Ancoris Limited

Google G-Suite Business

G Suite Business extends Basic Edition for more complex demands of larger businesses. Any time, place, location; real-time collaboration is still the norm. Users benefit from unlimited storage volumes; an improved file sharing model and audit reports for user activity. Vault provides records retention policy enforcement and eDiscovery for reporting.


  • All G Suite Basic features and more
  • Unlimited Cloud Storage (maximum single file size 5Tb)
  • Team Drives for an enhanced file sharing model
  • Archive and Retention controls for Email, Chat and Documents
  • eDiscovery across all Email, Chat and Documents
  • Extended Audit reports to track user activity


  • All G Suite Basic benefits and more
  • Improved corporate information sharing model through Team Drives
  • Accountability and traceability of users through the audit reports
  • Assurance of timed retention and deletion of records with Vault
  • Reduced cost to manage FOIA requests with eDiscovery
  • Extended mobile device management


£110.40 per user per year

Service documents


G-Cloud 11

Service ID

6 6 0 1 5 7 6 0 0 1 5 7 5 7 4


Ancoris Limited

David McLeman|Phil Jordan|Trevor Cook

+44 (0) 8452626745

Service scope

Software add-on or extension
Cloud deployment model
Public cloud
Service constraints
Need to access through a web browser
System requirements
Internet Connectivity with a modern web browser

User support

Email or online ticketing support
Yes, at extra cost
Support response times
P1: 30 mins, P2: 1 hour, P3-P4 tickets: 4 hours
User can manage status and priority of support tickets
Online ticketing support accessibility
None or don’t know
Phone support
Phone support availability
24 hours, 7 days a week
Web chat support
Onsite support
Yes, at extra cost
Support levels
Google provides a single level of support for GSuite in line with other enterprise service providers, the terms of support can be found here:

Enhanced support offerings from Ancoris are also available - please see our related services in the "Support" section - "Google G Suite Support Services". These services offer enhanced response, case prioritisation, advice & assistance (and not just "break / fix") on Google G Suite features; support on integrating G Suite into your existing domain; Account management; regular Service Reviews, end user training (via our integrated e-learning tool) and free consultancy on your G Suite implementation
Support available to third parties

Onboarding and offboarding

Getting started
Google provides a proven business transformation framework based on highly regarded research in accredited universities. An online Getting Started learning path is described at

Enhanced training services are also available from Ancoris - please see our related services in the "Support" section - "Google G Suite and Chrome training and Change Management Services", and "Cloud Skills Academy - G Suite E-learning and e-Support". These services provide a range of onsite and online training and user documentation

Ancoris also provide G Suite migration and deployment services to ensure a smooth implementation for all your users - please see our related service in the "Support" section - "Google G Suite and chrome - Migration and Deployment Services". This service provides for a fully managed deployment project covering all aspects of project governance, technical activity needed and user change management required.
Service documentation
Documentation formats
End-of-contract data extraction
If your organization decides to leave G Suite, your users can take their G Suite data with them. They can export emails, contacts, calendars, videos, and more. Then, they can import the data to your new provider. More information can be found here:
End-of-contract process
Access to the G Suite instance will be terminated and data will be removed from all Google systems within 180 business days

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Compatible operating systems
  • Android
  • IOS
  • Linux or Unix
  • MacOS
  • Windows
  • Windows Phone
  • Other
Designed for use on mobile devices
Differences between the mobile and desktop service
Custom mobile applications are available both for iOS and Android which provide a bespoke user experience tailored to the operating system in question. For other mobile operating systems, web browser support is included which provides an equivalent experience to the desktop environment.
Service interface
What users can and can't do using the API
The scope of capabilities exposed via API to GSuite users is very broad and encompasses most major use cases. G Suite API's are grouped into ten main API's and SDK's that can be found here:
API documentation
API documentation formats
API sandbox or test environment
Customisation available
Description of customisation
Google Apps Script is a JavaScript cloud scripting language that provides easy ways to automate tasks across Google products


