point\n - CrowdStrike\n - Lookout\n - Tanium\n - VMware\n\n| **Note:** Google is not responsible for the accuracy of device data generated by third-party partners. Data provided to Google by the third-party partner is stored as-is. Any inaccuracies or personally identifiable information (PII) reported by the third party partner are the sole responsibility of the partner.\n\n- Risk scores\n\nHow to get Chrome Enterprise Premium\n------------------------------------\n\n[Complete this form](https://inthecloud.withgoogle.com/beyondcorp/contact.html) to get\nmore information about upgrading to Chrome Enterprise Premium.\n\nChrome Enterprise Premium compared with Google Cloud\n----------------------------------------------------\n\nChrome Enterprise Premium provides enterprise security features in addition to the\nbasic protections, focused on protecting applications with authentication and\nauthorization, that are baseline features of Google Cloud.\nChrome Enterprise Premium extends those protections to applications and data\nrunning everywhere, with end-user protections and rich access policy\nprotections.\nThe following table shows the differences between the baseline features available to Google Cloud customers and what is available with Chrome Enterprise Premium:\n\nWhat's next\n-----------\n\n- Learn more about [access protection controls](/chrome-enterprise-premium/docs/access-protection)\n- Learn more about [threat and data protections](https://support.google.com/a/answer/10104463)"]]