{"id":18185,"date":"2024-03-22T10:37:39","date_gmt":"2024-03-22T03:37:39","guid":{"rendered":"https:\/\/gcloudvn.com\/?p=18185"},"modified":"2024-07-31T10:09:27","modified_gmt":"2024-07-31T03:09:27","slug":"introducing-security-command-center-enterprise","status":"publish","type":"post","link":"https:\/\/gcloudvn.com\/en\/ban-tin\/introducing-security-command-center-enterprise\/","title":{"rendered":"Gi\u1edbi thi\u1ec7u gi\u1ea3i ph\u00e1p qu\u1ea3n l\u00fd r\u1ee7i ro MultiCloud &#8211; Google Cloud Security Command Center Enterprise"},"content":{"rendered":"<section class=\"wpb-content-wrapper\"><div class=\"vc_row wpb_row vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_80 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewbox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewbox=\"0 0 24 24\" version=\"1.2\" baseprofile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/gcloudvn.com\/en\/ban-tin\/introducing-security-command-center-enterprise\/#Duoc_xay_dung_dua_tren_nen_tang_bao_mat_cua_Google_va_duoc_nang_cao_nho_cong_nghe_thong_tin_ve_cac_moi_de_doa_cua_Mandiant\" >Built on Google security fabric, and supercharged by Mandiant\u2019s world-class threat intelligence.<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/gcloudvn.com\/en\/ban-tin\/introducing-security-command-center-enterprise\/#Hop_nhat_bao_mat_cloud_va_hoat_dong_bao_mat_doanh_nghiep\" >Converging cloud security and enterprise security operations<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/gcloudvn.com\/en\/ban-tin\/introducing-security-command-center-enterprise\/#Duoc_xay_dung_tren_nen_tang_bao_mat_Google\" >Powered by Google security fabric<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/gcloudvn.com\/en\/ban-tin\/introducing-security-command-center-enterprise\/#Tich_hop_voi_cong_nghe_on-demand_Mandiant\" >Intergate on-demand Mandiant<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/gcloudvn.com\/en\/ban-tin\/introducing-security-command-center-enterprise\/#Duoc_thiet_ke_de_hoat_dong_trong_cac_moi_truong_multicloud\" >Designed for multicloud environments.<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Duoc_xay_dung_dua_tren_nen_tang_bao_mat_cua_Google_va_duoc_nang_cao_nho_cong_nghe_thong_tin_ve_cac_moi_de_doa_cua_Mandiant\"><\/span><b>Built on Google security fabric, and supercharged by Mandiant\u2019s world-class threat intelligence.<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">The stakes have never been higher for managing cloud risks. With organizations of every size and in every industry pursuing cloud-first strategies, the cloud is now home to their most critical applications and data. Adversaries have picked up on this ongoing shift, too: APT groups known for regularly targeting corporate and government organizations are increasingly focused on attacking cloud infrastructure.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The current generation of cloud-native application protection platforms (CNAPPs) have helped reduce the number of point products used for multicloud security. However, they often remain stubbornly disconnected from broader security operations capabilities, where best-in-class solutions provide comprehensive visibility into risks and threats, and place just as much attention on efficient remediation of those risks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To help our customers manage and mitigate risk in their multicloud environments, Google Cloud is announcing Security Command Center Enterprise, the industry\u2019s first cloud risk management solution that fuses proactive cloud security and enterprise security operations \u2014 supercharged by Mandiant expertise.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Built on our Google security fabric, Security Command Center Enterprise can help to break down the silos of tools, teams, and data that separate cloud security and enterprise security operations. It prioritizes cloud risk management by integrating the critical response capabilities of modern SecOps with threat intelligence from Mandiant, so organizations can identify high-risk issues and drive accountability for keeping their multicloud environments safe.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">CNAPPs are evolving to integrate more tightly with security operations. According to a Gartner\u00ae report written by analysts Neil MacDonald, Charlie Winckless, and Dale Koepen, \u201cCNAPPs address the full life cycle protection requirements of cloud-native applications from development to production.