Top Nine Google Apps for Security and Compliance - Slide 08

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10
Next Top Nine Google Apps for Security and Compliance-8 Next

gPanel Security & Discovery (gSD) is an advanced governance, risk management, and compliance platform for Google Apps. The auditing engine thoroughly analyzes and records the current state of your data every night. This allows you to self-assess your risk and exposure by reviewing creation, modification, and deletion dates. Instantly review data access exposure. Have the ability to produce reports on every doc that was changed for a given day and who changed it.

Take a proactive approach to data security and data loss prevention (DLP) with features such as shared policies management (white list and black list domains in the shares) and Lock Box (onDemand Document Locking & Storage). gSD not only has the ability to discover Intellectual Property (IP) contained in your data, but more importantly you can define an action to take place to secure, protect, or copy of that found data.

Cost: 14-Day Free Trial

Google Apps provides a less expensive, Web-based alternative to traditional proprietary software. In addition to the standard Gmail, Calendar and Doc features, there are a wide variety of integrated apps available that add functionality to Google Apps. These integrated apps also include single sign-on capability, thereby limiting the number of passwords users must remember. This slideshow features nine of the highest-rated apps for security and compliance from the Google Apps Marketplace.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

Subscribe Daily Edge Newsletters

Sign up now and get the best business technology insights direct to your inbox.