One Safe Login
CloudGate is a cloud security solution for Google Apps, offering Google Apps administrators easy to use access management features to effectively manage security.
While migrating to Google Apps, questions arise about how to maintain the same levels of security and access control that were provided by a previous system or about how to benefit from SaaS like Google Apps without worrying about unauthorized access or lost smartphones.
CloudGate provides a practical and affordable solution to these challenges with strong multi-factor authentication options. These include support for FIDO’s UAF/U2F protocols for physical hardware tokens like the Yubico Yubikey.
How it works:
CloudGate confirms users’ identities and securely passes user access requests to Google Apps™ (Click to view the diagram)
Compatibility and flexibility:
Different companies have different requirements and security policies. CloudGate is flexible and works for large and small companies with varying security policies. This flexibility has led CloudGate to be adopted by more than half a million Google Apps users around the world, securing access to the cloud.
Secure, Comprehensive and Versatile Access Control
CloudGate’s access restriction features allow IT administrators to quickly and easily support various access patterns for their employees when they use Google Apps. Migrating to the cloud increases convenience, collaboration, and accessibility of company information, regardless of location or device. The main downside is that, while it is feasible to properly restrict user access in an on-premise environment, it is difficult to control access in a cloud environment. Cloud services greatly increase the risk of data leakage and are rarely in compliance with corporate security policies.
CloudGate provides companies with the convenience of the cloud, along with the security of an internal network, allowing administrators to easily control access to valuable data. Even if user credentials are ever compromised, CloudGate can still keep data safe.
CloudGate uses many different user access restrictions to make sure your information stays private. The following are different access restrictions that are available in CloudGate:
1. Location Based Access Restriction (IP Address) (Click to view the diagram)
For users to access Google Apps outside of the company network, CloudGate allows user access only from specific IP address(es) that IT administrators register in advance. When migrating to a cloud environment, information can be accessed from anywhere. While this can be a great advantage in some cases, it is also an issue in many companies with more stringent security policies.
CloudGate’s Location Based Access Restriction solves this problem. It allows the administrator to allow user access from a single or multiple IP addresses. At many companies, certain workers are not supposed to access company information from outside the office, which complicates set up and enforcement of security policies in a cloud environment. CloudGate makes it easy. While certain employees are not allowed external access, it is necessary for others.
2. Device Based Access Restriction (Click to view the diagram)
For users who work with multiple devices and browsers, CloudGate grants each device / browser combination a unique fingerprint that allows login. Non-registered access from outside of the network is prohibited.
For users on the road or away from the office with mobile devices, CloudGate provides proprietary smartphone applications for iOS and Android that coordinates user credentials to sign-in to Google Apps across devices while maintaining the highest possible level of security.
3. Email Client Access Restriction (POP/IMAP) (Click to view the diagram)
Some companies use browser-based email services, but others prefer clients like Outlook or Thunderbird. CloudGate is one of very few Google Apps security solutions that natively supports email client access restriction. This restriction allows users to retrieve emails to a client only from approved IP addresses.
Email clients inside the company network are allowed to connect to Google Apps to send and receive email, while email clients outside of it are prohibited from accessing Google Apps.
CloudGate provides a simple user provisioning interface for Google Apps, allowing administrators to efficiently manage employee identities.
CloudGate provisions creating, updating, and suspending users and groups with Google Apps.
CloudGate provides different features to manage your company’s organizational structure with units and hierarchical order as you define. This gives IT administrators a greater ability to manage and sort information about employees, groups, project units, etc.
Batch Registration (CSV):
CloudGate also handles batch user registration and updates with CSV files. This makes switching to Google Apps easier as well as serves as a back up of data.
Flexible Security Policy
CloudGate meets various security requirements and access environments depending on type of employee, position, work, device, location, etc. With flexible security profile features and password policy, CloudGate makes this complex work easily manageable.
Unlimited number of security profiles:
CloudGate offers an unlimited number of security profiles, each which is completely customizable.
While the Google Apps password policy only allows administrators to define a few password requirements, CloudGate’s password policy is stringent enough to meet your security standards. CloudGate’s optional password requirements include; customizable password length and complexity (character requirements), customizable login attempt limits with an account lockdown feature, and password change requirements to make sure users are choosing a new password, instead of the same one every time.
Logging & Reporting
CloudGate collects important information about users’ access activity. This information is readily available for the administrator to view and/or download.
Rich information in an intuitive interface:
CloudGate provides administrators with detailed access records such as sign-in history with dates, times, and device type, failed sign-in attempts, access location, and more in a simple graphical view.
Report and download:
Access logs are available for search, sort, and download. IT administrators can make use of this data to analyze usage and ROI.
CloudGate as a Service
CloudGate aims to maximize customers’ benefit from the convenience of Google Apps while maintaining a high level of security at an affordable cost.
Because CloudGate is tightly integrated with Google Apps, it is easy to configure.
Because CloudGate charges per user license, you only pay for the amount of service needed, and can easily add licenses as your company expands.
CloudGate, as a cloud security market leader, has been deployed to more than 1000 companies and over half a million users around the world. From planning to full-scale implementation, CloudGate can help your company with its cloud migration process. Full support towards customer success is also included, so whether you need help with implementation, use, troubleshooting, or general questions, ISR’s support team will be there to help.
Still have questions?
No problem. Send us an inquiry. We will get back to you soon.