<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Google Data &#187; Amanda Kleha</title>
	<atom:link href="/author/amanda-kleha/feed/" rel="self" type="application/rss+xml" />
	<link>https://googledata.org</link>
	<description>Everything Google: News, Products, Services, Content, Culture</description>
	<lastBuildDate>Thu, 19 Mar 2015 22:49:02 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.7.5</generator>
	<item>
		<title>2008: The year in spam</title>
		<link>https://googledata.org/google-enterprise/2008-the-year-in-spam/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=2008-the-year-in-spam</link>
		<comments>https://googledata.org/google-enterprise/2008-the-year-in-spam/#comments</comments>
		<pubDate>Mon, 26 Jan 2009 14:42:00 +0000</pubDate>
		<dc:creator><![CDATA[Amanda Kleha]]></dc:creator>
				<category><![CDATA[Google Enterprise]]></category>

		<guid isPermaLink="false"></guid>
		<description><![CDATA[[Ed. Note: The spam data cited in this post is drawn from the Postini Message Security network, which processes and culls spam from more than 2 billion enterprise email connections per day, giving Google strong insight into the state of the spam indust...]]></description>
				<content:encoded><![CDATA[<span style="font-style:italic;">[Ed. Note: The spam data cited in this post is drawn from the Postini Message Security network, which processes and culls spam from more than 2 billion enterprise email connections per day, giving Google strong insight into the state of the spam industry overall. For a discussion of what Google is doing to keep spam out of your Gmail inboxes on the consumer side, check out <a href="http://googleblog.blogspot.com/2007/10/its-not-about-spam.html">this post</a>.]</span><br /><br />In November 2008 a large source of the world's spam, the McColo network, was taken offline. Prior to that, spam levels had been holding relatively constant. But when McColo went offline, we saw spam drop by 70% compared with previous levels. However, spammers are recovering with vigor.<br /><br />While spam is still down overall, it's important to note its rate of growth. Spam levels are up by 156% since November 2008. As spammers recover, the increased rate of spam growth will likely have total spam volumes back to pre-McColo levels within a few months.<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://3.bp.blogspot.com/_U7OEo5eb1NY/SX3NNTbOFuI/AAAAAAAAAA8/eC6Hdw31TTg/s1600-h/blog0109_1b.png"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 218px;" src="http://3.bp.blogspot.com/_U7OEo5eb1NY/SX3NNTbOFuI/AAAAAAAAAA8/eC6Hdw31TTg/s320/blog0109_1b.png" border="0" alt=""id="BLOGGER_PHOTO_ID_5295614365294008034" /></a><br /><br />Although McColo received a lot of attention, the highest volume of spam in 2008 actually came on April 23, which was an all-time high spam level for Google Message Security data centers. That day, the average number of spam messages blocked per user was 194. This peak was driven by an unprecedented number of non-delivery receipt (NDR) attacks we saw in April. One customer who was the target of a specific NDR attack said that their users were receiving an average of 100 emails every minute.<br /><br />As spammers fill the void left by McColo, it's reasonable to anticipate a decreasing rate of growth as spam reaches November 2008 levels. However, since the November levels weren't even the peak for the year, and since spammers appear to be quickly recovering, the question remains: Where will spam volume top out in 2009? Will it be near the November 2008 level? the April 2008 level? Or higher? <br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://4.bp.blogspot.com/_U7OEo5eb1NY/SX3Noosuy1I/AAAAAAAAABE/GUzr3d6k6cQ/s1600-h/blog0109_3c.png"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 218px;" src="http://4.bp.blogspot.com/_U7OEo5eb1NY/SX3Noosuy1I/AAAAAAAAABE/GUzr3d6k6cQ/s320/blog0109_3c.png" border="0" alt=""id="BLOGGER_PHOTO_ID_5295614834861067090" /></a><br /><br />One way to approach that question might be to compare 2008 overall levels with previous years. Spam threats rose visibly in 2008, reflecting the overall trend of rising attacks. Even with the drop in November 2008, spam levels climbed 25% over 2007. Our statistics show that the average unprotected user would have received 45,000 spam messages in 2008 (up from 36,000 in 2007). All indicators suggest this trend will continue as virus, malware, and link-based attacks become both more frequent and more ingenious.<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://3.bp.blogspot.com/_U7OEo5eb1NY/SX3N0pgt0uI/AAAAAAAAABM/YFg4pIqEkR8/s1600-h/blog0109_2.png"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 218px;" src="http://3.bp.blogspot.com/_U7OEo5eb1NY/SX3N0pgt0uI/AAAAAAAAABM/YFg4pIqEkR8/s320/blog0109_2.png" border="0" alt=""id="BLOGGER_PHOTO_ID_5295615041237537506" /></a><br /><br />Looking ahead to the rest of 2009, we expect viruses sent via email and in blended attacks (email and web) to continue to be a serious threat. During the second half of 2008, virus volume increased six-fold from the first half of the year. These spam messages would often try to fool users by mimicking legitimate emails such as package tracking notifications or invoices that included virus attachments. Another popular technique in 2008 was emailing spoofed news alerts with URLs that would link to a website hosting the virus.  <br /><br />We can also expect that viruses and malware will continue to be a key tool and area of focus for spammers to upgrade their platforms. Even though virus attachment volumes have been low so far this year, we expect spammers to work hard to rebuild their networks to replace what was lost in the McColo shutdown.  <br /><br />Of course, the only thing we can really say with certainty about 2009 is that spam and viruses will continue to be unpredictable. And given that uncertainty, virus detection and blocking technologies become even more important. Last year we released advanced new anti-virus heuristics that specifically targeted zero-hour vulnerability (the period of time between when a new virus enters the wild and the release of the anti-virus signature file). When the zero-hour protection identifies a suspicious message, the message is scanned using the new anti-virus heuristics, and if confirmed as a virus, the message is quarantined.<br /><br />The chart below is an example of our new heuristic virus detection and blocking at work. On October 1, 2008, our automated technology detected a viral message pattern (later identified as new strain of the Downloader-AAP!zip) in the wild and started quarantining messages with this virus. Five hours later we received the new virus signature file from one of our anti-virus partners and the signature-based blocks began to take effect. <br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://1.bp.blogspot.com/_U7OEo5eb1NY/SX3OKni3tYI/AAAAAAAAABU/KWVEsMezgWc/s1600-h/Picture14.png"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 210px;" src="http://1.bp.blogspot.com/_U7OEo5eb1NY/SX3OKni3tYI/AAAAAAAAABU/KWVEsMezgWc/s320/Picture14.png" border="0" alt=""id="BLOGGER_PHOTO_ID_5295615418666825090" /></a><br /><br />As seen from the roller-coast ride of spam and viruses in 2008, spam has again demonstrated its resiliency. Despite eliminating a major source, spam keeps coming back. Spammers are re-investing with increasing speed to evolve their systems into decentralized, harder-to-detect ecosystems. If you'd like to know more about Google's anti-spam solution for businesses, visit us at www.google.com/a/security.<br /><br /><span class="byline-author">Posted by Amanda Kleha, Google Message Security Team</span><div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/19843120-6434005801332144142?l=googleenterprise.blogspot.com' alt='' /></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-enterprise/2008-the-year-in-spam/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Calculating the true cost of fighting spam</title>
		<link>https://googledata.org/google-enterprise/calculating-the-true-cost-of-fighting-spam/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=calculating-the-true-cost-of-fighting-spam</link>
		<comments>https://googledata.org/google-enterprise/calculating-the-true-cost-of-fighting-spam/#comments</comments>
		<pubDate>Wed, 19 Nov 2008 15:44:00 +0000</pubDate>
		<dc:creator><![CDATA[Amanda Kleha]]></dc:creator>
				<category><![CDATA[Google Enterprise]]></category>

		<guid isPermaLink="false"></guid>
		<description><![CDATA[In today's economic climate you need to be more efficient with your IT budget. And since email is a key tool for almost every businesses, keeping spam and malware out of inboxes remains a top priority. In our experience, companies often overlook the pr...]]></description>
				<content:encoded><![CDATA[In today's economic climate you need to be more efficient with your IT budget. And since email is a key tool for almost every businesses, keeping spam and malware out of inboxes remains a top priority. In our experience, companies often overlook the productivity costs that spam and viruses have on their business. This simple <a href="http://www.google.com/a/help/intl/en/security/roi_calculator.html">ROI calculator</a> lets you see how much spam can impact expenses and productivity, particularly if your current anti-spam solution is waning in effectiveness.<br /><br />Once you quantify how much spam is costing your company, it makes sense to re-evaluate the IT options for managing spam. The first, and perhaps biggest, decision is whether to keep spam filtering in-house or use a hosted service. It can be difficult to add up the true expenses of each solution. On the surface, the cost of an appliance may seem reasonable, but the up-front costs are just the beginning in a complete cost-of-ownership calculation.   <br /><br />At Google, we believe that email security makes sense as a hosted service for several cost-related reasons:<br /><br />    * <span style="font-weight:bold;">A cloud computing solution provides you with a predictable expense.</span> A spike in spam can hit at any time, and companies using an in-house solution may find themselves dealing with the unexpected capital expense of a new appliance to deal with the load. <br /><br />    * <span style="font-weight:bold;">You save on maintenance costs.</span> After installation, most in-house appliances require regular upgrades and maintenance. With a hosted solution, all the updates are handled through the cloud. Nothing to worry about or budget for.<br /><br />    * <span style="font-weight:bold;">Using the cloud makes email security more effective.</span> With a hosted service such as Google Message Security, you tap into a network of intelligence that spans more than 40,000 businesses and 14 million users, reaping the benefits of the economies of scale that come with that. <br /><br />To help you understand the whole cost of spam, we're introducing a <a href="http://www.google.com/a/help/intl/en/security/tco_calculator.html">TCO (total cost of ownership) calculator</a>, which lets you compare expenses for in-house appliances versus hosted services. Using a three-year time horizon and considering both start-up and maintenance costs, companies can save thousands by choosing a hosted service. The graph below models the results of one cost scenario, for a 100-user company:<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://1.bp.blogspot.com/_U7OEo5eb1NY/SSQ0zC-yoRI/AAAAAAAAAA0/w6uchokomec/s1600-h/tco_pic.png"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 210px;" src="http://1.bp.blogspot.com/_U7OEo5eb1NY/SSQ0zC-yoRI/AAAAAAAAAA0/w6uchokomec/s320/tco_pic.png" border="0" alt=""id="BLOGGER_PHOTO_ID_5270395515508531474" /></a><br /><br />Let's look at a customer who was re-evaluating their spam solution last year: Gaines, Wolter, & Kinney, P.C. is a civil litigation firm in Birmingham, Alabama, that specializes in tort defense. They needed a solution that would reduce the inflow of network traffic and be cost effective. David Hebert, an IT administrator for GW&K, recalls, "Our limits on connection bandwidth meant that a service that filtered out spam was a no-brainer decision." But David needed data to convince management that a change was essential. He used a ROI calculator and found that they were losing 122 hours per employee in productivity each year to spam. With the hourly rate of their lawyers, this meant that choosing Google Message Security paid for itself in 1 day.<br /><br />If your business is interested in learning more about how hosted services like Google Message Security can save you money and increase productivity, visit us at <a href="http://www.google.com/a/security">www.google.com/a/security</a>.<br /><br /><span class="byline-author">Posted by Amanda Kleha, Google Security and Compliance Team</span><div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/19843120-267416089704795170?l=googleenterprise.blogspot.com' alt='' /></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-enterprise/calculating-the-true-cost-of-fighting-spam/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Google Positioned in Leaders Quadrant</title>
		<link>https://googledata.org/google-enterprise/google-positioned-in-leaders-quadrant/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=google-positioned-in-leaders-quadrant</link>
		<comments>https://googledata.org/google-enterprise/google-positioned-in-leaders-quadrant/#comments</comments>
		<pubDate>Wed, 01 Oct 2008 00:06:00 +0000</pubDate>
		<dc:creator><![CDATA[Amanda Kleha]]></dc:creator>
				<category><![CDATA[Google Enterprise]]></category>

		<guid isPermaLink="false"></guid>
		<description><![CDATA[In their recently released Magic Quadrant for Email Security Boundaries (published September 11, 2008), Gartner Inc., an information technology research and advisory company, placed Google in the "Leaders Quadrant." Quadrant leaders, as Gartner defines...]]></description>
				<content:encoded><![CDATA[<span style=";font-family:arial;font-size:100%;" id="un9d"  >In their </span><span style=";font-family:arial;font-size:100%;" id="nlco"  >recently released </span><span style=";font-family:arial;font-size:100%;" id="nlco0"  ><a title="Access the report, complements of Google" href="http://www.google.com/support/a/bin/request.py?contact_type=quadrant" id="mr3_">Magic Quadrant for Email Security Boundaries</a> (published September 11, 2008), </span><span style=";font-family:arial;font-size:100%;" id="un9d"  >Gartner Inc., an information technology research and advisory company, placed <a id="i-tg" href="http://www.google.com/a/security" title="Google email security products">Google</a> in the "Leaders Quadrant</span><span style=";font-family:arial;font-size:100%;" id="nlco0"  >." </span><span style=";font-family:arial;font-size:100%;" id="y3-5"  >Quadrant leaders, as Gartner defines them, are "performing well today, have a clear vision of market direction, and are actively building competencies to sustain their leadership position in the market." Quadrant leaders also "offer a comprehensive and proficient range of email security functionality, and show evidence of superior vision and execution for current and anticipated customer requirements. </span><span style=";font-family:arial;font-size:100%;"  ><br /><br />Leaders typically have relatively high market share and/or strong revenue growth, own a good portion of their threat or content-filtering capabilities, and demonstrate positive customer feedback for anti-spam efficacy, and related service and support.