Google AI in Workspace Adds New Zero-Trust and Digital Sovereignty Controls

Google announced security enhancements to Google Workspace focused on enhancing threat defense controls with Google AI. At a Google Cloud press event on Tuesday, the company announced Google Cloud’s rollout over the course of this year of new AI-powered data security tools bringing zero-trust features to Workspace, Drive, Gmail and data sovereignty.

The focus of the new enhancements across Google Drive includes a slew of zero-trust aligned, AI-powered enhancements to its cloud-native architecture, according to Google, which said AI will drive automated data labeling and classification to defend against exfiltration attempts by threat actors.

Google said the new capability provides more granular controls to help prevent unintended data loss.

Google is also adding controls to Workspace that can provide a step change in attestable digital sovereignty with secure-by-default infrastructure, technical data access controls and industry certifications all in a single cloud instance.

Y Wen, Google Cloud’s director of product for Workspace security and compliance, explained that the company’s digital sovereignty controls are enabling a nuanced approach to how organizations control the use of data they own, and how they tailor these priorities to meet such regulatory frameworks as the European General Data Protection Regulation, or GDPR. He said new sovereignty controls improve upon such tactics as data residency, when it comes to how an organization controls the movement of its information across borders.

Google Cloud spokespeople said the company will incorporate new and sometimes mandatory identity access management protocols into its Workspace tools for IT and security operations.

Share this article on social media:

Subscribe to Our Newsletter!

Stay on top of cybersecurity risks, evolving threats and industry news.

This field is for validation purposes and should be left unchanged.

Recent News

Featured Services

The Latest Cybersecurity News

From major cyberattacks, newly discovered critical vulnerabilities to recommended best practices, read it here first:

BOOK A MEETING

Enter your Email Address

This field is for validation purposes and should be left unchanged.

* No free email provider (e.g: gmail.com, hotmail.com, etc.)

This site is registered on wpml.org as a development site. Switch to a production site key to remove this banner.