Host collaborative brainstorms with new digital whiteboarding integration in Google Meet

Quick launch summary

With the new Google Jamboard and Google Meet integration, you can now create or open an existing jam while on a Meet video call. This digital whiteboarding integration means you can use the Jamboard virtually to host collaborative brainstorming sessions with your coworkers or students in real-time, even when you can’t be in the same room.

You’ll also be able to save, share and continue the whiteboard at any time with Jamboard.

Note, you can only start or open a Jamboard during a Meet call if you joined the call on a computer. Video call participants on a mobile device or tablet will get a link to a Jamboard file and be directed to the Jamboard app.

Getting started

End users: There is no end user setting for this feature. Visit the Help Center to learn more about whiteboarding in Meet.

Rollout pace

Availability

  • Available to all G Suite customers and users with personal Google accounts.

Resources

Roadmap


[ad_2]

Net Universe offers all Google devices with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/google.
You can visit our Shop Online

 

Building a robust Information Ecosystem using KPI Dashboards

Here’s an interesting piece of trivia. IBM once reported that 2.5 quintillion bytes of data are created everyday, worldwide. However, nearly 90% of that structured data goes unanalyzed. This data is known as dark data.

Now let’s switch gears to your business. A sizeable volume of data flows in and out of your business everyday. But is your analytical infrastructure helping you harness the power of that data, or does it remain dark?

Even a marginal drop in the dark data percentage can unearth powerful insights for a business. But for this to happen, it’s vital for businesses to have a robust information ecosystem.

The dumbbell model is a simple framework that describes the key attributes of an information ecosystem:

The dumbbell model is made of five components—and in this blog, we’ll learn how KPI dashboards are instrumental in building these 5 components to create a robust information ecosystem. For this, we’ll be using Zoho Analytics. 

Adoption

The need for data-driven decisions is propelling the adoption of BI among business users who are often not very tech-savvy. BI and analytics are no longer limited to senior management staff, as businesses are witnessing a spike in adoption across hierarchies.

However, the technical know-how that some analytical infrastructures demand builds tremendous human dependency for analyzing data, leading to siloed analysis. So how can information ecosystems be built to cater to the data needs of non-technical users?

The answer lies in no-code. Give business users a platform to build their own dashboards without having to write a single line of code. For example, the drag and drop feature in Zoho Analytics helps users easily drag and drop all necessary reports into a dashboard builder. It gives them the freedom to add as many reports as they want, and resize, reposition, and align them however they please. This user-friendly dashboard builder can help business users build their ecosystem exactly how they want it to be.

One version of the truth

The adoption of multiple business applications by organizations is driving the need for cross-functional analysis. And the growing importance of end-to-end business insights is mounting pressure on this analytical machinery to provide a vantage point for effective decision-making.

However, multiple unconnected sources force users to use ad hoc applications to analyze data. This potentially localizes business efforts, leading to unsynchronized actions across teams. How can businesses create a vantage point in their information ecosystem for informed decision-making?

The key to this lies in the unification of data. The platform should enable users to visually analyze multiple variables from a single standpoint, to understand the impact of one variable on the other.

For example, by analyzing the customer satisfaction rate from a help desk application against the cancellations from a subscriptions application, within a single dashboard, businesses are able to see the impact one metric has on the other. Similarly, any data-agnostic platform can help you fetch data from multiple data sources to create a vantage point within a dashboard for better decision-making.

Insights

Teams see the value of managing an information ecosystem, if it can feed them with relevant insights. The ecosystem should help in extracting quick and precise insights for faster decisions.

However, a unidimensional approach towards analyzing data downplays the ability of a robust information ecosystem to provide diverse and powerful insights. Some day-to-day practices can lead to insights getting scattered across teams within an organization. So how can businesses turn an information ecosystem into a treasure trove of insights?

This is possible if businesses can adopt some best practices in building a dashboard. For example, you should have your mission-critical metrics analyzed in the form of widgets, stationed at the top of your dashboard. This can help users instantly understand things without having to scroll through the entire dashboard. The reports that follow the widget can then further unwrap the story.

Start with the most important set of reports that relate to the KPIs on the widgets. The dashboard can then include the other reports that complete your story, and be further customized by applying themes that make it more presentable.

