Industry-leading, secure, and fully
featured for all enterprises
Content Central - Hosted Edition
Hassle-Free Document Management
Take Content Central to the next level with a hosted solution for rapid remote access, anytime you need it. Ademero works closely with Google Cloud Platform to provide secure data-center facilities for your documents and information. Our customers and regulators expect independent verification of security, privacy and compliance controls. Google undergoes several independent third party audits on a regular basis to provide this assurance. This means that an independent auditor has examined the controls present in our data centers, infrastructure and operations. Google has annual audits for the following standards:
SSAE16 / ISAE 3402 Type II
SOC 2 and SOC 3 Public audit report
Cloud Security, This is an international standard of practice for information security controls based on ISO/IEC 27002 specifically for cloud services
FEDRAMP ATO FOR GOOGLE APP ENGINE
PCI DSS V3.0
One of the most widely recognized, internationally accepted independent security standards. Google has earned ISO 27001 certification for the systems, applications, people, technology, processes and data centers serving Google Cloud Platform
Cloud Privacy, This is an international standard of practice for protection of personally identifiable information (PII) in public clouds services
Google Platform Certifications – Google undergoes several independent third party audits to test for data safety, privacy, and security.
Technology with Security at its Core
Cloud Platform runs on a technology platform that is conceived, designed and built to operate securely. Google is an innovator in hardware, software, network and system management technologies. Servers are custom-designed with a proprietary operating system and geographically distributed data centers. Using the principles of “defense in depth,” we’ve created an IT infrastructure that is more secure and easier to manage than more traditional technologies.
STATE-OF-THE-ART DATA CENTERS
Google’s focus on security and protection of data is among our primary design criteria. Google data center’s physical security features a layered security model, including safeguards like custom-designed electronic access cards, alarms, vehicle access barriers, perimeter fencing, metal detectors, and biometrics, and the data center floor features laser beam intrusion detection. Data centers are monitored 24/7 by high-resolution interior and exterior cameras that can detect and track intruders.
SECURING DATA IN TRANSIT
Data is most vulnerable to unauthorized access as it travels across the Internet or within networks. For this reason, securing data in transit is a high priority for Google. Data traveling between a customer’s device and Google is encrypted using HTTPS/TLS (Transport Layer Security). In fact, Google was the first major cloud provider to enable HTTPS/TLS by default.
STRONG SECURITY CULTURE
Google has created a vibrant and inclusive security culture for all employees. The influence of this culture is apparent during the hiring process, employee onboarding, as part of ongoing training and in company-wide events to raise awareness.
EMPLOYEE BACKGROUND CHECKS
Google verifies their staff’s education and previous employment and performs internal and external reference checks. Where local labor law or statutory regulations permit, Google may also conduct criminal, credit, immigration, and security checks. The extent of these background checks is dependent on the desired position.
Far from being an afterthought or the focus of occasional initiatives, security is an integral part of our operations.
Google administrates a vulnerability management process that actively scans for security threats using a combination of commercially available and purpose-built in-house tools, intensive automated and manual penetration efforts, quality assurance processes, software security reviews and external audits.
Google Has a rigorous incident management process for security events that may affect the confidentiality, integrity, or availability of systems or data. If an incident occurs, the security team logs and prioritizes it according to its severity. Events that directly impact customers are assigned the highest priority. This process specifies courses of action, procedures for notification, escalation, mitigation, and documentation.