Google rolls out 2-step verification for Apps users
New sign-in feature unveiled at Google Atmosphere aims to boost cloud security
Computerworld - Google today moved to boost security for users of its hosted Google Apps tools by adding a new two-step verification process.
Google announced the new sign-in feature Monday morning at its Google Atmosphere conference in Paris.
"Cloud computing is about making your information easily accessible from anywhere, on any device," Eran Feigenbaum, director of security for Google Apps, said in a blog post. "Until today, organizations looking to secure their information beyond a password have faced costs and complexities that prevented many of them from using stronger security technologies. Today, we are changing that with the introduction of a more secure sign-in capability for Google Apps accounts that significantly increases the security of the cloud: Two-step verification."
The feature, which must be enabled by an administrator, requires that users have two means of identification - something they know (a password), and something they have (a cell phone).
Feigenbaum explained that after a user plugs in her password, a verification code will then be sent to her cell phone.
"This makes it much more likely that you're the only one accessing your data," he said. "Even if someone has stolen your password, they'll need more than that to access your account. You can also indicate when you're using a computer you trust and don't want to be asked for a verification code from that machine in the future."
While this new capability is just for Google Apps business users today, Feigenbaum said it will be rolled out to all individual Google users "in the coming months."
Google apps include Gmail, Google Docs and Calendar.
Sharon Gaudin covers the Internet and Web 2.0, emerging technologies, and desktop and laptop chips for Computerworld. Follow Sharon on Twitter at @sgaudin, or subscribe to Sharon's RSS feed . Her e-mail address is firstname.lastname@example.org.
Read more about Cloud Computing in Computerworld's Cloud Computing Topic Center.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- ESG: The IBM FlashSystem 840: Technical Evolution to Deliver Business Value In this whitepaper, you will learn how this high-speed storage technology has tremendous potential to support I/O-intensive and/or latency-sensitive applications.
- Choosing an MDM Platform: Where to Start the Conversation If you're in the early stages of choosing an MDM solution, or you're considering switching vendors, here are seven critical questions to ask...
- Axeda Platform Technical Overview This paper summarizes the major features of an IoT platform and explains how they simplify and speed the process of developing and deploying...
- Stock Shock: The effect of project and portfolio management on share price In this independent report, you'll see the intrinsic connection between long-term capital investment and short term market performance -- and how this can...
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well...
- Cloud Knowledge Vault Learn how your organization can benefit from the scalability, flexibility, and performance that the cloud offers through the short videos and other resources... All Cloud Computing White Papers | Webcasts