PROTECTING
YOUR DATA IN
GOOGLE APPS
You will learn in the next 60 minutes:
• The basic security that comes Google Apps
• Extending security while using Google Apps
• Tips and tricks to maintain control of your data
Google Apps Security 2
Cloud apps are
becoming an
essential part of
business
Cost effective
Remote access
Agility and speed
Improved Productivity
Better collaboration
Customer will use its reasonable endeavours to
prevent unauthorised use of the Services, and to
terminate any unauthorised use. Customer will
promptly notify Google of any unauthorised use of,
or access to, the Services of which it becomes
aware.
Google´s Policy
Google cannot be responsible for malicious use of your company’s user accounts
(or security of your infrastructure or users).
(the fine print)
Security In The
Cloud is a Shared
Responsibility
Google Apps Security 3
Security In The
Cloud is a Shared
Responsibility
Google Apps Security 4
FRONTEND SECURITY
Access visibility
Access control
Data loss prevention
BACKEND SECURITY
Xsite scripting, SQL Injection, etc.
Web
Application
SaaS
You
Vendor
5
What could go wrong?
• 1.34% of accounts were compromised
• Compromised means: account takeover,
rogue (bad actor) insider, malicious data
destruction, etc.
• Report highlighted threshold triggers
(static) and anomalous behavior (data
science) — just a sample out of 60+ factors
• This malicious activity would apply
regardless of SaaS app or storage provider
used, Google Drive
From Elastica’s Q2 2015 Shadow Data Report:
Malicious Use
% of total
compromised
accounts
Google Apps Security
90%of organizations lost sensitive data
via file sharing
Shadow Data
Use of sanctioned apps in unsanctioned ways
average cost of data breach for storage
SaaS providers/company
Shadow Data
All the potentially risky data exposures lurking in
sanctioned cloud apps, due to lack of knowledge of the
type of data being uploaded, and how it is being
shared. This can directly lead to compliance violations
or sensitive data loss.
Shadow IT
All the potentially risky unsanctioned Cloud Apps used in your
organization, without the knowledge of IT.
Source: Elastica Q2 2015Source: Ponemon
$13.8M
What is Shadow Data?
Google Apps Security
Who Controls Sharing?
Sharing has become democratized
(no longer top-down controls)
Even file owners no longer fully
control how their files are shared
Alice shares a file with Bob
Bob shares that file publicly
without Alice’s knowledge
Shadow Data
Goes Viral
Google Apps Security
OTHER
APPS
files per user are
broadly shared
(average)
12.5%
contain compliance related data
Shadow Data
25%Of total files stored in the
cloud per user
(average)
of these files
Google Apps Security
9
GoogleApps provides base security, but you still need…
User visibility and control
Analysis of risky behavior
Automated classification
Data protection /
attack mitigation
REQUIREMENT BECAUSE HOW
Compliance mandates
require identification of
sensitive data
Users are the biggest
threat that can bypass your
security controls
This is not readily seen just
by A/V scanning or APT
systems
Before, during, and after a
breach requires fast
response
Leverage data science to
automatically understand content
without involving humans
Real-time awareness of
access and actions
Per user-graph of “normal”
behavior vs. risky behavior
Complete lifecycle solution
Google Apps Security
Data Science Powered™
CLOUDAPP SECURITY
beforeduringafter
Google Apps Security
Externalandpubliccontent
exposures,including
compliancerisks
Inboundriskycontentshared
withemployees(e.g.malware,
IP,etc)
Riskyusersanduser
activities
Get a Free
Shadow Data
Risk
Assessment
Google Apps Security
Thank You!
Take the free Shadow
Data Risk Assessment
Visit us to learn how you can find risks and
protect critical content in your file sharing apps.
Elastica.net

More Related Content

PPTX
Enabling Dropbox for Business
PPTX
How to Extend Security and Compliance Within Box
PPTX
Shadow Data Exposed
PPTX
Reasoning About Enterprise Application Security in a Cloudy World
PPTX
Protecting Your Data In Office 365
PPTX
Ciso Platform Webcast: Shadow Data Exposed
PDF
Brochure forcepoint dlp_en
PPTX
Comprehensive Data Leak Prevention
Enabling Dropbox for Business
How to Extend Security and Compliance Within Box
Shadow Data Exposed
Reasoning About Enterprise Application Security in a Cloudy World
Protecting Your Data In Office 365
Ciso Platform Webcast: Shadow Data Exposed
Brochure forcepoint dlp_en
Comprehensive Data Leak Prevention

What's hot (20)

