Why Cloud SSO improves Google for Work security

Paris, January 4th, 2016

Small companies and big corporations massively adopt Google for Work. Google for Work is a fantastic collaboration tool that sensibly improves users productivity and optimizes IT costs (infrastructure, applications, production costs).

As far as security is concerned, Google is also a major reference. Few software vendors can claim a higher level of security than Google in terms of development and production of web applications. Still, when Google for Work is to be integrated with the corporate information system, authentication mechanisms that are shipped with Google for Work are not fully satisfying CIOs and CISOs.

  • It is necessary to synchronize Google passwords with internal corporate passwords. These passwords must be stored by Google in a rather insecure form (Windows hashes, not salted).
  • Additionaly, it is not possible to define different access policies, even basic ones: mobile/sendatary users, access with or without strong authentication according to user groups or incoming network address, for instance.
  • Finally, Active Directory integration tools do not support silent authentication on user's desktop, and require users to enter their Windows password in their web browser.

Trustelem solves these issues and fosters the adoption de Google for Work. Many of our clients chose our Cloud SSO solution because of its better adaptability to their security requirements compared to the standard Google for Work authentication framework: Trustelem doese not need to store their corporate passwords. Authentication policies based on groups, applications and other criteria are easy to define in our web-based administration console. Users are silently authenticated based on their Windows session. With the support of our engineering teams, Trustelem is deployed very quickly.

Operated from European Union (EU), Trustelem Cloud SSO solution also applies to Office 365, Salesforce, Dropbox and many other applications. It includes a large choice of user authentication methods.