Google rolls out 2-step verification for Apps users
New sign-in feature unveiled at Google Atmosphere aims to boost cloud security
Computerworld - Google today moved to boost security for users of its hosted Google Apps tools by adding a new two-step verification process.
Google announced the new sign-in feature Monday morning at its Google Atmosphere conference in Paris.
"Cloud computing is about making your information easily accessible from anywhere, on any device," Eran Feigenbaum, director of security for Google Apps, said in a blog post. "Until today, organizations looking to secure their information beyond a password have faced costs and complexities that prevented many of them from using stronger security technologies. Today, we are changing that with the introduction of a more secure sign-in capability for Google Apps accounts that significantly increases the security of the cloud: Two-step verification."
The feature, which must be enabled by an administrator, requires that users have two means of identification - something they know (a password), and something they have (a cell phone).
Feigenbaum explained that after a user plugs in her password, a verification code will then be sent to her cell phone.
"This makes it much more likely that you're the only one accessing your data," he said. "Even if someone has stolen your password, they'll need more than that to access your account. You can also indicate when you're using a computer you trust and don't want to be asked for a verification code from that machine in the future."
While this new capability is just for Google Apps business users today, Feigenbaum said it will be rolled out to all individual Google users "in the coming months."
Google apps include Gmail, Google Docs and Calendar.
Sharon Gaudin covers the Internet and Web 2.0, emerging technologies, and desktop and laptop chips for Computerworld. Follow Sharon on Twitter at @sgaudin, or subscribe to Sharon's RSS feed . Her e-mail address is firstname.lastname@example.org.
Read more about Cloud Computing in Computerworld's Cloud Computing Topic Center.
- Warning: Cloud Data at Risk Experts agree that relying on SaaS vendors to backup and restore your data is dangerous. Yet that's exactly what huge portions of the...
- The Opportunities and Challenges of the Cloud In this report F5 poses questions to IDC analysts, Sally Hudson and Phil Hochmuth, on behalf of F5's customers to better understand the...
- 5 Hybrid Cloud Starting Points Did you know that more than 50% of organizations are already using or planning a move to hybrid cloud?
- Cloud Computing Drives IT and Business Agility Hybrid Cloud Accelerates Time to Value What is the main focus for IT in your organization - cost or agility? Many IT discussions today focus on cost controls rather...
- DevOps with PureApplication System: Reduce cost and speed delivery with an integrated IBM Cloud solution Join this webcast to hear what ING Netherlands has been able to achieve while deploying DevOps tools from IBM Rational. An ING executive...
- Why Are Customers Really Deploying an NGFW? It seems every IT Security expert is talking about the NGFW, but what are people really doing? This webcast covers 5 real-world customer... All Cloud Computing White Papers | Webcasts