</span><span style=";font-family:arial;font-size:100%;" id="y3-5"  >"</span><span style=";font-family:arial;font-size:100%;" id="u2-1"  > </span><span style=";font-family:Arial;font-size:100%;"  ><span id="aj:i">The report goes on to say that "T</span><span id="rswu">he email security market is rapidly maturing, yet continues to show strong growth and remains a 'must have' security purchase." </span><br /></span> <div  style="margin-top: 0px; margin-bottom: 0px;font-family:arial;"><span id="aj:i1"  style="font-size:100%;"><br />We're pleased to be included in this report and recognized in the leaders quadrant, as it underlines, in our opinion, the importance we attach to protecting against email-based threats and the ways we're helping our customers do so. <span id="aj:i1">Since the integration of the Postini email security product line in 2007 into Google's Enterprise Apps, Google has continued to innovate these products with functionality for our customers, including a new early detection quarantine that uses our own <span style="border-collapse: collapse;">heuristics to detect new virus strains before virus signatures are available. We have also added <span style="border-collapse: separate;">new content filter types, policy prioritization for messages that trigger more than one policy, and new policy engine interface features.  </span></span></span></span></div> <div style="margin-top: 0px; margin-bottom: 0px;"><span style="font-family:Arial;"><br /></span><span id="aj:i1"  style="font-size:85%;"><span style="font-family:Arial;"></span></span></div><span style="font-style: italic;font-size:78%;" ><span style="font-family:Arial;"><span style="font-family:Verdana;"><span style="font-family:Arial;">The Gartner Magic Quadrant is copyrighted 2008 by Gartner, Inc., and is reused with permission. The Magic Quadrant is a graphical representation of a marketplace at and for a specific time period. It depicts Gartner’s analysis of how certain vendors measure against criteria for that marketplace, as defined by Gartner. Gartner does not endorse any vendor, product or service depicted in the Magic Quadrant, and does not advise technology users to select only those vendors placed in the "Leaders" quadrant. The Magic Quadrant is intended solely as a research tool, and is not meant to be a specific guide to action. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.</span></span></span></span><br /><br /><span class="byline-author"><span style="font-size:100%;">Posted by Adam Swidler, Google Enterprise Product Marketing</span><br /></span><div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/19843120-8858753087042740345?l=googleenterprise.blogspot.com' alt='' /></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-enterprise/google-positioned-in-leaders-quadrant/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Security Spotlight: July Virus Attacks</title>
		<link>https://googledata.org/google-enterprise/security-spotlight-july-virus-attacks/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=security-spotlight-july-virus-attacks</link>
		<comments>https://googledata.org/google-enterprise/security-spotlight-july-virus-attacks/#comments</comments>
		<pubDate>Tue, 12 Aug 2008 19:53:00 +0000</pubDate>
		<dc:creator><![CDATA[Amanda Kleha]]></dc:creator>
				<category><![CDATA[Google Enterprise]]></category>

		<guid isPermaLink="false"></guid>
		<description><![CDATA[Posted by Amanda Kleha, Google Apps Security &#38; Compliance TeamIn July, our Postini datacenters saw the biggest volume of email virus attacks so far in 2008, with a peak of nearly 10 million messages on July 24. One of the more prominent attacks in ...]]></description>
