Overview

What is digital risk protection (DRP)?

Digital risk protection is a collection of products and services to protect essential assets and data from external threats, visibility to the open, deep, and dark web for malicious targeting, and context on the most relevant threat actors and their tactics, techniques, and procedures (TTPs).

How does Google offer digital risk protection?

Google delivers digital risk protection either via stand-alone self-managed SaaS products or a comprehensive service. Both options give you the ability to identify high-risk attack vectors, visibility outside your organization, malicious orchestration from the deep and dark web, and attack campaigns on the open web. Google’s digital risk protection solution also provides contextual information on threat actors and their tactics, techniques, and procedures to provide a more secure cyber threat profile.

Why is digital risk protection important?

Digital risk protection enables you to be more proactive in your security approach by opening the aperture of visibility to the reconnaissance stage of the attack lifecycle. By understanding the assets and data that are vulnerable, when your organization is being targeted, and the tactics, techniques, and procedures that will most likely be used in an attack, you can be better prepared when the attack occurs.

What are the components of Google’s digital risk protection solution?

Digital risk protection from Google is made up of SaaS products and services. The SaaS products include Threat Intelligence - understand the threat actors and their TTPs, Attack Surface Management - discover and analyze your internet assets for exploitable exposures, and Digital Threat Monitoring - visibility into the open, deep, and dark web. Cyber Threat Profile services are designed to provide a composite picture of the most relevant threats to your organization at a strategic, operational, or tactical level.

How It Works

Digital risk protection enables you to be more proactive in your security approach by opening the aperture of visibility to the reconnaissance stage of the attack lifecycle. By understanding the assets and data that are vulnerable, when your organization is being targeted, and the tactics, techniques, and procedures that will most likely be used in an attack, you can be better prepared when the attack occurs.

Common Uses

Broad visibility

Visibility into external exposure and targeting

Gain visibility into risk factors impacting the extended enterprise and supply chain by mapping your attack surface and monitoring deep and dark web activity.

Use knowledge from Threat Intelligence to know where to look across the web for malicious chatter and targeting.

Identify unknown or unmanaged vulnerable internet-facing assets before threat actors do.

Where are you exposed?

    Visibility into external exposure and targeting

    Gain visibility into risk factors impacting the extended enterprise and supply chain by mapping your attack surface and monitoring deep and dark web activity.

    Use knowledge from Threat Intelligence to know where to look across the web for malicious chatter and targeting.

    Identify unknown or unmanaged vulnerable internet-facing assets before threat actors do.

    Where are you exposed?

      Know them as well as they know you

      Threat analysis and risk identification

      Know who is targeting you, what they are targeting, and how they are planning to compromise you.

      Whether you prefer a self-managed solution or want to hand it over to our team to provide you with answers, Google's digital risk protection solution will help you understand the threats and how to prepare.

      Find out who’s targeting you.

        Threat analysis and risk identification

        Know who is targeting you, what they are targeting, and how they are planning to compromise you.

        Whether you prefer a self-managed solution or want to hand it over to our team to provide you with answers, Google's digital risk protection solution will help you understand the threats and how to prepare.

        Find out who’s targeting you.

          Threat intelligence directly from the frontlines

          Cyber threat intelligence driven prioritization 

          Leverage nation-state grade threat intelligence to prioritize investments and eliminate guesswork.

          Google is a leader in the Forrester WaveTM: External Threat Intelligence Service Providers, Q3 2023. You can be confident in Google's data, information, and intelligence.

          By understanding threat actor methods and tools you can prioritize your defensive adjustments.

          Know who’s targeting you.

            Cyber threat intelligence driven prioritization 

            Leverage nation-state grade threat intelligence to prioritize investments and eliminate guesswork.

            Google is a leader in the Forrester WaveTM: External Threat Intelligence Service Providers, Q3 2023. You can be confident in Google's data, information, and intelligence.

            By understanding threat actor methods and tools you can prioritize your defensive adjustments.

            Know who’s targeting you.

              Focus on what’s most important to mitigate digital risk

              Learn more about digital risk protection from Google

              Leverage our expertise, be better prepared

              Who’s targeting you?

              Where are you exposed?

              Go beyond DRP with proactive exposure management

              Google Cloud
              • ‪English‬
              • ‪Deutsch‬
              • ‪Español‬
              • ‪Español (Latinoamérica)‬
              • ‪Français‬
              • ‪Indonesia‬
              • ‪Italiano‬
              • ‪Português (Brasil)‬
              • ‪简体中文‬
              • ‪繁體中文‬
              • ‪日本語‬
              • ‪한국어‬
              Console
              Google Cloud