PDF
Forcepoint Dynamic Data Protection
PPTX
Top 5 Information Security Lessons Learned from Transitioning to the Cloud
PDF
DLP Data leak prevention
PDF
Wp security-data-safe
PPTX
Should You Be Automating
PPTX
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
PDF
Data loss prevention by using MRSH-v2 algorithm
PPTX
Two Peas in a Pod: Cloud Security and Mobile Security
PPSX
Thread Legal and Microsoft 365 Security
PPTX
Making Cloud Security Part of Your DNA Webinar Slides
PPTX
Bitglass Webinar - A Primer on CASBs and Cloud Security
PDF
Cloud Security Myths Vs Facts
PDF
Top Application Security Threats
PDF
Stop Hackers with Integrated CASB & IDaaS Security
PDF
Disaster recovery glossary
PPTX
Stop Hackers with Integrated CASB & IDaaS Security
DOCX
“Verify and never trust”: The Zero Trust Model of information security
PDF
Chapter 3, Data Protection vs Ransomware
PPTX
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
PDF
Practice case legal for data professional
Forcepoint Dynamic Data Protection
Top 5 Information Security Lessons Learned from Transitioning to the Cloud
DLP Data leak prevention
Wp security-data-safe
Should You Be Automating
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Data loss prevention by using MRSH-v2 algorithm
Two Peas in a Pod: Cloud Security and Mobile Security
Thread Legal and Microsoft 365 Security
Making Cloud Security Part of Your DNA Webinar Slides
Bitglass Webinar - A Primer on CASBs and Cloud Security
Cloud Security Myths Vs Facts
Top Application Security Threats
Stop Hackers with Integrated CASB & IDaaS Security
Disaster recovery glossary
Stop Hackers with Integrated CASB & IDaaS Security
“Verify and never trust”: The Zero Trust Model of information security
Chapter 3, Data Protection vs Ransomware
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
Practice case legal for data professional
Ad

Viewers also liked (6)

PDF
Be A Hero: Combat Cloud Security Threats with Google Apps Unlimited & CloudLock
PPTX
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
PPTX
Symantec and ForeScout Delivering a Unified Cyber Security Solution
PDF
Symantec Appliances Strategy Launch
PPTX
Symantec - State of European Data Privacy
PDF
Tackle Unknown Threats with Symantec Endpoint Protection 14 Machine Learning
Be A Hero: Combat Cloud Security Threats with Google Apps Unlimited & CloudLock
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
Symantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec Appliances Strategy Launch
Symantec - State of European Data Privacy
Tackle Unknown Threats with Symantec Endpoint Protection 14 Machine Learning
Ad

Similar to Protecting your Data in Google Apps (20)

PPTX
Top Threats Facing Organizations Cloud / SaaS Data
PDF
Cloud Application Security Best Practices To follow.pdf
PDF
Cloud Application Security Best Practices To follow.pdf
PDF
Power Saturday 2019 E1 - Office 365 security
PDF
Evaluate Top Seven Risks of Enterprise Mobility
PDF
Top Seven Risks of Enterprise Mobility - How to protect your business
PDF
En msft-scrty-cntnt-e book-protectyourdata
PPTX
Microsoft Cloud Application Security Overview
PPTX
Transforming Risky Mobile Apps into Self Defending Apps
PDF
Adallom_Cloud_Risk_Report-Nov14
PDF
IRJET- Data Leak Prevention System: A Survey
PPTX
Mitigating the Top 5 Cloud Security Threats
PDF
The 15 best cloud security practices
PDF
Microsoft Cloud App Security CASB
PPTX
Mobile App Security: Enterprise Checklist
PDF
All You Need to Know About 5 Biggest Cloud Security Risks and How One Can Avo...
PPTX
Transforming any apps into self-defending apps
PDF
Securing mobile apps in a BYOD world
PDF
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
Top Threats Facing Organizations Cloud / SaaS Data
Cloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdf
Power Saturday 2019 E1 - Office 365 security
Evaluate Top Seven Risks of Enterprise Mobility
Top Seven Risks of Enterprise Mobility - How to protect your business
En msft-scrty-cntnt-e book-protectyourdata
Microsoft Cloud Application Security Overview
Transforming Risky Mobile Apps into Self Defending Apps
Adallom_Cloud_Risk_Report-Nov14
IRJET- Data Leak Prevention System: A Survey
Mitigating the Top 5 Cloud Security Threats
The 15 best cloud security practices
Microsoft Cloud App Security CASB
Mobile App Security: Enterprise Checklist
All You Need to Know About 5 Biggest Cloud Security Risks and How One Can Avo...
Transforming any apps into self-defending apps
Securing mobile apps in a BYOD world
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...

