Google Cloud Platform1.17 млн
Следующее
Опубликовано 15 сентября 2020, 16:02
As you move to Google Cloud, you need to be able to see the resources you’ve deployed and understand your security posture including the vulnerabilities and threats present, and be able to act on them before they can result in damage or loss. Cloud Security Command Center (Cloud SCC) gives you visibility across your organization and helps you prevent, detect, and respond to threats in your Google Cloud environment.
See a demonstration on how to catch web application vulnerabilities before they hit production, identify compliance violations and misconfigurations in Google Cloud resources, and take action to respond and remediate.
In addition to helping you reduce your exposure, see how you can benefit from the techniques we’ve developed to defend Google. Google’s unique threat intelligence can detect costly and high-risk threats targeting your cloud resources using logs and then send incidents to your SIEM (Security Information and Event Management system) for further investigation. It also helps you detect potential compromises in virtual machines, containers, and more.
Learn how you can quickly respond to threats and vulnerabilities by following actionable recommendations, creating custom alerts, sending findings to Cloud Pub/Sub and Cloud Functions, or enabling automation to reduce time to resolution. Veolia has leveraged and integrated these capabilities into their end-to-end security workflow to help them stay in control of their security on Google Cloud.
Speakers: Andy Chang, Kyle Olive
Watch more:
Google Cloud Next ’20: OnAir → goo.gle/next2020
Subscribe to the GCP Channel → goo.gle/GCP
#GoogleCloudNext
SEC212
product: Security Command Center; fullname: Andy Chang, Kyle Olive;
event: Google Cloud Next 2020; re_ty: Publish; product: Cloud - General; fullname: Andy Chang, Kyle Olive; event: Google Cloud Next 2020;
See a demonstration on how to catch web application vulnerabilities before they hit production, identify compliance violations and misconfigurations in Google Cloud resources, and take action to respond and remediate.
In addition to helping you reduce your exposure, see how you can benefit from the techniques we’ve developed to defend Google. Google’s unique threat intelligence can detect costly and high-risk threats targeting your cloud resources using logs and then send incidents to your SIEM (Security Information and Event Management system) for further investigation. It also helps you detect potential compromises in virtual machines, containers, and more.
Learn how you can quickly respond to threats and vulnerabilities by following actionable recommendations, creating custom alerts, sending findings to Cloud Pub/Sub and Cloud Functions, or enabling automation to reduce time to resolution. Veolia has leveraged and integrated these capabilities into their end-to-end security workflow to help them stay in control of their security on Google Cloud.
Speakers: Andy Chang, Kyle Olive
Watch more:
Google Cloud Next ’20: OnAir → goo.gle/next2020
Subscribe to the GCP Channel → goo.gle/GCP
#GoogleCloudNext
SEC212
product: Security Command Center; fullname: Andy Chang, Kyle Olive;
event: Google Cloud Next 2020; re_ty: Publish; product: Cloud - General; fullname: Andy Chang, Kyle Olive; event: Google Cloud Next 2020;
Свежие видео