Google Meet now available via Gmail for G Suite customers

Google’s enterprise videoconferencing tool Google Meet is now directly accessible from Gmail, the company said Thursday. The new integration is currently available on Gmail for the web with mobile coming soon.

“With Meet in Gmail, you can easily start or join a meeting in seconds,” Google wrote in a blog post. “Our goal is to help you follow the flow of the day, seamlessly switching between email and video meetings—whichever form of communication you need.”

Users can click “join a meeting” or “start a meeting” from the sidebar within Gmail, which will prompt a new window to pop up.

Last month, Google reported that daily usage of the tool has spiked, as workers look for ways to stay productive from home through the COVID-19 pandemic. As of March 31, Google Meet’s daily usage was 25X higher than it was in January.

The increased need for enterprise-grade videoconferencing tools has prompted Google to step up its promotion of the tool, recently rebranding it from “Hangouts Meet” to Meet. Google Hangouts is Google’s videoconferencing tool for consumers. Last week, Google rolled out new security features for education customers using Meet.

According to Reuters, Google will add more features to Meet later this month, including a layout option displaying up to 16 call participants at once, improved video quality in dim lighting and the ability to filter background noise.

Hot this week

Why Hiding Cloud Resources Increases Your Security Risks

Obscuring cloud resources creates dangerous blind spots rather than security. Learn why visibility with proper controls outperforms secrecy every time.

Compliance Alone Leaves You Vulnerable to Attack

Passing compliance audits doesn't prevent breaches. Learn why attackers target compliant organizations and how to build real security beyond checklists.

Your Vulnerability Management Is Broken Because of CVSS Blind Spots

Overreliance on CVSS scores creates vulnerability management blind spots that expose organizations to real risks. Learn how to prioritize based on business context and actual threats instead of arbitrary scores.

Why Perfect Security Is an Illusion and What to Do Instead

Chasing 100% vulnerability elimination creates false security. True protection comes from prioritizing business critical risks, implementing compensating controls, and building incident response resilience.

When Security Automation Creates Dangerous Blind Spots

Over reliance on security automation creates dangerous blind spots. Learn why human oversight remains irreplaceable and practical steps to balance both.

Topics

Why Hiding Cloud Resources Increases Your Security Risks

Obscuring cloud resources creates dangerous blind spots rather than security. Learn why visibility with proper controls outperforms secrecy every time.

Compliance Alone Leaves You Vulnerable to Attack

Passing compliance audits doesn't prevent breaches. Learn why attackers target compliant organizations and how to build real security beyond checklists.

Your Vulnerability Management Is Broken Because of CVSS Blind Spots

Overreliance on CVSS scores creates vulnerability management blind spots that expose organizations to real risks. Learn how to prioritize based on business context and actual threats instead of arbitrary scores.

Why Perfect Security Is an Illusion and What to Do Instead

Chasing 100% vulnerability elimination creates false security. True protection comes from prioritizing business critical risks, implementing compensating controls, and building incident response resilience.

When Security Automation Creates Dangerous Blind Spots

Over reliance on security automation creates dangerous blind spots. Learn why human oversight remains irreplaceable and practical steps to balance both.

Why Over Trusting Cybersecurity AI Weakens Your Defenses

Over-reliance on AI tools degrades human security skills while creating new vulnerabilities, requiring balanced collaboration between analysts and technology.

When More Security Tools Create More Risk

Adding security tools often increases risk through complexity. Learn how consolidation and staff training create stronger defenses than endless tool accumulation.

Firewalls Create Dangerous False Security and What to Do Instead

Firewalls create dangerous security illusions by focusing exclusively on perimeter defense while attackers exploit internal network vulnerabilities through lateral movement after inevitable breaches occur.
spot_img
Exit mobile version