Recently uploaded (20)

PDF
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
PDF
The AI Revolution in Customer Service - 2025
PDF
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
PDF
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
PDF
giants, standing on the shoulders of - by Daniel Stenberg
PDF
Rapid Prototyping: A lecture on prototyping techniques for interface design
PPTX
Module 1 Introduction to Web Programming .pptx
PDF
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
PDF
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
PDF
Early detection and classification of bone marrow changes in lumbar vertebrae...
PDF
A symptom-driven medical diagnosis support model based on machine learning te...
PDF
Build Real-Time ML Apps with Python, Feast & NoSQL
PDF
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
PDF
Human Computer Interaction Miterm Lesson
PDF
IT-ITes Industry bjjbnkmkhkhknbmhkhmjhjkhj
PDF
Data Virtualization in Action: Scaling APIs and Apps with FME
PDF
Electrocardiogram sequences data analytics and classification using unsupervi...
PDF
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
PPTX
MuleSoft-Compete-Deck for midddleware integrations
PPTX
Microsoft User Copilot Training Slide Deck
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
The AI Revolution in Customer Service - 2025
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
giants, standing on the shoulders of - by Daniel Stenberg
Rapid Prototyping: A lecture on prototyping techniques for interface design
Module 1 Introduction to Web Programming .pptx
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
Early detection and classification of bone marrow changes in lumbar vertebrae...
A symptom-driven medical diagnosis support model based on machine learning te...
Build Real-Time ML Apps with Python, Feast & NoSQL
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
Human Computer Interaction Miterm Lesson
IT-ITes Industry bjjbnkmkhkhknbmhkhmjhjkhj
Data Virtualization in Action: Scaling APIs and Apps with FME
Electrocardiogram sequences data analytics and classification using unsupervi...
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
MuleSoft-Compete-Deck for midddleware integrations
Microsoft User Copilot Training Slide Deck

Protecting your Data in Google Apps

  • 1. PROTECTING YOUR DATA IN GOOGLE APPS You will learn in the next 60 minutes: • The basic security that comes Google Apps • Extending security while using Google Apps • Tips and tricks to maintain control of your data
  • 2. Google Apps Security 2 Cloud apps are becoming an essential part of business Cost effective Remote access Agility and speed Improved Productivity Better collaboration
  • 3. Customer will use its reasonable endeavours to prevent unauthorised use of the Services, and to terminate any unauthorised use. Customer will promptly notify Google of any unauthorised use of, or access to, the Services of which it becomes aware. Google´s Policy Google cannot be responsible for malicious use of your company’s user accounts (or security of your infrastructure or users). (the fine print) Security In The Cloud is a Shared Responsibility Google Apps Security 3
  • 4. Security In The Cloud is a Shared Responsibility Google Apps Security 4 FRONTEND SECURITY Access visibility Access control Data loss prevention BACKEND SECURITY Xsite scripting, SQL Injection, etc. Web Application SaaS You Vendor
  • 5. 5 What could go wrong? • 1.34% of accounts were compromised • Compromised means: account takeover, rogue (bad actor) insider, malicious data destruction, etc. • Report highlighted threshold triggers (static) and anomalous behavior (data science) — just a sample out of 60+ factors • This malicious activity would apply regardless of SaaS app or storage provider used, Google Drive From Elastica’s Q2 2015 Shadow Data Report: Malicious Use % of total compromised accounts Google Apps Security
  • 6. 90%of organizations lost sensitive data via file sharing Shadow Data Use of sanctioned apps in unsanctioned ways average cost of data breach for storage SaaS providers/company Shadow Data All the potentially risky data exposures lurking in sanctioned cloud apps, due to lack of knowledge of the type of data being uploaded, and how it is being shared. This can directly lead to compliance violations or sensitive data loss. Shadow IT All the potentially risky unsanctioned Cloud Apps used in your organization, without the knowledge of IT. Source: Elastica Q2 2015Source: Ponemon $13.8M What is Shadow Data? Google Apps Security
  • 7. Who Controls Sharing? Sharing has become democratized (no longer top-down controls) Even file owners no longer fully control how their files are shared Alice shares a file with Bob Bob shares that file publicly without Alice’s knowledge Shadow Data Goes Viral Google Apps Security OTHER APPS
  • 8. files per user are broadly shared (average) 12.5% contain compliance related data Shadow Data 25%Of total files stored in the cloud per user (average) of these files Google Apps Security
  • 9. 9 GoogleApps provides base security, but you still need… User visibility and control Analysis of risky behavior Automated classification Data protection / attack mitigation REQUIREMENT BECAUSE HOW Compliance mandates require identification of sensitive data Users are the biggest threat that can bypass your security controls This is not readily seen just by A/V scanning or APT systems Before, during, and after a breach requires fast response Leverage data science to automatically understand content without involving humans Real-time awareness of access and actions Per user-graph of “normal” behavior vs. risky behavior Complete lifecycle solution Google Apps Security
  • 10. Data Science Powered™ CLOUDAPP SECURITY beforeduringafter Google Apps Security
  • 12. Thank You! Take the free Shadow Data Risk Assessment Visit us to learn how you can find risks and protect critical content in your file sharing apps. Elastica.net