One major takeaway is to have different dashboards for different users within the same team. For example, a country sales head may not track all the KPIs a regional sales manager would want to closely monitor. It’s good to have separate dashboards to keep your insights live and flowing.

Collaboration

It’s crucial to collaborate to achieve a common goal. Real-time collaboration can help teams make faster decisions. And though decisions can be made faster, they’re not made in a single step, but rather, they go through a series of steps. It’s essential to give contextual insights at every stage of decision-making. Furthermore, making your metrics available on-demand is a key factor in determining a team’s success.

However, long and inconclusive meetings, unanswered emails, and a lot more, can delay decisions. This lag in communication also contributes to ineffective decision-making. How can businesses build collaboration into an information ecosystem?

The advanced collaborative features on a dashboard make it possible. For example, these dashboards can be instantly shared with individuals or teams, and fine-grained access controls ensure high levels of data governance within organizations. These dashboards can be easily embedded in the context of an application’s workflow, websites, webpages, and more, to feed teams with contextual insights at every stage of decision-making. And contextual commenting enables teams to collaborate quickly and in real time. These can also help businesses build a culture of teamwork with an organization.

Accountability

An information ecosystem needs to have accountability built into it, as it’s important for business leaders to build data-backed accountability within teams.

However, the element of subjectivity plays a crucial role in building accountability within organizations. Some teams will spend time on building logic to build accountability. But this can potentially harm the businesses’ performance in the long run. So how can an information ecosystem build accountability within organizations?

If we can combine all the attributes of a robust information ecosystem, leaders have all they’ll need to build accountability. These data-driven dashboards can back leaders with the necessary insights to ensure data-backed accountability.

In today’s data-driven world, KPI dashboards are becoming an indispensable business enabler by helping businesses build robust information ecosystems. As business leaders, it’s important to look out for these attributes while choosing a platform that can help them build such a system. 

Learn more about our dashboards here. 

Sign up for a free Zoho Analytics account.

Watch our webinar on “KPI dashboards—an indispensable business enabler.”

Net Universe offers all Zoho subscritpions and consultant services with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/zoho.

Blocking a $15 million Maze ransomware attack – Sophos News

Customer profile: An organization with many hundreds of networked devices based in Asia Pacific.

The Sophos Managed Threat Response (MTR) team was called in to help an organization targeted with Maze ransomware. The attackers issued a ransom demand for US$15 million – if they had succeeded this would have been one of the most expense ransomware payments to date.

Background: Ransomware partners in crime

 Maze is one of the most notorious ransomware families, active since 2019 when it evolved from ChaCha ransomware. It was among the first to combine data encryption with information theft.

The operators behind Maze have recently started colluding with other ransomware groups, including LockBit, SunCrypt and Ragnar Locker, providing them with access to their platform for posting stolen victim data.

This appears to have led to a reciprocal sharing of tactics, techniques and procedures (TTPs): in the attack covered here the Maze group borrowed a Ragnar Locker technique that involves using virtual machines.

For detailed technical analysis of this collaboration between attackers read Maze attackers adopt Ragnar Locker virtual machine technique.

Days 1-3: The attack begins

Prior to the attack becoming active, the operators compromised a computer on the target’s network. This computer was then used as a ‘beach head’ in the network. On multiple occasions during the attack, the attackers connected from here to other computers over Remote Desktop Protocol (RDP).

On day three, the main part of the attack began. The attackers exploited a domain admin account with a weak password to take control of an unprotected Domain Controller (DC). They then spent several days moving across the network.

Using the legitimate network scanning tool Advanced IP Scanner to map the network, the attackers created lists of IP addresses to which they would later deploy ransomware. These included a list of the IP addresses of machines belonging to the target’s IT administrators.

The attackers’ attention then turned to the exfiltration of data.

They identified a file server and accessed it remotely over RDP using the compromised domain admin account. Using the legitimate archiving tools WinRar and 7zip, they started compressing folders located on it.

These archives were then copied back to the primary DC using the legitimate Total Commander FTP client that the attackers had installed on the file server.

The attackers tried to install the cloud storage application Mega on the DC. This was blocked as the target had added Mega to their blocked list using the application control capability in Sophos Intercept X endpoint protection. The attackers then switched to using the web-based version instead, uploading the compressed files.

