{"id":6532,"date":"2020-08-21T09:18:51","date_gmt":"2020-08-21T02:18:51","guid":{"rendered":"http:\/\/gcloudvn.wam.vn\/google-chia-se-cach-giup-doanh-nghiep-hien-dai-hoa-bao-mat-tren-cloud\/"},"modified":"2023-04-18T09:04:08","modified_gmt":"2023-04-18T02:04:08","slug":"google-chia-se-cach-giup-doanh-nghiep-hien-dai-hoa-bao-mat-tren-cloud","status":"publish","type":"post","link":"https:\/\/gcloudvn.com\/en\/kienthuc\/google-chia-se-cach-giup-doanh-nghiep-hien-dai-hoa-bao-mat-tren-cloud\/","title":{"rendered":"Google shares how to help businesses modernize security on the Cloud"},"content":{"rendered":"<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">During the first few months of the COVID-19 pandemic, many organizations&#039; digital transformation efforts are expected to slow down. Instead, Google sees many businesses accelerate their adoption of Cloud-based services to help them manage and address emerging priorities in the new normal, including workforce allocation and New digital strategy.<\/span><\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_80 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewbox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewbox=\"0 0 24 24\" version=\"1.2\" baseprofile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/gcloudvn.com\/en\/kienthuc\/google-chia-se-cach-giup-doanh-nghiep-hien-dai-hoa-bao-mat-tren-cloud\/#Cac_cong_cu_bao_mat_nang_cao_de_dam_bao_tuan_thu_quy_tac_va_bao_mat_du_lieu\" >Advanced security tools to ensure rule compliance and data security<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/gcloudvn.com\/en\/kienthuc\/google-chia-se-cach-giup-doanh-nghiep-hien-dai-hoa-bao-mat-tren-cloud\/#Dua_tren_nen_tang_dam_may_quan_ly_CA_cho_the_gioi_Devops_va_IoT\" >Cloud-based, CA management for Devops and IoT world<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/gcloudvn.com\/en\/kienthuc\/google-chia-se-cach-giup-doanh-nghiep-hien-dai-hoa-bao-mat-tren-cloud\/#Mot_tam_kinh_duy_nhat_vao_tinh_hinh_an_ninh_cua_ban\" >A single pane of glass into your security situation\u00a0<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/gcloudvn.com\/en\/kienthuc\/google-chia-se-cach-giup-doanh-nghiep-hien-dai-hoa-bao-mat-tren-cloud\/#Cong_tac_voi_cac_doi_tac_ve_dieu_phoi_va_diem_cuoi\" >Collaborate with endpoint and orchestration partners<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/gcloudvn.com\/en\/kienthuc\/google-chia-se-cach-giup-doanh-nghiep-hien-dai-hoa-bao-mat-tren-cloud\/#Don_gian_hoa_viec_bao_ve_chong_lai_DDoS_va_cac_cuoc_tan_cong_web\" >Simplify protection against DDoS and web attacks<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/gcloudvn.com\/en\/kienthuc\/google-chia-se-cach-giup-doanh-nghiep-hien-dai-hoa-bao-mat-tren-cloud\/#Tu_dong_hoa_trien_khai_an_toan_hon_voi_ban_thiet_ke\" >Automate safer deployments with blueprints<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/gcloudvn.com\/en\/kienthuc\/google-chia-se-cach-giup-doanh-nghiep-hien-dai-hoa-bao-mat-tren-cloud\/#Mot_trang_thai_binh_thuong_tot_hon_an_toan_hon_di_cung_nhau\" >A better, safer normal go together\u00a0<\/a><\/li><\/ul><\/nav><\/div>\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Cac_cong_cu_bao_mat_nang_cao_de_dam_bao_tuan_thu_quy_tac_va_bao_mat_du_lieu\"><\/span><b>Advanced security tools to ensure rule compliance and data security<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">An increasing number of companies, especially those in highly regulated industries, want to adopt the latest cloud technologies, but they often encounter roadblocks due to regulatory compliance requirements or permissions. Strict data privacy. Last month, Google introduced two new capabilities that help businesses securely leverage all that the cloud has to offer while simplifying security operations.\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Guaranteed Government Workloads, currently in private beta, allows those in regulated industries such as publicly configuring regions and deploying sensitive workloads to regulatory requirements. their security and compliance \u2014 in just a few clicks. Unlike the traditional \u201cgovernment cloud,\u201d Guaranteed Workloads remove the trade-off between meeting compliance requirements and having the latest capabilities in your cloud.<\/span><\/p>\n<figure id=\"attachment_16400\" aria-describedby=\"caption-attachment-16400\" style=\"width: 791px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-16400\" src=\"https:\/\/gcloudvn.com\/wp-content\/uploads\/2020\/08\/news-8-1024x754.png\" alt=\"Configuring a new workload in Assured Workloads for Government\" width=\"791\" height=\"582\" \/><figcaption id=\"caption-attachment-16400\" class=\"wp-caption-text\"><em>Configuring a new workload in Assured Workloads for Government<\/em><\/figcaption><\/figure>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Confidential VMs, the first in Google&#039;s Confidential Computing portfolio, help you protect your sensitive data in the cloud. Encrypted data is at rest and in transit, but traditionally, customer data has to be decrypted for processing.