Next Google’s acquisition of cybersecurity groups Siemplify and Mandiant, the US tech large has sought to carry all of its cloud capabilities below one particular roof with the launch of Chronicle Security Operations.
Google’s Cloud Up coming division unveiled the cloud-born program suite on October 11, 2022, which it explained can “better enable cybersecurity teams to detect, examine, and respond to threats with the velocity, scale, and intelligence of Google.”
Google procured Israeli security startup Siemplify in early 2022 for $500m and closed its $5.4bn acquisition of Mandiant in September.

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.
Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).
➤ Activate Your Coupon Code
Going forward, all security functions computer software will arrive beneath the Chronicle brand, Google reported.
Chronicle Security Functions “unifies Chronicle’s security data and event administration (SIEM) tech, with the security orchestration, automation, and reaction (SOAR) alternatives from our Siemplify acquisition and danger intelligence from Google Cloud.”
The Mandiant acquisition will increase much more incident and exposure management and menace intelligence abilities in the long run, in accordance to Google.
The Siemplify manufacturer will be changed with Chronicle SOAR, and security analytics abilities of the suite will be named Chronicle SIEM. Google says the “feel and look” of the SIEM and SOAR abilities will be unified to provide an integrated person practical experience.
Chronicle Security Operations will leverage Google Cloud’s details.
Also, on October 11, the enterprise highlighted new Google Cloud databases capabilities which targeted on 4 key areas: unified and integrated knowledge cloud for transactional and analytical knowledge breaking free of charge from legacy databases and a dedication to open up ecosystems and standards infusing AI and equipment understanding throughout facts-pushed workflows empowering builders to be additional successful and impactful.
Some areas of this article are sourced from:
www.infosecurity-journal.com