\u201d1 Gartner further asserts that \u201cCNAPP vendors with threat research teams will help uncover cloud-specific vulnerabilities and risks and serve as a differentiation. The ownership will evolve between the SOC team and the cloud security team that is gaining influence for hybrid enterprises.\u201d<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Hop_nhat_bao_mat_cloud_va_hoat_dong_bao_mat_doanh_nghiep\"><\/span><b>Converging cloud security and enterprise security operations<\/b><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Our new solution can help organizations imagine a new reality, one where SIEM-powered visibility and SOAR-driven actionability is now brought into the world of cloud security. Security teams can get a single view of their posture controls, active threats, cloud identities, data, and more, while integrating remediation and issue accountability into the end-to-end workflows of a converged cloud risk management platform.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\"Google security solutions can help our clients fortify their cyber defenses and protect their digital businesses.\u201d said Upen Sachdev, Google Cloud Cyber Alliance leader and Deloitte Risk &amp; Financial Advisory principal, Deloitte &amp; Touche LLP. \u201cSecurity Command Center Enterprise is designed to dismantle the operational silos that interfere with better cloud risk management by converging modern SecOps and leading cloud security.\"<\/span><\/p>\n<p><b><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-18187\" src=\"https:\/\/gcloudvn.com\/wp-content\/uploads\/2024\/03\/Anh-chup-Man-hinh-2024-03-21-luc-11.09.07.png\" alt=\"\" width=\"1010\" height=\"814\" srcset=\"https:\/\/gcloudvn.com\/wp-content\/uploads\/2024\/03\/Anh-chup-Man-hinh-2024-03-21-luc-11.09.07.png 1010w, https:\/\/gcloudvn.com\/wp-content\/uploads\/2024\/03\/Anh-chup-Man-hinh-2024-03-21-luc-11.09.07-768x619.png 768w, https:\/\/gcloudvn.com\/wp-content\/uploads\/2024\/03\/Anh-chup-Man-hinh-2024-03-21-luc-11.09.07-15x12.png 15w\" sizes=\"auto, (max-width: 1010px) 100vw, 1010px\" \/><\/b><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Duoc_xay_dung_tren_nen_tang_bao_mat_Google\"><\/span><b>Powered by Google security fabric<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Security Command Center Enterprise is powered by Google\u2019s security fabric, which incorporates a planet-scale data lake that ingests and analyzes the volume of cloud data needed to build dynamic security graphs and to understand the complex relationships in multicloud environments. It integrates threat intelligence from Mandiant to automatically help identify and defend against new and novel attacks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Tr\u00ed tu\u1ec7 nh\u00e2n t\u1ea1o t\u1ed5ng h\u1ee3p (Generative AI) c\u0169ng \u0111\u01b0\u1ee3c t\u00edch h\u1ee3p \u0111\u1ec3 \u0111\u01a1n gi\u1ea3n h\u00f3a v\u00f2ng \u0111\u1eddi b\u1ea3o m\u1eadt cloud cho c\u1ea3 chuy\u00ean gia v\u00e0 ng\u01b0\u1eddi d\u00f9ng \u00edt kinh nghi\u1ec7m, t\u1eeb vi\u1ec7c x\u00e1c \u0111\u1ecbnh v\u00e0 hi\u1ec3u ban \u0111\u1ea7u c\u00e1c v\u1ea5n \u0111\u1ec1 b\u1ea3o m\u1eadt ph\u1ee9c t\u1ea1p \u0111\u1ebfn qu\u00e1 tr\u00ecnh \u0111i\u1ec1u tra v\u00e0 kh\u1eafc ph\u1ee5c \u0111\u01b0\u1ee3c h\u01b0\u1edbng d\u1eabn.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Integral to our security fabric is a continuous risk engine that constructs a digital twin model of the cloud environment, developing an in-depth understanding of complex cloud relationships. It then plays the role of a sophisticated and motivated attacker to predict where an attacker could strike, what cloud resources would be exposed, and the possible blast radius of a successful attack.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Easy-to-interpret attack path visualizations and detailed risk scoring give reactive security teams the proactive insight they need to stay ahead of adversaries. Additionally, the dynamic discovery of toxic combinations that lead to high-risk exposures, specific to each cloud environment, is a material step beyond the use of basic fixed rules that treat all clouds the same.