Google is taking advantage of the built-in trusted platform module in Chrome OS for the Verified Access program, which adds another layer of security for businesses.
In a Google blog post, Saswat Panigrahi, Chrome for Work senior product manager, said that the Chrome OS Verified Access works by confirming the identity of the enterprise policy or verified boot that is trying to gain access.
The term Verified Access is defined as the process by which a network service (like a VPN gateway or a Wi-Fi access point, for instance) that is trying gain access is cryptographically authenticated.
"This matters because most businesses, particularly large enterprises, have policies and requirements in place that allow network and data access only to enterprise-managed and verified devices," he wrote. "But many of the current solutions rely primarily on heuristic client side checks."
ChromeUnboxed said that Chrome has been late to the party when it comes to protecting enterprises, which has been a head-scratcher considering that security and networking are the foundation of its function.
But Google for Work is really serious in securing the infrastructure of its business clients with the release of the Chrome OS Verified Access. With the new layer, those network services or enterprise policies that have been modified in some form won't easily get inside your server without disruption from a firewall.
Meanwhile, it's reported that Ruckus Wireless and Duo Security are already using the Chrome OS Verified Access to ferret out the threats.
Michael Hanley, security director at Duo, said that the Chrome OS Verified Access gives them a dependable way of making sure that those who use their services are certified.