Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

Google Launches Enterprise Threat Detection Solution

Google this week announced the availability of Chronicle Detect, a threat detection solution for enterprises from Google Cloud.

This is the first threat detection product out of the Chronicle cybersecurity platform after Chronicle became part of Google in June last year.

Google this week announced the availability of Chronicle Detect, a threat detection solution for enterprises from Google Cloud.

This is the first threat detection product out of the Chronicle cybersecurity platform after Chronicle became part of Google in June last year.

Launched in 2018 as a separate entity, Chronicle was established in 2016 within Google’s parent company Alphabet, aiming at delivering visibility into possible vulnerable areas, to help improve security posture. In March 2019, Chronicle launched security telemetry platform Backstory, and in June 2019 it announced joining Google Cloud.

The newly announced detection tool, Google revealed in a blog post this week, takes advantage of its large infrastructure to help organizations identify threats faster and at a higher scale than before.

Chronicle Detect, the tech giant explains, builds on products announced at the RSA Conference earlier this year: “a data fusion model that stitches events into a unified timeline, a rules engine to handle common events, and a language for describing complex threat behaviors.”

Taking advantage of a next generation rules engine from Google, Chronicle Detect is expected to boost overall threat detection, delivering improved speed, and a language designed specifically for the detailing of threat behaviors, in addition to new rules and indicators.

The tool is meant to help organizations depart from legacy security tools and adopt a modern threat detection system, Google says. Security teams are provided with the option to send telemetry to Chronicle, at a fixed cost, which results in diverse security data being leveraged for detection.

“We automatically make that security data useful by mapping it to a common data model across machines, users, and threat indicators, so that you can quickly apply powerful detection rules to a unified set of data,” Google says.

Advertisement. Scroll to continue reading.

The threat detection solution also provides advanced rules out-of-the-box, while allowing security teams to build their own rules or import those used in legacy tools. Based on the YARA detection language, the rules can be leveraged for quickly building detections for MITRE ATT&CK tactics and techniques.

Furthermore, Chronicle Detect includes a Sigma-YARA converter, allowing organizations that use Sigma-based rules or ones that are converting legacy rules to Sigma, for portability, to port their rules to and from Chronicle’s platform as well.

According to Chronicle, organizations can also enjoy detection rules and threat indicators that the company’s Uppercase threat research team delivers. IOCs from the team are analyzed against telemetry data to immediately inform customers of threat indicators in their environments.

“Uppercase researchers leverage a variety of novel tools, techniques, and data sources (including Google threat intelligence and a number of industry feeds) to provide Chronicle customers with indicators spanning the latest crimeware, APTs, and unwanted malicious programs,” the company explains.

Related: Google Ups Malware Protection for ‘Advanced Protection’ Users

Related: Microsoft Extending Threat Protection Portfolio, Unifying Security Solutions

Related: Google Boosts Detection of Malicious Documents in Gmail

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...