{"id":2605,"date":"2018-06-07T09:35:58","date_gmt":"2018-06-07T09:35:58","guid":{"rendered":"https:\/\/devbloglavaprotocols.nityo.in\/cloud-identity-allowing-you-to-manage-users-devices-and-apps-in-one-location\/"},"modified":"2018-06-07T09:35:58","modified_gmt":"2018-06-07T09:35:58","slug":"cloud-identity-allowing-you-to-manage-users-devices-and-apps-in-one-location","status":"publish","type":"post","link":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/cloud-identity-allowing-you-to-manage-users-devices-and-apps-in-one-location\/","title":{"rendered":"Cloud Identity: Allowing You to Manage Users, Devices, and Apps in One Location"},"content":{"rendered":"<div style=\"margin-top: 0px; margin-bottom: 0px;\" class=\"sharethis-inline-share-buttons\" ><\/div><div class=\"module--text h-c-page\">\n<div class=\"h-c-grid\">\n<div class=\"uni-paragraph h-c-grid__col h-c-grid__col--8 h-c-grid__col-m--6 h-c-grid__col-l--6 h-c-grid__col--offset-2 h-c-grid__col-m--offset-3 h-c-grid__col-l--offset-3\">\n<div class=\"rich-text\">\n<p><em><strong>Vidya Nagarajan<\/strong><\/em>, Senior Product Manager, Cloud Identity<\/p>\n<p>Whether we\u2019re collaborating with teammates in different parts of the world, troubleshooting client issues on location, or checking email on the way to the airport, cloud apps and mobile devices have fundamentally changed the way we work. In fact, they\u2019ve changed the way businesses need to approach security.<\/p>\n<p>Today, the average user <a href=\"https:\/\/www.citrix.com\/content\/dam\/citrix\/en_us\/documents\/products-solutions\/citrix-mobile-analytics-report-february-2015.pdf?accessmode=direct\" rel=\"noopener\" target=\"_blank\">works on three or more devices<\/a>\u00a0and needs quick access to business apps they rely on so that they can work wherever and whenever they need to. That being said, IT administrators now face the challenge of staying on top of an ever-evolving ecosystem of users, apps and devices.<\/p>\n<p>Here at Google, we\u2019ve faced similar firsthand challenges. Using this knowledge and our experience from managing billions of consumer and enterprise identities, we developed Cloud Identity. With Cloud Identity, employees get <strong>simple, secure and quick access<\/strong> to their business-critical apps and devices, while administrators get the tools they need to manage it all in <strong>one unified location.<\/strong><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><!--more--><\/p>\n<div class=\"module--text h-c-page\">\n<div class=\"h-c-grid\">\n<div class=\"uni-paragraph h-c-grid__col h-c-grid__col--8 h-c-grid__col-m--6 h-c-grid__col-l--6 h-c-grid__col--offset-2 h-c-grid__col-m--offset-3 h-c-grid__col-l--offset-3\">\n<div class=\"rich-text\">\n<h2><span style=\"color: #ff6600;\"><strong>Simple access for users + simple control for administrators<\/strong><\/span><\/h2>\n<p>Cloud Identity gives people simple, one-click access to the apps they need so they can work from anywhere and on any device. This means employees can focus on their work, while administrators can manage identities, associated apps and devices at scale from one integrated console as people join, move within, and leave an organisation.<\/p>\n<p>Cloud Identity\u2019s single sign-on supports SAML (Security Assertion Markup Language) 2.0 and OpenID. It also works with hundreds of applications out of the box such as Salesforce, <a href=\"https:\/\/blogs.sap.com\/2018\/03\/21\/integrating-sap-successfactors-with-google-cloud-identity-with-the-help-of-sap-cloud-platform\/\" rel=\"noopener\" target=\"_blank\">SAP SuccessFactors,\u00a0<\/a><a href=\"https:\/\/www.box.com\/partners\/google\" rel=\"noopener\" target=\"_blank\">Box<\/a>\u00a0and G Suite apps <em>\u2014\u00a0<\/em>such as Google Docs and Google Drive.<\/p>\n<p>For organisations using GCP (Google Cloud Platform) resources, Cloud Identity provides additional controls for managing users and groups across their hybrid on-premises and cloud infrastructures.<\/p>\n<h2><strong><span style=\"color: #ff6600;\">Work anywhere, secure everywhere<\/span><\/strong><\/h2>\n<p>Gone are the days when employees worked from one computer at their office to get the job done. Today, they need the freedom to work from anywhere and understanding that context \u2014 what they need to do, where, and with what device\u2014 is what should guide enterprise access. Having the right mobile device and application management posture for this is paramount.<\/p>\n<p>Cloud Identity includes robust mobile device management for Android and iOS with many features like account wipe and passcode enforcement automatically enabled for users. Administrators can use one integrated console to implement screen locks, find devices, enforce two-step verification and phishing-resistant security keys, and manage Chrome Browser usage. They also get security reports and analytics for things like suspicious logins, user activity reports and audits, and logins to third-party apps, sites and extensions.<\/p>\n<p>Integration partners like Salesforce have told us they\u2019ve benefited from these additional security postures.