Browse Definitions :
Definition

Google Chrome Enterprise

Contributor(s): Matthew Haughn

Google Chrome Enterprise is the business-focused solution for Chrome devices, Chrome browser and Chrome OS. Chrome Enterprise offers cloud-based management tools, integrations with third party products and 24/7 support for IT administrators.

Chrome Enterprise offers extra deployment and management features that cater to the sector’s increased needs for control and security. Chrome Enterprise is part of a push by Google to get Chromebooks accepted into the enterprise market.

Chrome Enterprise offers the general Chrome OS features with its automatic updates, multi-layered security, remote desktop, application virtualization support, preference syncing and cloud or native printing. Google has also made additional features available as it prepares to move into a segment typically dominated by Microsoft-based PCs and notebooks.

Among Chrome Enterprises added management features are:

  • Google Play Store apps
  • Chrome OS extensions
  • Chrome web browser
  • Microsoft Active Directory
  • Printer management
  • Flexible fleet management
  • Updates

Chrome Enterprise also supports single sign-on, kiosk mode and integration of VMware on Chromebooks. Currently, Chrome Enterprise is offered under a yearly subscription service for $50 per device.

Along with changes to make Chromebooks more tempting to enterprises, Google is opening the Play Store to at least 25 models of Chromebooks. This change allows the netbooks to run over three million apps that run on Android-based mobile devices.

This was last updated in January 2019

Continue Reading About Google Chrome Enterprise

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

SearchSecurity

  • Trojan horse (computing)

    In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, ...

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close