Days 4-5: The calm before the storm

For two days, the attackers went quiet. It’s likely they were waiting for a day when the target’s IT security team wouldn’t be working, like the weekend.

Day 6: The first ransomware attack is launched

The first Maze ransomware attack was launched on a Sunday, using the already compromised domain admin account and the lists of IP addresses that had been identified.

This first attack actually comprised three attacks as the operators deployed three copies of the Maze ransomware via batch scripts to the targeted computers:

  • C:ProgramDataenc6.exe
  • C:ProgramDataenc.exe
  • C:ProgramDatanetwork.dll

Three scheduled tasks were created to execute the ransomware:

 Name Command
 Windows Update Security Patches C:ProgramDataenc6.exe
Windows Update Security Patches 5 C:ProgramDataenc.exe
 Windows Update Security regsvr32.exe /i c:programdatanetwork.dll

 

Over 700 computers were targeted in the attack, which was detected and blocked by Sophos Intercept X.

Either the attackers didn’t realize the attack had been blocked or they were hoping that the theft of the data would be enough for the target to pay up – but whatever the reason, upon launching the first attack attempt they issued a ransom demand for US$ 15 million.

Day 7: The MTR team gets to work

Realizing that they were under attack, the target’s security team engaged the advanced incident response skills of the Sophos MTR team. The team quickly identified the compromised admin account, identified and removed several malicious files, and blocked attacker commands and C2 (command and control) communications.

Day 8: Investigation and neutralization continue

Over the following hours the MTR team found further tools and techniques used by the attackers, as well as evidence relating to the exfiltration of data. More files and accounts were blocked.

Day 9: The second attack

The attackers launched a second attack via a different compromised account. This attack was similar to the first one: commands were executed on a DC, looping through the lists of IP addresses contained in txt files.

However, this time they coped a file called license.exe to C:ProgramData:

This was followed by a scheduled task to execute it. In this attack attempt the task was called “Google Chrome Security Update”:

The attack was quickly identified and stopped. Intercept X detected the ransomware, and the MTR team disabled and deleted both the compromised account and the license.exe file. No files were encrypted.

Day 9: Third time lucky?

Just a few hours after the second attempt, the attackers tried again.

By now they seemed to be growing desperate. This attack targeted a single machine, the main file server that the exfiltrated data had been taken from, and used a completely different technique to the previous attacks.

In the third attempt, the attackers distributed the ransomware payload inside a virtual machine (VM).

Fortunately the MTR investigators recognized this new approach immediately as they had also responded to the Ragnar Locker ransomware attack where the technique was first seen.

The Maze operators had enhanced the technique, but it was undoubtedly the same. The attack was detected and stopped and no files were encrypted.

 Defeating adversaries in human-led attacks

This casebook highlights how agile and adaptable human-operated attacks can be, with the attackers able to quickly substitute and reconfigure tools and return to the ring for another round.  It also demonstrates how, to minimize likelihood of detection, attackers take advantage of multiple legitimate IT tools in their attacks.

Sophos endpoint products detect components of this attack as Troj/Ransom-GAV or Troj/Swrort-EG. Indicators of compromise can be found on the SophosLabs Github.

What can defenders do?

The most important things an IT security team can do is to reduce the attack surface, implement strong security software, including specialist anti-ransomware security, educate employees, and consider setting up or engaging a human threat hunting service to spot the clues that software can’t.

Any organization can be a ransomware target, and any spam or phishing email, exposed RDP port, vulnerable exploitable gateway device or stolen remote access credentials will be enough for such adversaries to gain a foothold.

MITRE ATT&CK Mapping

 The MITRE ATT&CK framework is a globally accessible knowledge base of known adversary tactics, techniques and procedures (TTPs).  It can help security teams as well as threat hunters and analysts to better understand, anticipate and mitigate attacker behavior.

