Feeds

Google concedes desktop security risk

Mind how you go

Choosing a cloud hosting partner with confidence

Cross-computer file searching features in the latest version of Google desktop search tool represent an "unacceptable security risk" to large enterprises, analyst Gartner warns. Google concedes the analysts' concerns are valid but argues that large firms are free to control the application of the technology.

Google Desktop 3 beta introduces the ability to search the contents of one computer from another. Previous versions of the tool indexed files on users' PCs, but using the optional "Search Across Computers" facility in Google Desktop 3 temporarily stores text copies of searchable items on Google's own servers for up to 30 days - a move Gartner describes as "inauspicious".

While the technology might make life easier for "technically adept personal users" it's fraught with difficulties for larger firms. Transporting potentially sensitive data outside corporate boundaries onto Google's servers gives Gartner the fear, even though Google is promising that the data will be encrypted. Also workers can't be relied upon to identify what documents are too sensitive to share. For these reasons the Search Across Computers option "should be disabled or heavily managed by enterprises".

Gartner advises firms that permit workers to use Google's desktop search application should switch over to the enterprise edition. The analyst's misgivings about in Search Across Computers" facility in Google Desktop 3 parallel those of privacy advocates such as the Electronic Frontier Foundation and security experts.

Google concedes that the technology is a potential security risk - if improperly managed - but points out that enterprises can disable the "Search Across Computers" feature. "Yes, it's a risk, and we understand that businesses may be concerned," Andy Ku, European marketing manager for Google told ZDNet.

"Theoretically any intellectual property can be transferred outside of a company. We understand that there are a lot of security concerns about the Search Across Computers feature, but Google won't hold information unless the user or enterprise opts in (to the feature)," he added. ®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?