How Spanning Protects Your Google Workspace Domain From All Sides





Threats to Your Google Workspace Domain

Your Google Workspace domain faces threats from all directions. Danger lurks at your front door, back door and even inside your house. Hover over or click on the icons to learn about these threats and how Spanning can help protect your data from them.

Malware and Virus Protection

Intercepted Traffic

Without strong encryption, data in transit is like mail without an envelope. Bad actors can both steal sensitive information or alter it, thereby compromising data integrity.

How Can Spanning Protect My House?
Privileged Service Accounts

Privileged Service Accounts

Service accounts are prime targets for cybercriminals who leverage administrator rights and limited oversight to reconfigure systems and hide their activities.

How Can Spanning Protect My House?
Poor System Controls

Poor System Controls

Ineffective controls can negatively impact system security, availability and processing integrity, putting confidentiality and privacy of data at risk.

How Can Spanning Protect My House?
Human Error

Human Error

Everyday human errors account for up to 64 percent of data loss incidents according to Aberdeen’s research. Employees inevitably delete the wrong email, contacts or critical configurations.

How Can Spanning Protect My House?
Illegitimate Deletion Requests

Illegitimate Deletion Requests

SaaS providers will honor your deletion request without question. They have no way of knowing if it’s a hasty (or malicious) request and they are not responsible for any unexpected results.

How Can Spanning Protect My House?
Malicious Insiders

Malicious Insiders

Employee action is involved in up to 23 percent of all electronic crime events, according to the CERT Insider Threat Center at Carnegie Mellon University’s Software Engineering Institute.

How Can Spanning Protect My House?
Programmatic Errors

Programmatic Errors

Otherwise known as sync errors, those powerful tools designed to streamline business processes can ruin critical data in a flash — with no way of undoing it.

How Can Spanning Protect My House?
Ransomware

Ransomware

Beyond a typical cyberattack, these forms of industrial-scale extortion are becoming increasingly aggressive and expensive.

How Can Spanning Protect My House?
Hackers

Hackers

Hackers leverage sophisticated technology and social engineering tactics to compromise credentials and accounts to get to your data.

How Can Spanning Protect My House?
Malware and Virus Protection

Malware & Viruses

Rogue software can spread mayhem with programmatic efficiency without an active attack from a hacker. Many malware programs and viruses emerge from existing code after hibernation, making them especially hard to defend against.

How Can Spanning Protect My House?

Back to the House

Front Door Threats


Upfront threats that can expose your domain or compromise user credentials, leading to unauthorized access to sensitive data.
SOC-2 Compliance
AI-Enabled Phishing Defense
Detect and block even the most sophisticated email threats with technology from Graphus — the simple, powerful and automated phishing defense platform that provides three layers of comprehensive email security via patented AI technologies such as TrustGraph, EmployeeShield and Phish911. 

Learn More

Integrated Dark Web Monitoring
Integrated Dark Web Monitoring
Dark Web Monitoring alerts Google Workspace administrators when employee emails and passwords have been compromised, enabling them to take proactive steps to secure accounts at risk. Leverage Google Workspace and Spanning audit, reporting and search capabilities to determine if malicious activity has taken place and restore any corrupted data in just a few clicks.
Zero-Effort Backup
Automated Backup
Automated Google Workspace backup that auto-discovers new and/or altered content to back up. This takes place as part of a recurring, incremental backup process that runs quietly in the background every day without any additional effort from your admins or users.
Transparent Reporting
Transparent Reporting
Use the audit log for an immutable, detailed record of every action done by any user or admin within Spanning Backup for Google Workspace. You’ll see a list of activities that have taken place and will be given information about what was done, who it was done by, and when it happened. The audit log can also be exported to a CSV file at any time for analytical and reporting purposes. Every action concerning your Google Workspace backup is recorded to provide maximum transparency and accountability.
Point-In-Time Restore
Point-in-time restore
Restore content from the latest Google Workspace backup of a known good state. With daily, automated backup and unlimited on-demand backup at your disposal, you have the power to restore data from any previous date in which Spanning was in place. Regardless of when the data was altered or lost, your organization will have a backup point to count on.

Back to the House

Inside Threats


The biggest threats to your Google Workspace domain are inside the house. They are harder to manage because they leverage access rights.
Point-In-Time Restore
Point-In-Time Restore
Restore content from the latest Google Workspace backup of a known good state. With daily, automated backup and unlimited on-demand backup at your disposal, you have the power to restore data from any previous date in which Spanning was in place. Regardless of when the data was altered or lost, your organization will have a backup point to count on.
End-User Self-Service
End User Self-Service
Save on helpdesk costs and reduce the need for IT intervention by empowering your end users to locate and restore their own Google Workspace backup data for Gmail, Drive (including Team Drives), Calendars, Contacts and Sites. When files are lost or corrupted, users will be able to quickly and easily restore the data in question to help ensure maximum productivity and meet even the most ambitious recovery time objectives.
Zero-Effort Backup
Teams Drives Restore
In addition to individual Drive files, Spanning allows for the backup and restore of your Team Drives data with the inclusion of folder structure and sharing settings. Team Drives data will be restored back into the same Team Drive or Spanning will create a new Team Drive upon restore if the existing Team Drive has been deleted.
Cross-User Restore
Cross-User restore
Admin users can perform Google Workspace backups and restore data not only for themselves, but for any licensed user within their deployment. Additionally, admins can restore data into the original user account from which the backup was taken or into a different user’s account altogether. This enables quick and easy transfer of ownership of Google Workspace data such as on-boarding and off-boarding of employees.

Back to the House

Back Door Threats


Threats caused by vulnerabilities on the application side. Poorly architected solutions meant to improve your Google Workspace operations and security can instead increase the risk of data loss. 
SOC-2 Compliance
SOC 2 Compliance
SOC 2 is the leading auditing standard addressing the protection and privacy of sensitive data. To be SOC 2 compliant, an organization must provide evidence and undergo rigorous audits demonstrating the quality and effectiveness of their systems and controls. SOC 2 – Type II is the gold standard for technology service providers that process or store their customer’s data in the cloud and establishes their commitment to the security and protection of data.
Strong Encryption
Strong Encryption
Spanning Backup protects data at rest with 256-bit AES object-level encryption (one of the strongest block ciphers available) with unique, randomly generated encryption keys for every single object and a rotating master key protecting the unique keys.  All data in transit is also protected with Transport Layer Security (TLS) encryption.
End-User Self-Service
Application Level Authentication
Spanning accesses Google Workspace at the application level through the OAuth 2.0 protocol instead of through less secure service accounts and passwords. Service account passwords are susceptible to compromise providing threat actors with administrator privileges and the ability to freely operate in your domain
Certifications
Third Party Privacy & Security Certifications
Spanning Backup has been awarded the Skyhigh CloudTrust™ rating of Enterprise-Ready. Skyhigh Enterprise-Ready cloud services fully satisfy the most stringent requirements for data protection, identity verification, service security, business practices and legal protection. Additionally, Spanning is SSAE 16, SOC2 Type II certified infrastructure globally; COBIT5, HIPAA certified; FERPA; GDPR compliant.