Security Overview

Chrome devices include the following security features:

Automatic updates - Chrome device administrators manage updates automatically so Chrome devices are always running the latest and most secure versions.

Sandboxing - On a Chrome device, each web page and application runs in a restricted environment called a sandbox. So if the Chrome device is directed to an infected page, it can’t affect the other tabs or apps on the computer, or anything else on the machine. The threat is contained.

Verified Boot - When a Chrome device starts up, it does a self check called Verified Boot. If it detects that the system has been tampered with, or corrupted in any way, it will repair itself, taking the Chrome device back to an operating system that’s as good as new.

Data Encryption - When using web apps on a Chrome device, all important data is stored safely in the cloud. Certain kinds of files, like downloads, cookies, and browser cache files, may still be present on the computer. The Chrome device encrypts this data using tamper-resistant hardware, making it very difficult for anyone to access those files.

Recovery Mode - If anything goes wrong with a Chrome device, you can simply push a button to enter recovery mode and restore the operating system to a known good version.

Was this helpful?
How can we improve it?