Initial Access

  • T1078.002 – Valid Accounts: Domain Accounts
  • T1133 – External Remote Services

Execution

  • T1059.001 – Command & Scripting Interrupter: PowerShell
  • T1059.003 – Command and Scripting Interpreter: Windows Command Shell
  • T1047 – Windows Management Instrumentation
  • T1053.005 – Scheduled Task/Job: Scheduled Task

Defense Evasion

  • T1564.006 – Hide Artifacts: Run Virtual Instance

Credential Access

Discovery

  • T1016 – System Network Configuration Discovery

Lateral Movement

  • T1021.001 – Remote Services: Remote Desktop Protocol
  • T1021.002 – Remote Services: SMB/Windows Admin Shares

Command & Control

  • T1071.001 – Application Layer Protocol: Web Protocols

Exfiltration

  • T1567.002 – Exfiltration Over Web Service: Exfiltration to Cloud Storage

Impact

  • T1486 – Data Encrypted for Impact

Sophos Managed Threat Response and threat hunting

For more information on the Sophos MTR service visit our website or speak with a Sophos representative.

If you prefer to conduct your own threat hunts Sophos EDR gives you the tools you need for advanced threat hunting and IT security operations hygiene. Start a 30-day no obligation trial today.

Net Universe offers all Sophos Devices and subscritpions also consultant services with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/sophos.

Introducing Sophos Techvids, a large library of helpful support videos – Sophos News

We’re excited to announce the launch of our new Sophos Techvids video hub!

This new platform features our extensive video library (90+ and counting!) of how-to, configuration, and troubleshooting videos, and improves the viewing experience by introducing new and interactive features such as in-video surveys and easy-to-use navigational elements.

Check out: https://techvids.sophos.com

Interactive in-video features

Feedback surveys: In-video prompts and surveys provide an easy way to share your feedback to help us improve future videos.

Interactive video navigation: Available on most of our current videos, the navigational top-bar is interactive. Click to skip directly to the section of the video you want to view.

Not sure where to start? Here are our most popular videos:

Check out the entire collection at https://techvids.sophos.com today!

Net Universe offers all Sophos Devices and subscritpions also consultant services with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/sophos.

How NIST and eIDAS revisions are shaping the future of e-identification





How NIST and eIDAS revisions are shaping the future of e-identification | Yubico




How NIST and eIDAS revisions are shaping the future of e-identification | Yubico


























Scroll to top

Net Universe offers all Yubikeys with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/yubikey.
You can visit our Shop Online

 

Making our tech spill-proof, crash-proof—thank you, IT

To commemorate SysAdmin Appreciation Day (That’s today, by the way.), we stopped by our San Francisco Techstop office to say thank you to our own tech support folks, and to ask them a few questions. Much to their surprise, they didn’t have to fix an issue for us.

What’s one thing you wish people would do before they came to IT?

Emma: Basic troubleshooting, like restarting a machine. You’d be surprised how many problems are resolved with a simple reboot.

Charles: Another tip would be to clear your cache and cookies before stopping by. This can help if you force a shutdown while a program is trying to update. If the program closes before it saves whatever it was doing, it can cause issues—clearing cache can help sometimes.

If you could wave a wand and eliminate a recurring problem that you deal with, what would it be?

Emma: The blue screen of death when machines don’t run on a modern OS. It causes disruption and takes entirely too long to remediate. I wish it would just go away.

Charles: Resetting passwords or sign-in credentials, in general. I’d love it if we didn’t have to do this, but I understand that people forget. 

What’s your favorite Google product hack or tip?

Emma: If you type “chrome://restart” into your Chrome browser, it’ll restart your browser and re-open tabs. I use this if my connection is slow or if my browser doesn’t load properly.  

Charles: I like to save time with Gmail shortcuts. If you want to learn what shortcuts are available, click Shift + ? and you’ll see a list of shortcuts appear on your screen. Just make sure to enable keyboard shortcuts in your Gmail settings first! If you’re working on a Chromebook with Chrome OS, you can click CTRL + ALT + ? and they’ll appear.

What’s the weirdest or funniest laptop mishap you’ve encountered at Google?

Emma: I once had someone come in with a clicking noise on their laptop. I opened the bottom case of their computer and found a piece of a plastic arm from a toy stuck within the base. The person laughed and said, “oh kids…”

Charles: Do you know those little silicon packets that come in packaging or new clothing items? We’ve had dozens of people come into Techstop because their headphone ports stop working. Apparently, these packets get left within backpacks, the beads burst and they jam headphone jacks. Look out for those pesky things.