				<content:encoded><![CDATA[<span style=";font-family:verdana;font-size:85%;" class="byline-author"  >Posted by Amanda Kleha, Google Apps Security &amp; Compliance Team<br /><br /></span><span style="font-size:85%;"><span id="o.od0"  style="font-family:verdana;"><span id="g1ex" style="background-color: rgb(255, 255, 255);">In July, our </span><span id="tw28" style="background-color: rgb(255, 255, 255);">Postini </span><span id="g1ex0" style="background-color: rgb(255, 255, 255);">datacenters </span>saw the biggest volume of email virus attacks so far in 2008, with a peak of nearly 10 million messages on July 24. </span><span id="momr"  style="font-family:verdana;">One of the more prominent attacks in the month involved </span><span id="ghd-"  style="font-family:verdana;">a spoofed UPS package-tracking link that was intended to lure recipients into clicking on it and downloading malware. </span><span id="ghd-0"  style="font-family:verdana;">Our zero-hour virus protection technology first started catching these emails on July 20.<br /><br /></span></span><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://3.bp.blogspot.com/_U7OEo5eb1NY/SKHrXMrTX1I/AAAAAAAAAAM/Hjz2ivoKz4I/s1600-h/chart_virus-activity%282%29.jpg"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;" src="http://3.bp.blogspot.com/_U7OEo5eb1NY/SKHrXMrTX1I/AAAAAAAAAAM/Hjz2ivoKz4I/s320/chart_virus-activity%282%29.jpg" alt="" id="BLOGGER_PHOTO_ID_5233723025753595730" border="0" /></a><br /><span style="font-size:85%;"><span id="ghd-0"  style="font-family:verdana;"><br /></span><span id="ikzo"  style="font-family:verdana;">Many of the viruses we see follow a similar format, in which an email with an embedded website link in the message is changed from what the link displays. <span id="r4c5" style="background-color: rgb(255, 255, 255);">Another recent example was a </span></span><span id="r4c50" style="background-color: rgb(255, 255, 255);font-family:verdana;" >spoofed CNN newsletter sent out by spammers. In this case, the content included current news stories with numerous links in the message. The majority of the links were valid, but there were some that were replaced with malicious links. As soon as our technology started detecting these messages, we implemented a filter to stop these elusive viruses and voila! -- all of our 14 million business users were protected. </span><span id="qmuo"  style="font-family:verdana;">This network effect and rapid protection against these new tactics is why businesses are increasingly moving their email security into the cloud.</span>  <span style="font-family:verdana;"><br /><br />Viruses tend to increase during the summer months, and August is already showing some new types of viruses. On August 5, we saw a large inflow of messages with an encrypted .RAR attachment. The overall 2008 trend has been a decrease in the use of attachments, so this new virus is confirmation that spam doesn't follow trends for long.</span> </span><div id="tjmh" style="padding: 1em 0pt; text-align: left;"><span style="font-size:85%;"><span style="font-family:verdana;">These examples are also a good reminder about the importance of educating our colleagues, friends, and family on how to safely interact with email -- namely, that we should all </span><a style="font-family: verdana;" title="be careful" href="http://googleblog.blogspot.com/2008/04/how-to-avoid-getting-hooked.html" id="sd8k">be careful</a><span style="font-family:verdana;"> about clicking on links in emails, even if those messages appear to be from people or organizations we know.</span><br /><br /><span id="f8-7"  style="font-family:verdana;"><a style="font-weight: bold;" title="Join Google security experts" href="http://w.on24.com/r.htm?e=116483&amp;k=E679E434ECD09EFE9AB299E6B4E16A3B&amp;partnerref=blog_enterprise" id="y5.z">Join Google security experts</a> for an upcoming webinar for IT professionals that will explore the topic "How spam is changing your business email, and what to do about it" on Friday, August 15, at 10:00 am PDT.<br /><br />For more information on how Google can help your business secure its email and web traffic, visit us at www.google.com/a/security.</span></span><br /></div><div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/19843120-3005135717849975808?l=googleenterprise.blogspot.com' alt='' /></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-enterprise/security-spotlight-july-virus-attacks/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Google innovation across America: Find. Share. Secure.</title>
		<link>https://googledata.org/google-apps/google-innovation-across-america-find-share-secure/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=google-innovation-across-america-find-share-secure</link>
		<comments>https://googledata.org/google-apps/google-innovation-across-america-find-share-secure/#comments</comments>
		<pubDate>Fri, 16 May 2008 00:17:00 +0000</pubDate>
		<dc:creator><![CDATA[Amanda Kleha]]></dc:creator>
				<category><![CDATA[Google Apps]]></category>
		<category><![CDATA[Google Enterprise]]></category>

		<guid isPermaLink="false"></guid>
		<description><![CDATA[Posted by Dave Girouard, VP and General Manager, Google Enterprise  Google is renowned for its innovative approach to business, ours and that of our users. We are our own best case study of a large enterprise operating in the cloud. And every day, more...]]></description>
