Say buh-bye to legacy SIEMs and see what Chronicle Security Operations' latest release has to offer.

Chronicle SIEM

Detect, investigate, and hunt for threats like never before

Chronicle Security Operations delivers modern security information and event management (SIEM) capabilities at unprecedented speed and scale.

Looking for more on security operations? Visit Chronicle Security Operations.

Features

Cloud-scale security analytics

Eliminate blind spots with cloud-scale ingestion of your security telemetry with 12 months hot retention at unprecedented speed and scale. Forward data from any syslog source, log aggregator, SIEM, or packet capture to Chronicle – and use our one-click integration to instantly drive visibility into your environment.

Context rich investigation

Unify and enrich your security telemetry onto a single correlated timeline view of ongoing threats in your environment. Get faster insights with context rich investigation views that automatically stitch together relevant entities and pinpoint anomalies.
Conduct sub-second search across petabytes of information - as easy as running a Google search. Get actionable threat information in seconds or minutes—not hours or days.

Advanced detection engine

Correlate petabytes of your telemetry with an advanced detection engine continuously updated with new rules and threat indicators by Google researchers. Use Google expertise codified as curated detections for advanced threats and build custom detections with intuitive detection authoring using YARA-L.  

Active breach detection

Automatically correlate active breach threat intelligence by Mandiant with your data to receive early warning signals and get ahead of attackers.

How It Works

Chronicle enables security teams to detect, investigate and respond to threats at Google speed and scale. Chronicle does this by collecting all of your security telemetry data, aggregating it, normalizing it, and applying threat intelligence to identify the highest priority threats.
Read the SANS review

See how Chronicle detects security exploits

Common Uses

Threat detection

Investigation

Hunting

Pricing

How Chronicle Security Operations pricing works

Chronicle is available in packages and based on ingestion. Includes 1 year of security telemetry retention at no additional cost.

Chronicle Security Operations

Chronicle Security Operations pricing is available in packages and based on ingestion. Includes 1 year of security telemetry retention at no additional cost. 

Contact sales for pricing

How Chronicle Security Operations pricing works Chronicle is available in packages and based on ingestion. Includes 1 year of security telemetry retention at no additional cost.
Product Description Pricing
Chronicle Security Operations

Chronicle Security Operations pricing is available in packages and based on ingestion. Includes 1 year of security telemetry retention at no additional cost. 

Contact sales for pricing

Get a demo

See Chronicle Security Operations in action
Contact us

Talk to Sales

Contact us today for more information on Chronicle Security Operations
Contact us

Learn more about Chronicle

Overcome data and resource constraints

See their stories

See Security Operations from end-to-end

Watch the demo

Business Case

Explore how organizations like yours cut costs, increase ROI, and drive innovation with Chronicle Security Operations

“Chronicle is the perfect partner in our threat hunting and detection process.”

Manuela Italia, Chief Information Security Officer at Telepass

Chronicle helps Telepass keep 6 million drivers safe from security threats

See the customer story

Featured benefits and customers of Chronicle

Store security telemetry up to 4x longer by default 

Scan security data with up to 20x more real-time threat detection rules

Reduce analyst manual toil in search generation by more than 10x with faster search

  • BBVA logo
  • Morgan Sindall logo
  • Groupon logo
  • Telefonica logo
  • Vertiv logo