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Confidential Computing is a breakthrough technology that encrypts data in use \u2014 while it is being processed. Confidential VMs take this technology to the next level by providing in-memory encryption so you can keep your workloads isolated in the cloud. With the beta launch of Confidential VMs, Google is the first major cloud provider to offer this level of security and isolation, while giving you a simple, easy-to-use option for your applications. newly built and your &quot;lift and move&quot;.<\/span><\/p>\n<figure id=\"attachment_16401\" aria-describedby=\"caption-attachment-16401\" style=\"width: 720px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-16401\" src=\"https:\/\/gcloudvn.com\/wp-content\/uploads\/2020\/08\/news-9.gif\" alt=\"Confidential VMs demo\" width=\"720\" height=\"405\" \/><figcaption id=\"caption-attachment-16401\" class=\"wp-caption-text\"><em>Confidential VMs demo<\/em><\/figcaption><\/figure>\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Dua_tren_nen_tang_dam_may_quan_ly_CA_cho_the_gioi_Devops_va_IoT\"><\/span><strong>Cloud-based, CA management for Devops and IoT world<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Recently, many enterprises are interested in using Public Key Infrastructure (PKI) in DevOps and IoT device management. But one fundamental problem with PKI remains: it&#039;s hard to set up Certificate Authorities (CAs), it&#039;s even harder to do it reliably at scale. These issues are at the heart of these growing use cases.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">To help, Google announces beta availability <\/span><a href=\"https:\/\/cloud.google.com\/blog\/products\/identity-security\/introducing-cas-a-cloud-based-managed-ca-for-the-devops-and-iot-world\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">Certificate Authority Service (CAS)<\/span><\/a><span style=\"font-weight: 400;\"> of Google Cloud\u2014a highly scalable and out-of-the-box service that simplifies and automates the management and deployment of private CAs and meets the needs of modern developers and applications. With CAS, you can offload the time-consuming cloud tasks associated with running a private CA, such as hardware provisioning, infrastructure security, software deployment, availability configuration Advanced, disaster recovery, backups, etc., allow you to set up a private CA in minutes, instead of months that can normally take to deploy.\u00a0<\/span><\/p>\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Mot_tam_kinh_duy_nhat_vao_tinh_hinh_an_ninh_cua_ban\"><\/span><strong>A single pane of glass into your security situation\u00a0<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Protecting your users, data, and applications while remaining compliant can be a challenge. Add to that the need for remote workforce management and increased complexity. With <\/span><span style=\"font-weight: 400;\">Cloud <\/span><span style=\"font-weight: 400;\">Security Command Center<\/span><span style=\"font-weight: 400;\"> (SCC)<\/span><span style=\"font-weight: 400;\">, Google&#039;s own management platform, you can prevent and detect abuse of your cloud resources, centralizing security findings from Google&#039;s services. <a href=\"https:\/\/gcloudvn.com\/en\/google-cloud-platform\/\">Google Cloud<\/a> and partner products, and detect common misconfigurations, all in one easy-to-use platform.\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Recently, Google announced the Premium tier for Security Command Center to provide even more tools to protect your cloud resources. It adds new capabilities that allow you to:\u00a0<\/span><\/p>\n<ul style=\"text-align: justify;\">\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Detect threats using Google intelligence for (GCP) logs and containers<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Large collection surface of misconfigurations\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Perform compliance scans and reports automatically<\/span><\/li>\n<\/ul>\n<figure id=\"attachment_16404\" aria-describedby=\"caption-attachment-16404\" style=\"width: 726px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-16404\" src=\"https:\/\/gcloudvn.com\/wp-content\/uploads\/2020\/08\/news-10-1024x791.jpg\" alt=\"Report on CIS Benchmarks in the SCC dashboard\u00a0\" width=\"726\" height=\"562\" \/><figcaption id=\"caption-attachment-16404\" class=\"wp-caption-text\"><em>Report on CIS Benchmarks in the SCC dashboard\u00a0<\/em><\/figcaption><\/figure>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">These features help you understand your risk on Google Cloud, verify that you&#039;ve configured your resources properly and securely, and document it for anyone who requests it.