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">You can see <\/span><a href=\"https:\/\/www.youtube.com\/watch?v=XK3ZmdfGWjw&amp;list=PLIivdWyY5sqKd-Cu1HZ7v5RiYE8gVsM7P\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">demo<\/span><\/a><span style=\"font-weight: 400;\"> to see Security Command Center Enterprise in action.<\/span><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Tich_hop_voi_cong_nghe_on-demand_Mandiant\"><\/span><b>Intergate on-demand Mandiant<\/b><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Security Command Center Enterprise integrates Mandiant Hunt, offering on-demand human expertise that can become an extension of internal security operations teams. It makes hundreds of elite-level analysts and researchers available on-call to proactively find elusive threats that evade traditional mechanisms. It can help to close the skills gap, too, reducing the need for hiring expensive talent and investments in specialized tooling.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Security Command Center Enterprise is built on the same underlying technology platform that delivers our modern Security Operations capabilities, putting Google scale and speed to work protecting our customers\u2019 multicloud environments. Vulnerabilities, misconfigurations, and threats are analyzed and assigned to cases for analysts to investigate and attach to out-of-the-box playbooks for prevention and remediation. Bringing together security and SecOps teams empowers more professionals, with broader skill sets, to directly act on issues that impact cloud risk.<\/span><\/p>\n<p><b><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-18190\" src=\"https:\/\/gcloudvn.com\/wp-content\/uploads\/2024\/03\/x12.jpg\" alt=\"\" width=\"600\" height=\"438\" srcset=\"https:\/\/gcloudvn.com\/wp-content\/uploads\/2024\/03\/x12.jpg 600w, https:\/\/gcloudvn.com\/wp-content\/uploads\/2024\/03\/x12-16x12.jpg 16w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/b><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Duoc_thiet_ke_de_hoat_dong_trong_cac_moi_truong_multicloud\"><\/span><b>Designed for multicloud environments.<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Security Command Center protects thousands of Google Cloud customers today. Our new solution builds on this product foundation, with an expanded set of capabilities to secure our customers\u2019 Google Cloud, Amazon Web Services, and Microsoft Azure environments. Capabilities include:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Agentless and agent-based vulnerability management for finding security weaknesses in virtual machines, containers, and more;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Security posture management to uncover cloud misconfigurations that could create to gaps in defenses;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Threat detection using specialized technology built into the cloud infrastructure, and threat rules and indicators of compromise (IOCs) curated by Mandiant incident response teams and threat researchers;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Integrated response workflows to efficiently remediate threats, misconfigurations, and vulnerabilities;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Attack path visualization for understanding resource relationships and methods that attackers could use to infiltrate your environment;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Posture and governance controls giving DevOps and DevSecOps teams the ability to design and monitor security guardrails for their cloud infrastructure<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Google-recommended preventative and detective security controls designed for AI workloads<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Cloud Identity and Entitlement Management (CIEM) for managing identities and privileges to help organizations move to a least-privileged access security model;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Data security posture management (DSPM) for finding, categorizing, and managing sensitive data in cloud environments;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">And shift-left security capabilities for discovering issues before runtime. These include our Assured Open Source Software, that can provide developers with access to thousands of software packages tested and validated by Google, and infrastructure as code (IaC) scans of files and CI\/CD pipelines to help identify resource violations.