Chronicle is a modern, cloud-native SecOps platform that empowers security teams to better defend against today’s and tomorrow’s threats.
Features
Leverage Google curated detections to find the latest threats and map them to MITRE ATT&CK.
Simplify detection authoring with YARA-L to build custom content.
Leverage intelligence from Google, Mandiant, and VirusTotal to automatically uncover potential threats.
Get early warning signals of potential active breaches based on Mandiant’s frontline intelligence.
Identify potentially exploitable entry points accessible to attackers and prioritize remediation with attack surface management integration.
Continuously match twelve months of hot data against comprehensive threat intelligence ensuring that new intelligence is being matched against newly ingested data as well as older data.
Analyze real-time activity with investigation views, visualizations, threat intel insights, and user aliasing.
Investigate with full context at your fingertips, including anomalous assets and domain prevalence and more.
"Google search" petabytes of data at lightning speed.
Manage, prioritize, and assign work with unique threat-centric case management.
Seamlessly pivot between cases, alerts, entities, and detections with a unified experience across the entire TDIR workflow.
Drive consistency in your response and automate repetitive tasks with a full- featured intuitive playbook builder and 300+ integrations.
Easily collaborate on every case with fellow analysts, service providers, and other stakeholders.
Use natural language to search your data, iterate, and drill down. Gemini generates underlying queries and presents full mapped syntax.
Investigate more efficiently with AI-generated summaries of what’s happening in cases, along with recommendations on how to respond.
[UPCOMING] Interact with Chronicle using a context-aware AI-powered chat, including the ability to create detections and playbooks.
Partner with Mandiant elite threat hunters, leveraging advanced techniques, to hunt for hidden attackers seamlessly using your Chronicle data.
Get complete visibility and actionable insights into what our expert hunters looked for, how and where they looked, and what they found—mapped to the MITRE ATT&CK® framework.
How It Works
Chronicle offers a unified experience across SIEM, SOAR, and threat intelligence to drive better detection, investigation, and response. Collect security telemetry data, apply threat intel to identify high priority threats, drive response with playbook automation, case management, and collaboration.
Common Uses
Drive SOC modernization
Protect your organization against modern-day threats by transforming your security operations with Chronicle.
Drive SOC modernization
Protect your organization against modern-day threats by transforming your security operations with Chronicle.
Eliminate blindspots and automate response
Enhance your organization’s threat detection, investigation, and response at a predictable cost with Google’s cloud-native hyperscale security operations platform.
Eliminate blindspots and automate response
Enhance your organization’s threat detection, investigation, and response at a predictable cost with Google’s cloud-native hyperscale security operations platform.
Cloud SecOps, by cloud experts
Get better and faster detection, investigation, and response to cloud-based cyber threats with the same native tools and best practices used to protect Google Cloud.
Cloud SecOps, by cloud experts
Get better and faster detection, investigation, and response to cloud-based cyber threats with the same native tools and best practices used to protect Google Cloud.
Pricing
About Chronicle Security Operations pricing | Chronicle is available in packages and based on ingestion. Includes one year of security telemetry retention at no additional cost. | |
---|---|---|
Product | Description | Pricing |
Chronicle Security Operations - Standard | For organizations seeking a hyper-scale, fast, and cost-efficient data lake and analytics platform, inclusive of SIEM and SOAR functionality. | Contact sales for pricing |
Chronicle Security Operations - Enterprise | For SecOps teams with fairly complex environments and typical alert volumes. Includes SIEM and SOAR functionality plus enriched threat intelligence, UEBA, Google curated detections, and Gemini. | Contact sales for pricing |
Chronicle Security Operations - Enterprise Plus | Update to the following - For SecOps teams and MSSPs managing high alert volumes in complex environments. Includes SIEM and SOAR functionalities plus premium threat intelligence, MATI Fusion and VirusTotal Duet licenses, UEBA, emerging and active incident response threat detections, alert prioritization for EDR alerts, BigQuery UDM storage, and Gemini. | Contact sales for pricing |
About Chronicle Security Operations pricing
Chronicle is available in packages and based on ingestion. Includes one year of security telemetry retention at no additional cost.
Chronicle Security Operations - Standard
For organizations seeking a hyper-scale, fast, and cost-efficient data lake and analytics platform, inclusive of SIEM and SOAR functionality.
Contact sales for pricing
Chronicle Security Operations - Enterprise
For SecOps teams with fairly complex environments and typical alert volumes. Includes SIEM and SOAR functionality plus enriched threat intelligence, UEBA, Google curated detections, and Gemini.
Contact sales for pricing
Chronicle Security Operations - Enterprise Plus
Update to the following - For SecOps teams and MSSPs managing high alert volumes in complex environments. Includes SIEM and SOAR functionalities plus premium threat intelligence, MATI Fusion and VirusTotal Duet licenses, UEBA, emerging and active incident response threat detections, alert prioritization for EDR alerts, BigQuery UDM storage, and Gemini.
Contact sales for pricing
Business Case
Explore how organizations like yours cut costs, increase ROI, and drive innovation with Chronicle Security Operations
IDC Study: Customers cite 407% ROI with Google Chronicle
CISO, multi-billion dollar automotive company
“Our cybersecurity teams deal with issues faster with Google Chronicle Security Operations, but they also identify more issues. The real question is, ‘how much safer do I feel as a CISO with Google Chronicle Security Operations versus my old platform?’ and I would say 100 times safer.”
Read the studyTrusted and loved by security teams around the world
"Every event goes to our single point of truth for security which is Chronicle Security Operations. Here we are able to automate many operations to speed response and make our analysts' lives easier." - Nicola Mutti, CISO, Telepass
"We have advanced capabilities around threat intelligence that are highly integrated into the Chronicle platform. We like the orchestration capabilities that enable us to enrich the data and provide additional context to it, so our SOC and analysts are able to prioritize that work and respond with the attention that is needed." - Bashar Abouseido, CISO, Charles Schwab
"We think Google made a strategic decision in the way that they built the platform [Chronicle Security Operations] many years ago. Not only is it highly robust and has millisecond search capability across vast amounts of data, but it gives you an unlimited amount of storage compared to the other platforms." - Robert Herjavec, CEO, Cyderes