Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

Google Cloud Unveils New SOC, IDS Solutions

Google Cloud this week announced new security offerings for its customers, including Autonomic Security Operations to improve security operations centers (SOCs) and Cloud Intrusion Detection System (IDS) for network-based threat detection.

Google Cloud this week announced new security offerings for its customers, including Autonomic Security Operations to improve security operations centers (SOCs) and Cloud Intrusion Detection System (IDS) for network-based threat detection.

Autonomic Security Operations, the Internet giant says, represents a “stack of products, integrations, blueprints, technical content, and an accelerator program” meant to help customers leverage Chronicle and Google technology and expertise to advance their SOC.

A collection of philosophies, practices, and tools, Autonomic Security Operations should help organizations improve their resilience against cyberattacks, with an automated approach to threat management.

The solution includes products (Chronicle, Looker, and BigQuery), integrations to supported vendors (EDR, SOAR), network forensics and telemetry blueprints, content (sample dashboards, rules, and use-cases), accelerator workshops, and preferred SOC transformation and managed security service provider (MSSP) partners.

Google says it has partnered with BT to launch Autonomic Security Operations to the managed security services market and that the solution is also backed by its long-standing relationships with Cyderes and SADA Systems, among others.

Currently available in preview, Google’s new Cloud IDS is a network security product that delivers native network-based threat detection capabilities that leverage Google Cloud integration.

The product is delivered in collaboration with Palo Alto Networks and can help organizations not only gain insights into network-based threats, but also ensure their security implementations are compliant with industry policies.

An end-to-end cloud solution, Cloud IDS monitors east-west traffic along with traffic to and from the Internet, to identify anomalies and detect threats, including malware, spyware, command and control (C&C) traffic, and more. Data generated by Cloud IDS can be used to investigate and correlate threats and respond to them.

Advertisement. Scroll to continue reading.

Cloud IDS currently integrates with the Splunk cloud and enterprise platforms, Exabeam’s Advanced Analytics solution, The Devo Platform, and Palo Alto Networks’ Cortex XSOAR. Integrations with Google Cloud’s Chronicle and Security Command Center will be added in the near future.

Related: Google Cloud Introduces New Zero Trust Offerings for Government

Related: Google Cloud Certificate Authority Service Becomes Generally Available

Related: Google Working on Patching GCP Vulnerability That Allows VM Takeover

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

CISO Conversations

SecurityWeek talks to Billy Spears, CISO at Teradata (a multi-cloud analytics provider), and Lea Kissner, CISO at cloud security firm Lacework.

Cloud Security

Cloud security researcher warns that stolen Microsoft signing key was more powerful and not limited to Outlook.com and Exchange Online.

CISO Strategy

Okta is blaming the recent hack of its support system on an employee who logged into a personal Google account on a company-managed laptop.

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...