Feeds

Google plays safety card against Microsoft Office

Apps trainspotter challenge

Intelligent flash storage arrays

Dreamforce 2008 Google has stepped up efforts to have business customers dump Microsoft's PC and server-bound productivity and business software for Google Apps.

The search giant is trying to overcome lingering reservations big customers might have on the security of the facilities and the personnel behind the scenes of its hosted productivity applications and email.

Dave Gigouard, the president of Google's enterprise business, used Salesforce.com's Dreamforce to announce the trainspottery fact Google Apps have been certified as SAS 70 Type II compliant.

For the uninitiated, certification means physical security, data and security and integrity, internal procedures and defined workplace codes have met independent standards laid down by the American Institute of Certified Public Accountants (AICPA).

Gigourard claimed Google Apps - announced in 2007 - now has 10 million active business users, with fast uptake in small and mid-market companies. Large businesses have been slower to adopt. Such companies are either culturally or legally constrained in the portions of their IT or data they can outsource.

Gigourard said certification is a "great way" to win over more big customers.

He claimed Google Apps are posing a challenge to Microsoft, with 3,000 new business customers each day. He was careful to draw the distinction with consumer users of its services. "Our friends up in Redmond like to dismiss the impact Google Apps is having. I hope he [sic] believes it. The numbers speak for themselves - the numbers are unbelievable," Gigourard said.

He went on to highlight a recent expansion in Google Apps' service level agreement (SLA). Users on the Premier Edition of Google Apps now get a 99.9 per cent per-month uptime guarantee for Gmail, Calendar, Docs, Sites, and Google Talk. That translates as a commitment to no more than 45 minutes of downtime a month. The SLA follows recent outages in Gmail. ®

Security for virtualized datacentres

More from The Register

next story
PEAK APPLE: iOS 8 is least popular Cupertino mobile OS in all of HUMAN HISTORY
'Nerd release' finally staggers past 50 per cent adoption
Microsoft to bake Skype into IE, without plugins
Redmond thinks the Object Real-Time Communications API for WebRTC is ready to roll
Microsoft promises Windows 10 will mean two-factor auth for all
Sneak peek at security features Redmond's baking into new OS
Mozilla: Spidermonkey ATE Apple's JavaScriptCore, THRASHED Google V8
Moz man claims the win on rivals' own benchmarks
Yes, Virginia, there IS a W3C HTML5 standard – as of now, that is
You asked for it! You begged for it! Then you gave up! And now it's HERE!
FTDI yanks chip-bricking driver from Windows Update, vows to fight on
Next driver to battle fake chips with 'non-invasive' methods
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
Ubuntu 14.10 tries pulling a Steve Ballmer on cloudy offerings
Oi, Windows, centOS and openSUSE – behave, we're all friends here
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.