Editor's Notes

  • #4: The reality is that security is a shared responsibility. Even the most enterprise-grade cloud app provider, will never take full liability for what your users do within cloud apps. If someone comes in with a valid user name/password, they can do whatever they want - and share sensitive content with whomever they like. http://www.microsoftvolumelicensing.com/Downloader.aspx?DocumentId=8681
  • #5: The reality is that security is a shared responsibility. Even the most enterprise-grade cloud app provider, will never take full liability for what your users do within cloud apps. If someone comes in with a valid user name/password, they can do whatever they want - and share sensitive content with whomever they like. http://www.microsoftvolumelicensing.com/Downloader.aspx?DocumentId=8681
  • #7: Source: Ponemon, 2013 Cost of Data Breach Study So you’ve probably heard of Shadow IT, but you may not have heard of Shadow Data. But the reality is Shadow Data can be far more dangerous. While Shadow IT is about understanding all the cloud apps that are being used in your environment that IT may not be aware of, Shadow Data can occur in fully sanction apps. Shadow data is about understanding what types of data users are uploading into your apps and how they are sharing these files with others.
  • #8: design notes: Can we show how Bob has caused $201 cost from a violation and that each person later costs additional $201? to emphasize how a viral document can increase costs of a breach. 1 breach $201 record source: Ponemon Institute 2014 So to expand on this, lets take a look at the other case. The non-malicious user who’s simply oversharing. So let me ask you this question: Do you remember back in the day when we had file sharing within our data center? We’d build a file server, and the IT admin or domain admin had full control over who had access to that file server and what could be shared with whom. When we work with applications like Dropbox, for all the wonderful things it brings us, it now also brings us the question of who controls sharing? Sharing has become democratized now, where you’re putting the controls in the hands of the user. Even file owners no longer fully control how their files are shared. *CLICK* Let’s look at this example where Alice shares a file with Bob, *CLICK* and then Bob decides to share the file with two friends. And they share with their friends, and so on, and so on, and so on. From here things get very complicated because permissions, control, file ownership, all get a little confusing. This is an example of what we call shadow data, or shadow IT. You’ll likely hear me use this term again.
  • #9: So let’s take a look at the stats here: From data we’ve collected on our own customers that we’re monitoring, we see that the average user stores about 2037 files in cloud based storage accounts. *CLICK* Of these files on average about 185 of these are shared broadly. *CLICK* These may be public or externally shared or just shared with the whole company. If we take a look at those 185 files that are shared broadly, about 20% of these contain sensitive data! (PII, PHI or PCI) If we go back and look at it from perspective of which users are doing this, we see that 5% of our users are responsible for 85% of the risk exposure. So who are they? What are these files? Where are they? And how do we remediate this? As it turns out, we can solve these, problems, but we need the right tools. Manual remediation would take us lengthy amounts of time to resolve, but automated tools, can resolve this in seconds. So let’s take look at how we can do this. Average number of files per user 2037 About 9% broadly shared (company-wide, external or public) 20% of these contain compliance-related data! Average time to remediate risk exposures: Manual: 67 minutes per user Automated: 16 seconds per user (1/251)
  • #10: Suggestion: Data Protection / Attack Mitigation
  • #13: ABOVE “LEARN MORE” BULLETS NEED TO BE UPDATED. Design notes: Same layout as the Gateway closing slide Now that you’ve seen this, I hope we’ve been able to answer your questions about safely enabling Dropbox. We would love to ask you to give Elastica a try. Setting up an evaluation literally takes about 5 minutes, requires no hardware or software, and you can start gaining visibility into your Dropbox for Business accounts very quickly. To get started, please contact your local sales team, or contact us directly here at Elastica to set up an evaluation today. Thanks, and we’ll look forward to seeing you on our next webinar!