Independence of resources
G Suite is powered by a massively scaleable infrastructure which already services more than 1 Billion users. The addition of any practicable number of users has a very low impact


Service usage metrics
Metrics types
The Account activity report page gives access to all data from the User account status, Admin status, and 2-Step Verification enrollment reports. It also shows details of Google Drive and Gmail usage. Further information can be found here:
Reporting types
API access


Supplier type
Reseller providing extra support
Organisation whose services are being resold

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
EU-US Privacy Shield agreement locations
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
  • Other
Other data at rest protection approach
Data is encrypted at rest using AES encryption, data sharding and key rotation. Physical access control is also compliant with SSAE-16
Data sanitisation process
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
Most tools include a 'Save as' function that allows the export of data in industry standard formats. In addition, each user can download all the data they need from their G Suite account (including emails, calendars, contacts, documents, bookmarks, and more) to one place at the same time. Users can choose which Google products to archive. For example, they can choose to download their emails and documents, but not their bookmarks or photos. Only the user can access their archive and import it into a new service.
Data export formats
  • CSV
  • ODF
Data import formats
  • CSV
  • ODF

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Contractually Google's Service Level is guaranteed to 99.9% availability for any calendar month and backed with service credits. Definitions and service credits are described at
Approach to resilience
All data is redundantly stored across a minimum of 3 data centers
Outage reporting
Google provides customer alerts and a public uptime dashboard here: The dashboard advises across the G Suite services on degradation or downtime.

Identity and authentication

User authentication needed
User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels
Depending on administrator preference, users can be signed in via a federated identity service, including AD or use G Suite as their identity backend. 2 Factor authentication is supported and can be enforced.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
Between 1 month and 6 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
Between 1 month and 6 months
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
Ernst & Young
ISO/IEC 27001 accreditation date
April 15, 2015
What the ISO/IEC 27001 doesn’t cover
Any service not listed on the ISO certificate is not covered.
ISO 28000:2007 certification
CSA STAR certification
CSA STAR accreditation date
CSA STAR certification level
Level 1: CSA STAR Self-Assessment
What the CSA STAR doesn’t cover
PCI certification
Other security certifications
Any other security certifications
  • Ferpa

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
ISO 27017, ISO 27018, SSAE16 / ISAE 3402 Type II, FedRAMP, HIPAA

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Google maintains security and patching of the host OS environments.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Google have long enjoyed a close relationship with the security research community. To honor all the cutting-edge external contributions that help Google keep users safe, Google maintain a Vulnerability Reward Program for Google-owned web properties, running continuously since November 2010. More information can be found here:
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Within Google, members of the information security team review security plans for all networks, systems and services. They provide project-specific consulting services to Google’s product and engineering teams. They monitor for suspicious activity on Google’s networks, address information security threats, perform routine security evaluations and audits, and engage outside experts to conduct regular security assessments. We specifically built a full-time team, known as Project Zero, that aims to prevent targeted attacks by reporting bugs to software vendors and filing them in an external database.
Incident management type
Supplier-defined controls
Incident management approach
Security events that affect confidentiality, integrity, or availability of systems or data. The security team logs, prioritizes it according to severity. Events that directly impact customers are assigned highest priority. This process specifies courses of action, procedures for notification, escalation, mitigation, and documentation. Security incident management is structured around the NIST guidance on handling incidents (NISTSP 800–61). Key staff are trained in forensics and handling evidence in preparation for an event, including use of third-party and proprietary tools. Testing of response plans are performed for key areas, that store sensitive customer information. The team is available 24/7 to employees.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks


£110.40 per user per year
Discount for educational organisations
Free trial available
Description of free trial
The free version is functionally identical to the paid version of G-Suite but is only available for 30 days through an online registration and not supplied under G-Cloud terms and conditions.
Link to free trial

Service documents

Return to top ↑