If you could describe working in IT in just 3 words, what would they be? (Feel free to make them fun!)

Emma: Unpredictable. Exciting. Gratifying.

Charles: Fluid. Inquisical. Magical.

What do you think your job will look like in 5 years? 

Emma: In five years, almost all of our IT systems will be cloud-based. Since troubleshooting systems will be a thing of the past, I think we’ll work tighter with product and data analytics teams to suggest and test new systems and environments. 

Charles: We help thousands of employees fix IT issues, and we’re able to do this efficiently by focusing on how to address problems that happen over and over again. We call this “root reduction.” Root reduction helps us scale our IT services, and it also frees up our schedules so that we can focus on more strategic work. In five years, I think we’ll use the time we save through root reduction to become internal IT consultants for teams. We’ll embed with individual departments to help them solve trickier problems or workflows specific to their needs. 

From resetting our passwords to debugging and fixing a system crash, we salute you “IT guy” (or gal!). Thanks for keeping us online, even when we drown our computers in coffee.

Net Universe offers all Google devices with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/google.
You can visit our

Easier access to Search, Chrome and Gmail in iOS 14

iOS 14 has launched, and with it comes new features that make it easier to access some of the Google apps you use most often. Starting today, you can add a Google Search Widget to your Home Screen to let you find information even faster. You can also set Chrome as your default browser app on your iPhone or iPad, and in the coming days, you’ll be able to set Gmail as your default email app. 

Find it even faster with new iOS Home Screen Widget for the Google app

In iOS 14, you can add Widgets to your Home Screen so you can access apps more quickly or get information at a glance. Starting today, we’re giving you lightning-fast access to Search with a Widget in two sizes: one with just Search, and one with shortcuts to three additional ways to search, depending on your preference.

The Google app is a great way to find relevant and helpful information on your iPhone or iPad– from web pages and quick answers to images, products, news, even life-size AR animals. And you can choose from several different ways to search, including typing, talking, or using your camera with Lens. 

With the Quick Search Widget, you can search for anything, right from your Home Screen. The Shortcuts Widget includes a quick Search bar and additional search modes: Lens, which lets you search what you see through your camera; Voice Search if you don’t feel like typing; and Incognito mode for an extra layer of privacy. 

Net Universe offers all Google devices with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/google.
You can visit our

Sophos is named a Leader in IDC’s mobile threat management report – Sophos News

We are proud to announce that Sophos has been recognized as a Leader in the IDC MarketScape: Worldwide Mobile Threat Management Software 2020 Vendor Assessment.

The report provides an overview of mobile threat management (MTM) security solutions, also referred to as mobile threat defense (MTD) solutions – an increasingly important security market segment in today’s world, where an increasingly mobile workforce is doing more work on mobile devices than ever.

We believe this placement for Sophos Intercept X for Mobile is a testament to the strength of the Intercept X deep learning engine used across Sophos’ endpoint security range of products. Together with the flexibility of strong management and security capabilities in Sophos Central, the cloud-based management platform for all Sophos products lets organizations manage their mobile, endpoint, server, and network security in the same console.

Furthermore, we believe that this placement is due to Intercept X for Mobile’s seamless integration with the powerful endpoint management capabilities of Sophos Mobile, giving organizations the best of both worlds for mobile threat management (MTM) and unified endpoint management (UEM).

According to the report, “Sophos’ combination of MTM and UEM products is rare among MTM vendors and unique among vendors in this study.”

Intercept X for Mobile is available for Android, iOS, and Chrome OS and offers users world-class device, network, and app security, protecting against the latest mobile threats such as ransomware, network attacks, and exploits. According to the report, “This combination [of MTM and UEM] gives Sophos a strong advantage in situations where enterprises want a single vendor for both mobile device management and security enforcement.”

Sophos Intercept X for Mobile also integrates with a broad range of third-party platforms, including Microsoft Intune and other top UEM vendors – providing organizations with a flexible solution to protect against mobile threats within their unique existing security infrastructures.

To learn more about Intercept X for Mobile, head over to Sophos.com or download and try it for yourself at Google Play or the App Store.

