What is Endpoint Verification and why is it important? Endpoint Verification allows G Suite admins to see corporate device status’, including Operating System, Device type, and User information.
As well as covering G Suite’s Endpoint Verification solution below, our previous blogs address the other aspects of managing corporate devices and data through Mobile Device Management and Chrome Device Management, which are both also included in G Suite.
Google is an organisation that was built in the cloud, and has had security in mind from day one. This is evident when looking into its structure, technology, operations and its approach to customer data. The robust security infrastructure and systems become the default for each and every G Suite customer.
What is Endpoint Verification?
As mentioned, Endpoint Verification is a tool provided by G Suite that allows administrators to view information about devices that are accessing corporate data. To use Endpoint Verification in your organisation, you first need to install and be using G Suite in the Chrome Web Browser.
Once the technical configuration is complete and all devices are registered, admins will be able to see the below information:
- Device ID, serial number, device type, and operating system.
- Username and email address.
- The first and last time devices synchronized corporate data.
- If devices are encrypted and have a password.
- For devices running Chrome OS, admins can also see whether devices adhere to organization policies.
While corporate devices are the key to employee productivity, they can also be a weak link when it comes to application and data security, if not properly managed.
Endpoint Verification gives admins an overview of the security posture of their laptop and desktop devices. This provides a great platform for maintaining security across the organisation. The tool is available to all G Suite Business, and G Suite Enterprise customers and integrates with ChromeOS, macOS, Linux, Windows, iOS and Android devices.
Admins can tag endpoint devices running Chrome as approved or blocked as well as using the tag to configure access levels. They can also decide whether an additional review is needed for newly registered endpoint verification devices before they’re tagged as approved.
You can then view the entire inventory of devices that have access to corporate data. From there, admins can approve or block access to specific devices based on any internal criteria. Examples include lost devices, which can now be ‘blocked’ from accessing apps, or approving new users who need to access applications as their job titles shift. Email notifications can also be set up for when a device is registered but needs admin approval.
Some of Google Chrome’s standard security features include Safe Browsing, sandboxing, and automatic updates to ensure that users are always protected from the latest viruses, malware, phishing attacks, and malicious sites.
G Suite admins can deploy Google Chrome across their organisation and customise it to their requirements. There are over 280 policies available to help admins control how Chrome is used across all devices. For example, automatic updates can be scheduled to get the latest security fixes, block or allow specific apps and websites, as well as configuring support for legacy browsers.
As official Google Cloud Partners, Cobry has deployed G Suite and configured Endpoint Verification for organisations of all sizes throughout Scotland and across Europe.
If your organisation is considering making the move to G Suite, or has already set up their account but would like some help with device management, or any other aspects of G Suite, please get in touch via the details below – we would be delighted to have a chat.