Adya for Google G Suite

Google’s G Suite has become the default choice for small and medium sized enterprises as their productivity and collaboration suite. The entire set of services provided by G Suite – GMail, GDrive, GDocs, Sheets, Hangouts, etc – helps enterprises remain productive and collaborate both within and outside of the company.

However, despite (or maybe because of) its popularity and ease of use of G Suite, in some cases data can be exposed by publicly shared documents, exposed calendars, dangerous third party apps, etc. Administrators are blind to what data has been exposed, which external users have access to internal documents, which internal users are exposing documents or installing dangerous apps – and how to get control of it all so it does not happen again.

Here are the different ways Adya can help manage and protect data and apps on G Suite:

User Management
  • See which external users have access to internal documents
  • See which internal users have been exposing documents
  • Remove external users from further access and get alerted for any external exposure
  • Watch and audit on user or group activity
  • Whitelist/blacklist access by users

Document Management
  • See which documents are exposed outside the company or across the company
  • Get alerted immediately on external exposure of sensitive data
  • Remove all access for external users
  • Make sensitive files and folders private
  • Transfer ownership of some or all files when an employee leaves
  • Watch and audit on file or folder permissions and activity
  • Whitelist/blacklist access to resources

Application Management
  • Get a view of all of the third party G Suite apps provided access by employees
  • Get a classified report based on level of risk of the installed application
  • Remove risky apps with a single click or based on user profile
  • Whitelist / blacklist for app install

With Adya, enterprises get a comprehensive view of the users, documents and applications installed in their G Suite environment, manage them centrally, understand and eliminate data exposure and set policies and get alerted so it does not happen again.