Contact Cloud Sales
Corrections Technology with verified security built in.

Google operates one of the most robust networks of distributed datacenters in the world. The protection of the data and intellectual property on these servers is our top priority.   We dedicate extensive resources to maintaining data security and protecting users' privacy.
Protected around the clock and monitored by a dedicated security team, the data facilities are held to extremely high standards of scrutiny every moment of the day.

  • The controls, processes and policies that protect data in the systems have successfully completed a SAS 70 Type II audit.
  • Google Apps offers a 99.9% Service Level Agreement and exceeds Microsoft' Exchange online in reliability, so you can be confident that employees will have access whenever they need it.
  • Google Apps is the first cloud based messaging and collaboration suite to achieve FISMA (Federal Information Security Management Act) certification, indicating that the General Services Administration has reviewed and certified their security processes and documentation.

2-step Verification

2-step verification allows users to add an additional layer of protection to their Google Apps accounts. In addition to your username and password, you'll enter a code that Google will send you via text or voice message upon signing in. This feature is available for FREE for all members and users of Google Apps for Government and Google Apps for Business.

Infrastructure Security

Google Apps is designed to provide you with a secure and reliable platform for your data, bringing you the latest technologies and some of the best practices in the industry for datacenter management, network application security, and data integrity.

Google has created a secure, reliable cloud based computing environment with collaboration technology that can't be matched by other systems today.

– Jason Ruger, Director of IT Strategy Motorola Mobile Devices

Three main components ensure the reliability of Google's security practices:

1.  People – Google employs a full-time information security team including some of the world's foremost experts in information, application, and network security. This team is responsible for the company's perimeter defense systems, security review processes, and customized security infrastructure, as well as for developing, documenting, and implementing Google's security policies and standards.

2.  Process – Security is part of Google's DNA, built into each application from day one. Google applications go through multiple security reviews as part of the Secure Code development process. The application development environment is closely restricted and carefully monitored to maximize security. External security audits are also regularly conducted to provide additional assurance.

3.  Technology – To reduce exploit risks, each Google server is custom-built with only the necessary software components, and the homogeneous server architecture enables rapid updates and configuration changes across the entire network when necessary. Data is replicated in multiple data centers for redundancy and consistent availability.