Identity & Access Flashcards
Access Approval
Access Approval allows customers to approve eligible manual, targeted accesses by Google administrators to their data or workloads before those accesses happen.
BeyondCorp Enterprise
BeyondCorp Enterprise is a solution designed to enable zero-trust application access to enterprise users and protect enterprises from data leakage, malware and phishing attacks. BeyondCorp Enterprise is an integrated platform incorporating cloud-based services and software components, including:
- On-premises Connector
- BCE app connector
- BCE client connector
- Endpoint Verification
- Threat and Data Protection Services
- BeyondCorp Enterprise Integration with Chrome Browser Cloud Management
- Other features listed at https://cloud.google.com/beyondcorp-enterprise/pricing or a successor URL.
Access Context Manager
Access Context Manager allows Google Cloud organization administrators to define fine-grained, attribute based access control for projects, apps and resources.
On-premises Connector
BeyondCorp Enterprise
On-premises Connector forwards Identity-Aware Proxy traffic from Google Cloud Platform to applications and VMs deployed in non-Google Cloud Platform environments.
BCE app connector
BeyondCorp Enterprise
BCE app connector provides secure access to private applications in non-Google cloud environments using a remote agent installed on a customer-owned virtual machine.
BCE client connector
BeyondCorp Enterprise
BCE client connector provides end users secure access to private non-web applications using a remote endpoint agent installed on customer endpoint devices.
BCE client connector
BeyondCorp Enterprise
BCE client connector provides end users secure access to private non-web applications using a remote endpoint agent installed on customer endpoint devices.
Endpoint Verification
Endpoint Verification allows administrators to build an inventory of devices and set the security posture of the devices.
Threat and Data Protection Services
BeyondCorp Enterprise
Threat and Data Protection Services are a set of security services that work by aggregating threat intelligence and are designed to protect enterprise users from malware transfers, phishing, malicious site visits, and sensitive data leakage.