Net Universe offers all Sophos Devices and subscritpions also consultant services with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/sophos.

Gear up your business for e-invoicing with Zoho

Over the years, e-invoicing has been adopted by governments across the world to standardise the way B2B invoices are reported for taxation purposes. The Government of India is set to join this list by 1 October 2020, by when e-invoicing will be mandated for all taxpayers with an aggregate turnover of INR 500 crores and above.

At Zoho, we’ve always been at the forefront in helping Indian businesses digitally transform their back-office operations while staying compliant. Our recent feat as winners of the AatmaNirbhar Bharat app contest stands testimony to this. In line with this,  Zoho is now geared up to welcome the new regime with a comprehensive e-invoicing system, right from day one.

zoho for e-invoicing

Why you should use Zoho for e-invoicing 

Here’s how Zoho helps you stay e-invoicing compliant:

Adapting to a new system might seem like a daunting task, but e-invoicing with Zoho is a straightforward process. Zoho lets you create mandated documents like invoices, credit notes, and debit notes according to the e-invoicing schema, so you do not miss out on any key details. At the click of a button, you can push these details to the Invoice Registration Portal (IRP).

To generate multiple e-invoices at one go, you can even bulk push them to the IRP. Once pushed successfully, an Invoice Registration Number (IRN) and a QR code will be generated and added to your invoice within seconds.

generate e-invoice with zoho

Made an incorrect entry? Cancel your e-invoice in Zoho within 24 hours of generating the IRN, and it will be cancelled in the IRP automatically. Visit our help document to read more on how e-invoicing is effortless with Zoho.

  • Generate e-way bills along with e-invoices

For taxpayers who need to generate e-way bills, things just got a bit easier. Zoho automatically detects when you need an e-way bill for your invoice. You can push those details, along with your invoice, directly to the IRP from Zoho, cutting down the effort needed to generate an IRN and e-way bill separately.

As a buyer, you can check the Income Tax Credits (ITC) of the e-invoices you receive, right from Zoho. Since Zoho is a registered GST Suvidha Provider (GSP), you can connect to the GST portal and view your GST returns, including the GSTR-2A details, without logging in to the GST portal.

Which Zoho app should you choose?

Zoho offers e-invoicing in four apps. E-invoicing works the same in all of them, so you can choose whichever suits your business best.

  • Zoho for accounting: If you’re looking for an end-to-end e-invoicing and accounting solution, then the GST-compliant Zoho Books has you covered.
  • You have your own ERP: If you already have an ERP in place, you can connect the e-invoices generated in any of our other apps (Zoho Invoice, Zoho Inventory, and Zoho Subscriptions) to your ERP with the help of our REST APIs.

Want to see it work?

We’re excited to bring you a series of free webinars, where we break down e-invoicing in your own languages. Register now to get a deeper understanding of e-invoicing and see a live demo of how you can use Zoho to stay compliant.

Want to try them out for yourself? Write to us at [email protected] and we’ll provide early access for you! If you have any doubts or need clarifications on e-invoicing, you can always leave us a comment below.


Lavanyasree S


User Educator at Zoho. A professional writer and a habitual reader.

Net Universe offers all Zoho subscritpions and consultant services with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/zoho.

Updated interface for managing Google Groups in the Admin console

Quick launch summary 

We’re updating the interface admins use to manage Google Groups for Business in their organizations. Google Groups for Business settings let admins control how Google Groups can be created and used within their domains. All the same settings will be available in the new interface, but the structure will be revamped to make it easier to find and change settings. 
In addition, we’re adding Groups information to the Admin audit log, which will enable admins to see when and by whom settings were changed. 

A new look for Groups for Business settings 

Groups information is now in the admin audit log 

Getting started 

  • Admins: You’ll see the new interface by default when you go to Admin console > Apps > G Suite > Groups for Business. Visit the Help Center to learn more about managing Groups for your organization. 
  • End users: No end-user impact. 

Rollout pace 

Availability 

  • Available to all G Suite customers 

Resources 

Roadmap 


[ad_2]

Net Universe offers all Google devices with worldwide Delivery Services.
Send us an email to [email protected] for more information or visit https://www.netuniversecorp.com/google.
You can visit our Shop Online