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">\u201cWe\u2019re helping organizations build more resilient cybersecurity programs by combining Accenture and Google Cloud\u2019s expertise,\" said Rex Thexton, CTO and cyber protect lead, Accenture Security. \u201cSecurity Command Center Enterprise will enable us to help protect our clients\u2019 cloud deployments, bringing the scale, speed, and effectiveness we get from Google\u2019s Security Operations platform, enhanced with Mandiant threat intelligence and Google\u2019s AI.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cIn testing Google\u2019s Security Command Center Enterprise, our PwC team was impressed with its capabilities,\u201d said Prakash Venkata, principal at PwC. \u201cAs our clients continue to reinvent their businesses in the cloud, their cloud security should expand accordingly. That\u2019s why we\u2019re excited to bring this product to market together, as Google\u2019s solution is critical to helping our joint customers effectively mitigate risks in their multi-cloud environments.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Security Command Center Enterprise is expected to be generally available in the coming weeks via subscription, with simple cloud workload-based pricing. Existing Security Command Center Premium subscription customers can upgrade to the new solution for enhanced protection of their Google Cloud environment at no additional cost for their current subscription.<\/span><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"templatera_shortcode\"><div class=\"vc_row wpb_row vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vc_message_box vc_message_box-standard vc_message_box-rounded vc_color-blue\" ><div class=\"vc_message_box-icon\"><i class=\"vc-mono vc-mono-technorati\"><\/i><\/div><p><a href=\"https:\/\/gcloudvn.com\/en\/main-logo-1\/\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-664\" src=\"https:\/\/gcloudvn.com\/wp-content\/uploads\/2021\/06\/main-logo-1.png\" alt=\"\" width=\"221\" height=\"72\" srcset=\"https:\/\/gcloudvn.com\/wp-content\/uploads\/2021\/06\/main-logo-1.png 214w, https:\/\/gcloudvn.com\/wp-content\/uploads\/2021\/06\/main-logo-1-18x6.png 18w, https:\/\/gcloudvn.com\/wp-content\/uploads\/2021\/06\/main-logo-1-183x60.png 183w\" sizes=\"auto, (max-width: 221px) 100vw, 221px\" \/><\/a>As a senior partner of Google in Vietnam, Gimasys has more than 10+ years of experience, consulting on implementing digital transformation for 2000+ domestic corporations. Some typical customers Jetstar, Dien Quan Media, Heineken, Jollibee, Vietnam Airline, HSC, SSI...<\/p>\n<p>Gimasys is currently a strategic partner of many major technology companies in the world such as Salesforce, Oracle Netsuite, Tableau, Mulesoft.<\/p>\n<p>Contact Gimasys - Google Cloud Premier Partner for advice on strategic solutions suitable to the specific needs of your business:<\/p>\n<ul>\n<li>Email: gcp@gimasys.com<\/li>\n<li>Hotline: 0974 417 099<\/li>\n<\/ul>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<\/section>","protected":false},"excerpt":{"rendered":"\u0110\u01b0\u1ee3c x\u00e2y d\u1ef1ng d\u1ef1a tr\u00ean n\u1ec1n t\u1ea3ng b\u1ea3o m\u1eadt c\u1ee7a Google v\u00e0 \u0111\u01b0\u1ee3c n\u00e2ng cao nh\u1edd c\u00f4ng ngh\u1ec7 th\u00f4ng tin v\u1ec1 c\u00e1c m\u1ed1i \u0111e d\u1ecda c\u1ee7a Mandiant. Vi\u1ec7c qu\u1ea3n l\u00fd r\u1ee7i ro tr\u00ean cloud ch\u01b0a bao gi\u1edd quan tr\u1ecdng \u0111\u1ebfn&hellip;","protected":false},"author":2,"featured_media":18202,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[134],"tags":[],"class_list":["post-18185","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-google-workspace","entry","has-media"],"_links":{"self":[{"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/posts\/18185","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/comments?post=18185"}],"version-history":[{"count":0,"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/posts\/18185\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/media\/18202"}],"wp:attachment":[{"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/media?parent=18185"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/categories?post=18185"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/tags?post=18185"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}