Skip to main content

Google Cloud Security: continuing to give good the advantage


Cloud security is a top enterprise IT priority as organizations modernize their critical business systems both in-place and in the cloud. Our mission is to provide advanced security solutions that help give good the advantage, starting from building the most secure cloud platform to products that bring the power of Google’s global infrastructure and threat intelligence directly to your data centers.

Today at the RSA Conference we’re introducing new capabilities that offer security wherever our customers’ systems and data may reside, including threat detection and timeline capabilities in Chronicle, threat response integration between Chronicle and Palo Alto Networks’ Cortex XSOAR, and online fraud prevention services. 

New advanced threat detection and automatic timelines in Chronicle
msoffice_powershell.jpg
Detection rule to find a PowerShell download

Chronicle launched its security analytics platform in 2019 to help change the way any business could quickly, efficiently, and affordably investigate alerts and threats in their organization. At RSA this year, as part of Google Cloud, we’ll show how customers can detect threats using YARA-L, a new rules language built specifically for modern threats and behaviors, including types described in Mitre ATT&CK. This advanced threat detection provides massively scalable, real-time and retroactive rule execution.

We’re also introducing Chronicle’s intelligent data fusion, a combination of a new data model and the ability to automatically link multiple events into a single timeline. Palo Alto Networks, with Cortex XSOAR, is our first partner to integrate with this new data structure to enable even more powerful threat response. We’ll be demonstrating this integrated capability in the Google Cloud/Chronicle booth at RSA.

“Cortex XSOAR offers automated enrichment, response and case management to enterprise-wide threats,” said Rishi Bhargava, VP, Product Strategy at Palo Alto Networks. “The integration with Chronicle’s new detection capabilities and event timelines, across months or years of data, enhances that response and enables comprehensive threat management for our mutual customers.”

Prevent fraud and abuse with reCAPTCHA Enterprise and Web Risk

To protect your business, you need to protect your users. To help, we’re announcing the general availability of reCAPTCHA Enterprise and Web Risk API. These products are underpinned by two Google security technologies that have been protecting billions of web users and millions of websites for more than a decade—reCAPTCHA and Google Safe Browsing. 

reCAPTCHA Enterprise helps protect websites from fraudulent activities like scraping, credential misuse, and automated account creation. Protecting the web from bots has become increasingly important with the rise of threats like credential stuffing attacks, where malicious actors can test large volumes of breached passwords against legitimate sites. reCAPTCHA Enterprise recently added a new wave of commercial-grade bot defense capabilities to help ensure that a login attempt is being made by a legitimate user and not a bot. Google Nest is using reCAPTCHA Enterprise to help prevent automated attacks by actors seeking to obtain unauthorized access to accounts and devices.
reCAPTCHA Enterprise protections.jpg
Overview of reCAPTCHA Enterprise protections
Using Web Risk API, enterprise customers can enable client applications to check URLs against Google's constantly updated lists of unsafe web resources to prevent access to or inclusion of malicious content. Web Risk API alerts on, and includes information about, more than a million unsafe URLs that we keep up-to-date by examining billions of URLs each day in Google Safe Browsing.

Web Risk API and reCAPTCHA Enterprise are now both globally generally available and can be purchased separately. 

Google Cloud security in 2020 and beyond

When it comes to security, our work will never be finished. In addition to the capabilities announced today, we’ll continue to empower our customers with products that help organizations modernize their security capabilities in the cloud or in-place. To learn more about our entire portfolio of security capabilities, visit us at booth #2233 Moscone South, and check out our Trust & Security Center.





Sunil Potti
Vice President, Google Cloud Security

Comments

Popular posts from this blog

Use Vault for Gmail Confidential Messages and Jamboard Files

Google vault will be supporting two new formats in the future, Gmail confidential mode emails & Jamboard files stored in Google Drive. Google Vault gives you a chance to retain, hold, search, and export data to support your organization’s retention and eDiscovery needs. This dispatch includes support for new information types with the goal that you can thoroughly oversee your association's information. What happens when individuals in your association sends confidential messages? Vault can hold, retain, search, and export all confidential mode messages sent by users in your association. Messages are constantly accessible to Vault, notwithstanding when the sender sets a termination date or denies access to private messages. Here’s an example of what admin@ink-42.com will see in Vault when they search for sam@ink-42.com and preview this email sent by lisa@ink-42.com . But It’ll not work vise versa. Admins can hold, retain, search and export message headers and s

Zoom’s Work Transformation Summit on Jan. 19: Fresh Approaches for Moving Forward

These past two years have undoubtedly reshaped work. More specifically, these past two years — shuffling between remote, in-person, and hybrid work scenarios — reshaped what employees expect out of their jobs, how they want to work, and what the office means to them.  Organizations are challenged with making big decisions to meet those expectations, and those decisions will dramatically alter how they hire, manage their facilities, buy technology, and maintain productivity. Simply adjusting policies and retooling previous work models won’t do. It takes a comprehensive reimagining. To help organizations navigate this next phase of work, Zoom is hosting our  Work Transformation Summit  on Jan. 19, a free, half-day virtual event designed to provide you and your organization with meaningful strategies, creative approaches, and innovative solutions for redefining work.  Summit attendees will have the opportunity to hear from peers and industry experts on the importance of embracing technolo

Access well-known educational technology tools straight from Google Classroom.

  We're making it simpler for instructors to use popular EdTech products that are most effective for their class right in Google Classroom with a new seamless integration of single sign-on, assigning, and grading. With the help of this feature, teachers can find, assign, and grade interesting content for their classes, and both teachers and students can access their EdTech tools without needing to navigate to other websites or apps or go through a cumbersome login process that requires remembering numerous usernames and passwords. This offers a more simplified experience when using technology to affect learning, in addition to saving instructors and students time. We partnered with 15+ EdTech companies to build custom add-ons, including Kahoot!, Pear Deck, IXL, and Nearpod.  Admins :  In order for educators to use add-ons, district administrators must provide access to them. For further information on how to install the add-ons functionality and specific add-ons for a domain, OU, o