Jump to Content
Security & Identity

Simplify enterprise threat detection and protection with new Google Cloud security services

March 6, 2019
https://storage.googleapis.com/gweb-cloudblog-publish/images/securityblogurs.blog.max-2000x2000.png
Jennifer Lin

Vice President of Product Management, Google Cloud

Today’s enterprises face a complex threat environment. Attacks targeting users, networks, sensitive information and communications are increasing in sophistication and scale. Organizations of all sizes need advanced security capabilities that are easy to deploy and manage to help defend against these threats. At Google Cloud, we are constantly looking to bring innovative capabilities to users of our platform, and now, even to organizations who may not be running workloads on our platform.

Introducing the Web Risk API

Today, we're excited to announce the beta release of Web Risk API, a new Google Cloud service designed to keep your users safe on the web. With a simple API call, client applications can check URLs against Google's lists of unsafe web resources, including social engineering sites such as phishing and deceptive sites, and sites that host malware or unwanted software. With the Web Risk API, you can quickly identify known bad sites, warn users before they click links in your site that may lead to infected pages, and prevent users from posting links to known malicious pages (for example, adding a malicious URL into a comment) from your site.

The Web Risk API includes data on more than a million unsafe URLs that we keep up-to-date by examining billions of URLs each day, and is powered by the same technology that underpins Google Safe Browsing. Safe Browsing protections work across Google products to help protect over three billion devices every day across the Internet. Our Safe Browsing engineering, product, and operations teams work at the forefront of security research and technology to build systems that protect people from harm, and now, the Web Risk API lets enterprises use this same technology to protect their users.

Protect against DDoS and targeted attacks with Cloud Armor

If you run internet-facing services or apps, you have a tough job: you have to quickly and responsively serve traffic to your end users, while simultaneously protecting against malicious attacks trying to take your services down. Cloud Armor is a Distributed Denial of Service (DDoS) defense and Web Application Firewall (WAF) service for Google Cloud Platform (GCP), and it’s based on the same technologies and global infrastructure that we use to protect services like Search, Gmail and YouTube. Today, we are pleased to announce that Cloud Armor is now generally available, offering L3/L4 DDoS defense as well as IP Allow/Deny capabilities for applications or services behind the Cloud HTTP/S Load Balancer.

The GA release includes a new Cloud Armor dashboard that is available in Stackdriver Monitoring. This flexible dashboard makes it easy to monitor and analyze traffic subject to Cloud Armor protection and lets network admins or Security Operations teams understand the effectiveness of Cloud Armor security policies. Additionally, users can now evaluate and validate the potential impact of proposed rules in preview mode across their whole project or drill down into individual security policies or backend services.

https://storage.googleapis.com/gweb-cloudblog-publish/images/Cloud_Armor.max-1100x1100.png
With Cloud Armor, you can quickly visualize your application traffic and see which requests are allowed and blocked.

Easily use HSM keys to protect your data in the cloud

Protecting sensitive data is a top priority for organizations, especially for those in highly-regulated industries like financial services. Encryption is a core way to help with this challenge, and many security-sensitive organizations deploy hardware security modules (HSMs) to add extra layers of security to their crypto operations. But deploying, configuring and running HSMs can be hard.

To help, today, we’re also announcing the general availability of Cloud HSM, our managed cloud-hosted hardware security module (HSM) service on GCP. Cloud HSM allows you to protect encryption keys and perform cryptographic operations in FIPS 140-2 Level 3 certified HSMs (see image below). With this fully managed service, you can protect your most sensitive workloads without needing to worry about the operational overhead of managing an HSM cluster. Many large companies have moved workloads to GCP with the knowledge that they can very easily and quickly use HSM keys to help protect their data.

https://storage.googleapis.com/gweb-cloudblog-publish/images/Cloud_HSM_94cr9gm.max-1900x1900.png

Cloud HSM brings hassle-free hardware cryptography and key management to your GCP deployment

Cloud HSM has been available in several locations across the US and is now available for GCP customers in multiple locations in Europe as well, with more to come.

With these three capabilities, we continue to empower Google Cloud customers with advanced security functionality that is easy to deploy and use. Learn more about our entire portfolio of security capabilities on our Trust & Security Center.

Posted in