Chrome Enterprise Features
Administration (5)
Compliance
Monitors assets and enforces security policies to audit assets and infrastructure security.
Web Control
Filters websites and manages whitelisting to enforce compliance protocols for users accessing the internet within the network.
Application Control
Blocks endpoint users from accessing restricted applications.
Asset Management
Keeps records of each network asset and its activity. Discovers new assets accessing the network.
Device Control
Manages user network accessibility on laptops and mobile devices.
Functionality (4)
System Isolation
Cuts off network connection or temporarily inactivate applications until incidents are remedied.
Firewall
Protects endpoint devices from a variety of attacks and malware threats.
Endpoint Intelligence
Analysis for users to examine threat intelligence data specific to their endpoint devices.
Malware Detection
Provides multiple techniques and information sources to alert users of malware occurrences.
Analysis (3)
Automated Remediation
Reduces time spent remedying issues manually. Resolves common network security incidents quickly.
Incident Reports
Produces reports detailing trends and vulnerabilities related to their network and infrastructure.
Behavioral Analysis
Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns and fraud indicators.
Experience (2)
Telemetry Collection
Deploys an agent directly to the employee endpoint and measure real-time end-user experience from that vantage point.
Feedback
Allows for the collection of feedback (e.g. push notifications and surveys) to collect feedback from employees.
Management (5)
Digital Experience Score
Measure, manage and act on the key drivers of your digital employee experience,
Alerts
Alert on easily configurable events over email to multiple parties.
Budget Analysis
Provides information related to unnecessary spending and unused resources relating to employee technologies.
Remediation
Provides prebuilt scripts and configurable solutions which allow IT to remediate issues.
Optimization
Gives clear guidance on what issues to prioritize, based on experience impact.
Performance (5)
Troubleshooting
Enables troubleshooting across devices, applications, virtualization, and networks, to identify the likely root causes of issues.
Uptime Monitoring
Generates alerts for whenever a website or application goes down, experiences an error, makes a major change, or other events.
Performance Monitoring
Provides tools to track and measure application or website performance.
Issue Tracking
Track problems and manage resolutions related to end-user experience issues.
Resource Monitoring
Tracks infrastructure resource needs and alerts administrators or automatically scales usage to minimize waste.
Generative AI (3)
AI Text Generation
Allows users to generate text based on a text prompt.
AI Text Summarization
Condenses long documents or text into a brief summary.
AI Text-to-Speech
Simulates human-like speech from text inputs.
Advanced Security - Secure Enterprise Browser (4)
URL Filtering
Restrict access to high-risk websites.
Isolation and Sandboxing
Utilize isolation and sandboxing techniques.
Exploit Prevention
Protect against common exploits.
Phishing Prevention
Detect and prevent phishing attempts.
Data Protection and Governance - Secure Enterprise Browser (4)
Policy Enforcement and Governance
Ensure consistent enforcement of internal data protection policies.
Auditing and Logging
Log user actions and facilitate security incident investigations.
Data Loss Prevention (DLP)
Monitor, detect, and prevent data breaches.
Data Redaction
Redact and/or mask sensitive data.
Controlled Access - Secure Enterprise Browser (2)
Zero Trust
Employ zero trust principles for user access controls.
Access Controls
Centralize user access to data and applications.
Agentic AI - Secure Enterprise Browser (2)
Cross-system Integration
Works across multiple software systems or databases
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Agentic AI - Browser (3)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Natural Language Interaction
Engages in human-like conversation for task delegation
Proactive Assistance
Anticipates needs and offers suggestions without prompting