				<content:encoded><![CDATA[Posted by Dave Girouard, VP and General Manager, Google Enterprise<b id="lucf0"><br /></b> <br /> Google is renowned for its innovative approach to business, ours and that of our users. We are our own best case study of a large enterprise operating in the cloud. And every day, more and more companies join us. In fact, to date there are more than 10 million <span id="c.qe0"  style="color:#ff0000;">active </span>users on Google Apps, our suite of collaboration tools for business that includes Gmail, Calendar, Docs, and much more.<br />  <br /> But simply adopting Google technology is only the first step. A common question we get is, "Now that we are using Google products, how can we take full advantage of them?" Many of you want to know how you can help your employees find, share, and secure information in a way that is both fast <i id="vkwo0">and</i> scalable. Oh, and without incurring enormous costs.<br /> <br /> So we've decided to visit you in the places where you live. In June alone, we'll be in seven different cities<span id="yjn-0"> (</span><a href="http://www.google.com/enterprise/innovation/" id="nerv" title="see details here">see details here</a>), with more to be added throughout the rest of the year, for a full day of presentations, demos, and conversation.<br /> <br /> In each location, a Google executive will offer a keynote address on how you can scale innovation in your company and how Google technology can help you become more creative, productive, and efficient. Then, in breakout sessions, we will help you take a closer look at <a href="http://www.google.com/enterprise/gsa/index.html" id="t2p2" title="Google enterprise search">Google enterprise search</a>, <a href="http://www.google.com/a/help/intl/en/business/applications.html" id="edev" title="Google Apps">Google Apps</a>, and <a href="http://www.google.com/a/help/intl/en/security/index.html" id="shax" title="Google security and compliance">Google security and compliance</a> . Finally, you'll be able to get your hands on a range of Google products and services and try them out with a Google expert standing by to answer your questions.<br /> <br /> The events are free and open to current Google customers and to prospective customers with at least 500 employees that would like to learn more about how Google innovation can change their businesses. Please go to our <a href="http://www.google.com/enterprise/innovation/" id="ix.-" title="registration page">registration page</a> to sign up and see the full itinerary. Hope to see you on the road!<div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/19843120-9012460134943773624?l=googleenterprise.blogspot.com' alt='' /></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-apps/google-innovation-across-america-find-share-secure/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Google Web Security for Enterprise now protects roaming users</title>
		<link>https://googledata.org/google-enterprise/google-web-security-for-enterprise-now-protects-roaming-users/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=google-web-security-for-enterprise-now-protects-roaming-users</link>
		<comments>https://googledata.org/google-enterprise/google-web-security-for-enterprise-now-protects-roaming-users/#comments</comments>
		<pubDate>Thu, 08 May 2008 14:59:00 +0000</pubDate>
		<dc:creator><![CDATA[Amanda Kleha]]></dc:creator>
				<category><![CDATA[Google Enterprise]]></category>

		<guid isPermaLink="false"></guid>
		<description><![CDATA[Posted by Tim Johnson, Product Marketing ManagerGoogle Web Security for Enterprise protects organizations of all sizes against web malware attacks in real time and enables the safe, productive use of the web, without incurring hardware, upfront capital...]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Posted by Tim Johnson, Product Marketing Manager</span><br /><br />Google Web Security for Enterprise protects organizations of all sizes against web malware attacks in real time and enables the safe, productive use of the web, without incurring hardware, upfront capital, or IT management costs. The product enables organizations to control how employees use the Internet, and provides easy-to-use tools to create, enforce, and monitor the right web policy for your organization. Now, through a new add-on feature, we're extending that security to users wherever they may be working.<br /><br />Protecting off-network users used to require them to connect via a VPN when they were out of the office — often with mixed results. With this new feature, all off-network users' web traffic is automatically directed to scanning infrastructure to enforce your policies and protect their computers, requiring no action on the part of individuals. It's easy to deploy and users can't tamper with it, ensuring your security and appropriate use policies are always in place.<br /><br />In this way we hope to help your organization take greater control over its security, bandwidth and web communications. Google Web Security is powered by Postini with technology from ScanSafe, and integrated with Google Apps security and compliance messaging services. It's available in North America and Europe, and you can find out more on our <a href="http://www.google.com/a/help/intl/en/security/web.html">Web Security page</a>.<div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/19843120-4910746377803118819?l=googleenterprise.blogspot.com' alt='' /></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-enterprise/google-web-security-for-enterprise-now-protects-roaming-users/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Google Message Discovery now available online</title>
