Protections From Bleeding Edge Phishing, Malware Attacks (Cloud Next '19)

Channel:
Subscribers:
291,000
Published on ● Video Link: https://www.youtube.com/watch?v=qeL4wszYdKM



Duration: 32:27
1,041 views
8


Get a tour of the latest phishing, malware, scams, and impersonation attacks and how G Suite protects you from them. You'll get an inside look at some of the most sophisticated and emerging attack patterns.

Then we'll show you how you can configure G Suite to better secure your users, such as real-time link scanning and anomalous file type blocking.

Protections From Attacks → http://bit.ly/2U1Das0

Watch more:
Next '19 Security Sessions here → https://bit.ly/Next19Security
Next ‘19 All Sessions playlist → https://bit.ly/Next19AllSessions

Subscribe to the Google Cloud Channel → https://bit.ly/GoogleCloud1


Speaker(s): Neil Kumaran, Andy Wen

Session ID: SEC204
product:G Suite Security; fullname:Neil Kumaran,Andy Wen;




Other Videos By Google Cloud


2019-04-11Minimizing Insider Risk From Cloud Provider Administrators (Cloud Next '19)
2019-04-11The Business Case for Product Inclusion (Cloud Next '19)
2019-04-11Thriving in the Age of Deployed AI (Cloud Next '19)
2019-04-11Harden Your VMs with Shielded Computing (Cloud Next '19)
2019-04-11Google Cloud Customer Innovation Series - Tuesday (Cloud Next '19)
2019-04-10Keeping Hackers Out & Your Data Secure: A Proactive Approach to G Suite Security (Cloud Next '19)
2019-04-10Google Cloud Customer Innovation Series — Next '19
2019-04-10How AI is Transforming the Enterprise (Cloud Next '19)
2019-04-10Learn about Google Cloud’s trust and security services — Next '19
2019-04-10Customer Stories: Transforming businesses with Cloud AI Platform (Cloud Next '19)
2019-04-10Protections From Bleeding Edge Phishing, Malware Attacks (Cloud Next '19)
2019-04-10Focus on Your Customers: Salesforce and Google Can Make it Seamless (Cloud Next '19)
2019-04-10GKE Networking Differentiators (Cloud Next '19)
2019-04-10Identity and authorization on Google Cloud — Next '19
2019-04-10Detecting Threats in Logs at Cloud Scale (Cloud Next '19)
2019-04-10Serverless on Google Cloud (Cloud Next '19)
2019-04-10From Blobs to Tables: Where and How to Store Your Stuff (Cloud Next '19)
2019-04-10Security best practices for the Internet of Things with Google Cloud — Next '19
2019-04-09Enhance Your Security Posture with Cloud Security Command Center (Cloud Next '19)
2019-04-09Data protection and regulatory compliance with Google Cloud — Next '19
2019-04-09How Google Cloud and Atos accelerate digital transformation



Tags:
Production innovation keynote
keynote series
solution innovations
security
infrastructure
Maps
data analytics
ML & AI
G Suite
Google Cloud Next
Next
2019
Next19
Google Cloud Platform
talks
session
keynote
official