Register now for Google Cloud Next '24 in Las Vegas April 9-11 to take advantage of early bird pricing of $999 USD.

Security and identity

We offer security products that help you meet your policy, regulatory, and business objectives. The rich set of controls and capabilities we offer is always expanding.

Explore our products

CategoryProduct Key features
Secure your cloud transformation

Cloud provider visibility through near real-time logs.

  • Explicitly approve access with Access approval

  • Access justifications shows the reason for access

  • Resource and method identification

Compliance and security controls for sensitive workloads.

  • Enforcement of data location

  • Limit personnel access

  • Built-in security controls

  • Enforcement of product deployment location

View, monitor, and analyze Google Cloud and Anthos assets across projects and services.

  • Fully managed inventory service

  • Export all your assets at a point of time

  • Export asset change history

  • Real-time notification on asset config change

Sensitive data inspection, classification, and redaction platform.

  • Data discovery and classification

  • Mask your data to safely unlock more of the cloud

  • Measure re-identification risk in structured data

Cloud-native, managed network threat detection with industry-leading security.

  • Detect network-based threats like malware, spyware, command-and-control attacks

  • Cloud-native and managed, with high performance and easy deployment

  • Built with Palo Alto Networks' industry-leading threat detection technologies

Manage encryption keys on Google Cloud.

  • Centrally manage encryption keys

  • Deliver hardware key security with HSM

  • Provide support for external keys with EKM

  • Be the ultimate arbiter of access to your data

Encrypt data in use with Confidential VMs.

  • Real-time encryption in use

  • Lift and shift confidentiality

  • Enhanced innovation

Global and flexible firewalls to protect your cloud resources.

  • Hierarchical firewall policies

  • VPC firewall rules

  • Firewall insights

  • Firewall rules logging

Store API keys, passwords, certificates, and other sensitive data.

  • Replication policies

  • First-class versioning

  • Cloud IAM integration

  • Audit logging

Protect sensitive data in Google Cloud services using security perimeters.

  • Helps mitigate data exfiltration risks

  • Centrally manage multi-tenant service access at scale

  • Establish virtual security perimeters

  • Deliver independent data access control

Platform for defending against threats to your Google Cloud assets.

  • Centralized visibility and control

  • Threat prevention

  • Threat detection

  • Asset discovery and inventory

Virtual machines hardened with security controls and defenses.

  • Verifiable integrity with secure and measured boot

  • vTPM exfiltration resistance

  • Trusted UEFI firmware

  • Tamper-evident attestations

Unified platform for IT admins to manage user devices and apps.

  • Advanced account security

  • Device security on Android, iOS, and Windows

  • Automated user provisioning

  • Unified management console

Use identity and context to guard access to your applications and VMs.

  • Centralized access control

  • Works with cloud and on-premises apps

  • Protects apps and VMs

  • Simpler for admins and remote workers

Permissions management system for Google Cloud resources.

  • Single access control interface

  • Fine-grained control

  • Automated access control recommendations

  • Context-aware access

Hardened service running Microsoft® Active Directory (AD).

  • Compatibility with AD-dependent apps

  • Familiar features and tools

  • Multi-region and hybrid identity support

  • Automatic patching

Smart access control for your Google Cloud resources.

  • Smart access control

  • Helps you understand and manage policies

  • Greater visibility

  • Advanced automation

Manage software supply chain risk

Incorporate the same OSS packages that Google uses into your own developer workflows.

  • Code scanning and vulnerability testing

  • Enriched metadata

  • SLSA-compliant builds

  • Verified provenance and automatic SBOMs

Fully managed, end-to-end software supply chain security solutions at scale.

  • Enhance application security in development environments

  • Improve the security of your application images and dependencies

  • Strengthen the security of your CI/CD pipeline

  • Enforce trust-based security policies throughout your SDLC

Provide secure access to apps, data, and resources

Scalable zero-trust platform with integrated threat and data protection.

  • Security layered to protect users, data, resources, and applications

  • Access policies based on identity and context

  • Experience that is simple for admins and end-users with an agentless approach

Simplify the deployment and management of private CAs.