Google Workspace Client-Side Encryption Now Generally Available in Gmail, Calendar

Share This Post

Google this week announced that client-side encryption (CSE) for Gmail and Calendar is now generally available for Workspace customers.

In December 2022, Google rolled out CSE for Gmail in beta for select Workspace customers, after previously making it available for services such as Calendar (beta), Docs, Drive, Meet, Sheets, and Slides.

The feature is now generally available for Workspace Enterprise Plus, Education Standard, and Education Plus customers, for all supported services.

Client-side encryption provides Workspace customers with an extra layer of protection for their data and helps them meet regulatory compliance needs.

“The expansion of CSE capabilities across Google Workspace helps to significantly reduce the burden of compliance for enterprises and public sector organizations. It gives organizations higher confidence that any third party, including Google and foreign governments, cannot access their confidential data,” Google notes.

While Google Workspace encrypts data at rest and in transit, CSE provides customers with sole control over their encryption keys and over the identity management service for accessing those keys.

“Starting today, users can send and receive emails or create meeting events with internal colleagues and external parties, knowing that their sensitive data (including inline images and attachments) has been encrypted before it reaches Google servers,” Google explains.

Related:New Identity Verification Feature Boosts Google Workspace Protections

Related:Google Workspace Now Warns Admins of Sensitive Changes

Related:Google Fights Phishing With Updated Workspace Notifications

SecurityWeek RSS Feed

Read More

More Articles

Article

Navigating SEC Regulations In Cybersecurity And Incident Response

Free video resource for cybersecurity professionals. As 2024 approaches, we all know how vital it is to keep up to date with regulatory changes that affect our work. We get it – it’s a lot to juggle, especially when you’re in the trenches working on an investigation, handling, and responding to incidents.

Article

BFU – Seeing is Believing

Oh no, the device is in BFU. This is the common reaction; a device needs extracting, and you find it in a BFU state. Often, there’s an assumption that a BFU extraction will only acquire basic information, but that isn’t always the case.