\u00a0<\/span><\/p>\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Cong_tac_voi_cac_doi_tac_ve_dieu_phoi_va_diem_cuoi\"><\/span><strong>Collaborate with endpoint and orchestration partners<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">As part of its mission to enhance operational simplicity and security, Google is committed to working with its security partners to help you on this journey. This week, Google will be announcing new integrations and marketing activities with Palo Alto Networks on their xSOAR Marketplace.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Additionally, Google announced an expanded partnership with Tanium, which is integrating and delivering Chronicle with their endpoint security and management solution. This integrated solution, sold by Tanium, links endpoint data from Tanium with other telemetry, such as DNS and proxy data in Chronicle, to provide a broader, clearer picture of relationships threats in business. By default, Chronicle retains Tanium telemetry for one year, improving your ability to investigate incidents in the long run.<\/span><\/p>\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Don_gian_hoa_viec_bao_ve_chong_lai_DDoS_va_cac_cuoc_tan_cong_web\"><\/span><strong>Simplify protection against DDoS and web attacks<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Google<\/span><span style=\"font-weight: 400;\"> is simplifying how you can use Google Cloud Armor to help protect your websites and apps from exploit attempts, as well as distributed denial of service (DDoS) attacks. With Cloud Armor Managed Protection Plus (in Beta) you get access to DDoS and WAF services, managed rule sets, and other services at predictable monthly rates. <\/span><\/p>\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Tu_dong_hoa_trien_khai_an_toan_hon_voi_ban_thiet_ke\"><\/span><strong>Automate safer deployments with blueprints<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">While these new products offer real benefits, you also need to configure your cloud deployment to meet your own unique security and compliance requirements. Google will publish a comprehensive design of the new Google Cloud security platform, providing selected guidance, effort, and accompanying automation to help build a secure starting point for Google Cloud deployment. It will launch as the foundation of the Google Cloud security best practices resource center, a new web destination that delivers world-class security expertise from Google and its partners in the form of security blueprints, manuals, books, etc.<\/span><\/p>\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Mot_trang_thai_binh_thuong_tot_hon_an_toan_hon_di_cung_nhau\"><\/span><strong>A better, safer normal go together\u00a0<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Protecting your business requires constant growth, and events so far in 2020 have made that even more apparent. With compliance automation, simpler security operations, and better protection for employees and customers, Google is committed to helping businesses adjust and evolve to make today&#039;s new normal the normal. usually safer.<\/span><\/p>\n<p style=\"text-align: right;\"><strong>Source: <a href=\"https:\/\/gcloudvn.com\/en\/\">Gimasys<\/a><\/strong><\/p>","protected":false},"excerpt":{"rendered":"<p>Trong v\u00e0i th\u00e1ng \u0111\u1ea7u ti\u00ean c\u1ee7a \u0111\u1ea1i d\u1ecbch COVID-19, khi\u1ebfn n\u1ed7 l\u1ef1c chuy\u1ec3n \u0111\u1ed5i s\u1ed1 c\u1ee7a nhi\u1ec1u t\u1ed5 ch\u1ee9c d\u1ef1 ki\u1ebfn s\u1ebd ch\u1eadm l\u1ea1i. Thay v\u00e0o \u0111\u00f3, Google th\u1ea5y nhi\u1ec1u doanh nghi\u1ec7p \u0111\u1ea9y nhanh vi\u1ec7c s\u1eed d\u1ee5ng c\u00e1c d\u1ecbch v\u1ee5&hellip;<\/p>","protected":false},"author":1,"featured_media":6533,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-6532","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kienthuc","entry","has-media"],"_links":{"self":[{"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/posts\/6532","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/comments?post=6532"}],"version-history":[{"count":0,"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/posts\/6532\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/media\/6533"}],"wp:attachment":[{"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/media?parent=6532"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/categories?post=6532"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/tags?post=6532"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}