		<link>https://googledata.org/google-enterprise/google-message-discovery-now-available-online/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=google-message-discovery-now-available-online</link>
		<comments>https://googledata.org/google-enterprise/google-message-discovery-now-available-online/#comments</comments>
		<pubDate>Mon, 31 Mar 2008 23:47:00 +0000</pubDate>
		<dc:creator><![CDATA[Amanda Kleha]]></dc:creator>
				<category><![CDATA[Google Enterprise]]></category>

		<guid isPermaLink="false"></guid>
		<description><![CDATA[Posted by Bill Kee, Product MarketingWe're happy to announce that Google Message Discovery is now available for purchase online.  Google Message Discovery is a package of online services that gives businesses more control over the storage and security ...]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Posted by Bill Kee, Product Marketing</span><br /><br />We're happy to announce that <a title="Google Message Discovery" href="http://www.google.com/a/help/intl/en/security/archive.html" id="ouom">Google Message Discovery</a> is now available for purchase online.  Google Message Discovery is a package of online services that gives businesses more control over the storage and security of their email.  Now any business, small or large, can easily implement strong email security as well as reliable archiving.<br /><br />The cornerstone of Google Message Discovery is email archiving.  What is email archiving?   Many businesses already have some email backup because they recognize it's critical to:<br /><ul id="f_x4"><li id="mtjm">recover lost mail </li><li id="mtjm"><a title="comply with regulations" href="http://www.google.com/a/help/intl/en/security/pdf/WP44-BMGuide.pdf" id="fn70">comply with regulations</a> regarding email retention<br /></li><li id="mo7g">access emails in response to a litigation or other investigation<br /></li></ul>The problem is, the backup systems many businesses use, such as tape drives or extra email servers, aren't sufficient. It's costly and complex to store huge amounts of data on email servers. And it's nearly impossible to find specific emails quickly when searching through a pile of backup tapes.<br /><br />Email archiving is different. Unlike a backup, an archiving service:<br /><ul id="mqcj"><li id="oc8a">provides storage that automatically scales with your needs<br /></li><li id="oc8a">captures <span id="t4pn"><u id="t62x">all</u></span> sent and received messages (Backup systems merely take a snapshot of your mail storage at a certain time, say every night at midnight, and don't capture messages that may have been sent and then deleted in the meantime)<br /></li><li id="oc8a">allows specific policies to be set around message retention time periods<br /> </li><li id="oc8a">allows authorized administrators to search across email for all users quickly<br /></li></ul>The message archiving service in Google Message Discovery is designed to help businesses of all sizes easily achieve these goals.   It's included with <a title="Google Apps Premier Edition" href="http://www.google.com/a/help/intl/en/business/applications.html" id="c.f6">Google Apps Premier Edition</a>, and also supports other email systems, such as Microsoft Exchange or Lotus Domino.<br /><br />Since the service is hosted by Google, there's no hardware or software to install.  And it provides powerful search tools to help you quickly locate relevant emails when you need them.  Message Discovery also includes <a title="email filtering and security" href="http://www.google.com/a/help/intl/en/security/email.html" id="ub3q">email filtering and security</a>, which blocks spam, viruses and other threats before they reach your servers or inbox.<br /><br />We see email archiving and security as a foundational element for helping businesses organize their information and make it accessible and useful.  And now that we've made it available online- starting at $25 per user, per year- we look forward to helping organizations quickly take greater control over their email.<div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/19843120-8218446542210868751?l=googleenterprise.blogspot.com' alt='' /></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-enterprise/google-message-discovery-now-available-online/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
