3 new security services from Google Cloud
- ConsenSys and AMD develop blockchain-based cloud computing infrastructure
- Google Drive, Apple iCloud and Dropbox: Which is the best cloud storage?
- Benefits of ERP technology in cloud computing
- 5 reasons why enterprises should use cloud computing
- The combination of cloud computing and virtual private network
- Microsoft arrangements to utilize ARM chips for cloud computing
- Cloud computing - A simple explanation
- Adobe earns big on 'the cloud'
- New Window Server: Breakthrough on cloud security (Part 2)
- New Window Server: Breakthrough on cloud security (Part 1)
Today, businesses face a complex and dangerous environment from the Internet. Hacker attacks network users, while sensitive information and communication are growing in scale. Organizations and businesses need advanced security, which is easy to deploy and manage to help protect them against these threats.
Google Cloud continuously enhances the creativity for users on the cloud platform and even for organizations and businesses that cannot run all the workload on the cloud storage platform. So, how to simplify security process and protect yourself from information risks? Here are 3 new security services from Google Cloud for its customers.
1. Web Risk API
The beta version of Web Risk API is a new service designed to protect users on the web. With a simple API, the app can check URLs based on Google's unsafe web list. With Web Risk API, you can quickly identify known bad sites, warning users before they click on links in your site that can lead to infected pages and prevent users from posting links to known malicious pages (for example adding malicious URLs to comments) in your site.
Web Risk API contains data of more than a million unsafe URLs that Google always updates by checking billions of URLs every day, provided by the same technology that underpins Google Safe Browsing. Securing web browsing works on Google products help protect more than three billion devices every day on the Internet. Google's secure web groups, products, and security operations are at the forefront of security and technology research to build systems to protect people from harm and now, Web Risk API allows businesses to use this technology to protect their users.
2. Cloud Armor
Running services or applications on the internet, it is difficult when you must quickly serve traffic to end users, while protecting yourself against attacks that reduce the ability of your website. Cloud Armor is a web-based firewall app fighting against DDoS, which uses WAF service for Google Cloud Platform (GCP) based on the same global technologies and infrastructure that Google uses to protect their services like Google Search, Gmail and YouTube.
Cloud Armor's user interface with built-in monitoring service makes it easy to control and analyze traffic and allows network administrators or engineering teams responsible for information security to understand the effectiveness of security policies. In addition, users can now assess the potential impact of the proposed rules in preview mode on the entire infrastructure or project. In addition, it allows users to go further to details of other privacy policies or services.
3. Cloud HSM
Sensitive data protection is a top priority for businesses and organizations, especially for those with high security and compliance standards such as financial services. Encryption is the core of addressing this challenge and therefore these agencies should implement hardware security modules (HSM) to add additional layers of security for operations.
Cloud HSM offers easy management capabilities, helping users to use the hardware encryption module simply. Cloud HSM currently only supports users in the US and some areas in Europe, and will soon be available in other regions. With outstanding features, users will be able take advantage of advanced security capabilities to easily use, deploy and store data on the cloud.
By: Brian Miller