Browse Definitions :
Definition

Google Chrome Enterprise

Google Chrome Enterprise is the business-focused solution for Chrome devices, Chrome browser and Chrome OS. Chrome Enterprise offers cloud-based management tools, integrations with third party products and 24/7 support for IT administrators.

Chrome Enterprise offers extra deployment and management features that cater to the sector’s increased needs for control and security. Chrome Enterprise is part of a push by Google to get Chromebooks accepted into the enterprise market.

Chrome Enterprise offers the general Chrome OS features with its automatic updates, multi-layered security, remote desktop, application virtualization support, preference syncing and cloud or native printing. Google has also made additional features available as it prepares to move into a segment typically dominated by Microsoft-based PCs and notebooks.

Among Chrome Enterprises added management features are:

  • Google Play Store apps
  • Chrome OS extensions
  • Chrome web browser
  • Microsoft Active Directory
  • Printer management
  • Flexible fleet management
  • Updates

Chrome Enterprise also supports single sign-on, kiosk mode and integration of VMware on Chromebooks. Currently, Chrome Enterprise is offered under a yearly subscription service for $50 per device.

Along with changes to make Chromebooks more tempting to enterprises, Google is opening the Play Store to at least 25 models of Chromebooks. This change allows the netbooks to run over three million apps that run on Android-based mobile devices.

This was last updated in January 2019

Continue Reading About Google Chrome Enterprise

SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • COBIT

    COBIT is an IT governance framework for businesses wanting to implement, monitor and improve IT management best practices.

  • email spam

    Email spam, also known as junk email, refers to unsolicited email messages, usually sent in bulk to a large list of recipients.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • JBOD (just a bunch of disks)

    JBOD, which stands for 'just a bunch of disks,' is a type of multilevel configuration for disks.

  • bare-metal restore

    A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process ...

  • mSATA SSD (mSATA solid-state drive)

    An mSATA SSD is a solid-state drive (SSD) that conforms to the mSATA interface specification developed by the Serial ATA (SATA) ...

Close