<\/p>\n<p>Salesforce Senior Vice President of Identity and Security Product Management Chuck Mortimore says, \u201cWith the combination of the Salesforce Platform and Cloud Identity\u2019s robust support for Security Keys and Chrome management, companies can focus on delivering customer success with confidence that they\u2019re providing the right service, to the right user, at the right time.\u201d<\/p>\n<h2><strong><span style=\"color: #ff6600;\">Open standards, open ecosystem<\/span><\/strong><\/h2>\n<p>Google prides itself for its commitment to\u00a0<a href=\"https:\/\/fidoalliance.org\/about\/what-is-fido\/\" rel=\"noopener\" target=\"_blank\">open standards in the security space. This is why<\/a>\u00a0Cloud Identity was built to be open. It\u2019s easy for customers to seamlessly integrate other cloud and on-premises directories with Cloud Identity.<\/p>\n<p>We\u2019re also continuing to work with our strong ecosystem of identity partners so that customers can choose the best solutions to meet their requirements across hybrid-deployments.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"uni-pull-quote h-c-page\">\n<section class=\"h-c-grid\">\n<div class=\"uni-pull-quote__wrapper h-c-grid__col h-c-grid__col--8 h-c-grid__col-m--6 h-c-grid__col-l--6 h-c-grid__col--offset-2 h-c-grid__col-m--offset-3 h-c-grid__col-l--offset-3\">\n<div class=\"uni-pull-quote__inner-wrapper h-c-copy h-c-copy\">\n<q class=\"uni-pull-quote__text\">We\u2019re a team of six, but Cloud Identity helps us manage our identity lifecycle management at scale<\/q><br \/>\n<em>\u2014<strong>Daniel Tehrani,\u00a0<\/strong><\/em><br \/>\n<cite class=\"uni-pull-quote__author\"><span class=\"uni-pull-quote__author-meta\">VP of Information Technology at HealthChannels<\/span><\/cite>\n<\/div>\n<\/div>\n<\/section>\n<\/div>\n<div class=\"module--text h-c-page\">\n<div class=\"h-c-grid\">\n<div class=\"uni-paragraph h-c-grid__col h-c-grid__col--8 h-c-grid__col-m--6 h-c-grid__col-l--6 h-c-grid__col--offset-2 h-c-grid__col-m--offset-3 h-c-grid__col-l--offset-3\">\n<div class=\"rich-text\">\n<h2><strong><span style=\"color: #ff6600;\">All the functionality you need in one license<\/span><\/strong><\/h2>\n<p>Cloud Identity was built to give enterprises all the functionality they need right out of the box. That means businesses have the right tools to protect their users, devices and data all in one place \u2014 without needing to add other solutions or licenses.<\/p>\n<p>Over the past few months, we\u2019ve worked with a broad range of customers such as ExtraHop Networks and HealthChannels, to help them meet their identity needs.<\/p>\n<p>\u201cAt <a href=\"http:\/\/www.healthchannels.com\/\" rel=\"noopener\" target=\"_blank\">HealthChannels<\/a>, we help dynamically staff 15,000+ medical scribes at hospitals and doctor\u2019s offices,\u201d Tehrani says. \u201cThat means onboarding, moving and offboarding hundreds of people in a given month, while maintaining visibility and control over the applications they have access to. We\u2019re a team of six, but Cloud Identity helps us manage our identity life cycle management at scale.\u201d<\/p>\n<p><strong><i>Lava is an authorised Cloud Partner of Google and is a <\/i><a href=\"https:\/\/lavaprotocols.com\/email-and-collaboration\/\"><i>reseller of G Suite <\/i><\/a><i>(previously known as Google Apps, Google Maps for Work, and Google Cloud Platform) in Malaysia. We also provide cloud hosting and cloud migration services. With more than a decade of experience in the industry. We\u2019re proud to say we\u2019re one of the leading cloud service providers and consultants in the Asia Pacific region.<\/i><\/strong><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><span class=\"et_bloom_bottom_trigger\"><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Business users today need quick access to business apps so that they can work anywhere and any time. That being said, IT administrators face the challenge of staying on top of an ever-evolving ecosystem of users, apps and devices. The solution?<\/p>\n","protected":false},"author":1,"featured_media":2606,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[18,67],"class_list":["post-2605","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-blog","tag-google-for-work"],"jetpack_featured_media_url":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-content\/uploads\/2024\/10\/CloudIdentity-edit-2.jpg","_links":{"self":[{"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/posts\/2605","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/comments?post=2605"}],"version-history":[{"count":0,"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/posts\/2605\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/media\/2606"}],"wp:attachment":[{"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/media?parent=2605"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/categories?post=2605"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/tags?post=2605"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}