{"id":2623,"date":"2018-04-17T13:22:05","date_gmt":"2018-04-17T13:22:05","guid":{"rendered":"https:\/\/devbloglavaprotocols.nityo.in\/new-ways-to-secure-businesses-in-the-cloud\/"},"modified":"2018-04-17T13:22:05","modified_gmt":"2018-04-17T13:22:05","slug":"new-ways-to-secure-businesses-in-the-cloud","status":"publish","type":"post","link":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/new-ways-to-secure-businesses-in-the-cloud\/","title":{"rendered":"New Ways To Secure Businesses In The Cloud"},"content":{"rendered":"<div style=\"margin-top: 0px; margin-bottom: 0px;\" class=\"sharethis-inline-share-buttons\" ><\/div><p><img decoding=\"async\" alt=\"\" aperture\":\"0\",\"credit\":\"\",\"camera\":\"\",\"caption\":\"\",\"created_timestamp\":\"0\",\"copyright\":\"\",\"focal_length\":\"0\",\"iso\":\"0\",\"shutter_speed\":\"0\",\"title\":\"\",\"orientation\":\"0\"}\"=\"\" class=\"alignnone size-full wp-image-9503\" data-attachment-id=\"9503\" data-comments-opened=\"0\" data-image-caption=\"\" data-image-description=\"\" data-image-meta=\"{\" data-image-title=\"securebusinessinthecloud-landscape\" data-large-file=\"https:\/\/i0.wp.com\/www.lavaprotocols.com\/wp-content\/uploads\/2018\/04\/securebusinessinthecloud-landscape.jpg?fit=1022%2C457&amp;ssl=1\" data-medium-file=\"https:\/\/i0.wp.com\/www.lavaprotocols.com\/wp-content\/uploads\/2018\/04\/securebusinessinthecloud-landscape.jpg?fit=300%2C134&amp;ssl=1\" data-orig-file=\"https:\/\/i0.wp.com\/www.lavaprotocols.com\/wp-content\/uploads\/2018\/04\/securebusinessinthecloud-landscape.jpg?fit=1022%2C457&amp;ssl=1\" data-orig-size=\"1022,457\" data-permalink=\"https:\/\/www.lavaprotocols.com\/2018\/04\/17\/new-ways-to-secure-businesses-in-the-cloud\/securebusinessinthecloud-landscape\/\" data-recalc-dims=\"1\" height=\"457\" loading=\"lazy\" sizes=\"auto, (max-width: 1022px) 100vw, 1022px\" src=\"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-content\/uploads\/imported-from-hubspot\/Imported_Blog_Media\/securebusinessinthecloud-landscape.jpg\" srcset=\" 1022w,  300w,  768w,  610w\" width=\"1022\"\/>by <em><strong>Gerhard Eschelbeck, Vice President of Security &amp; Privacy, Google<\/strong><\/em><\/p>\n<p><!--more--><\/p>\n<p>From collaboration tools that accelerate productivity, to platforms that spur innovation, to AI-powered tools that drive better customer insights, the cloud is increasingly where we turn to transform businesses. It\u2019s also where an increasing number of enterprises are turning to help protect their data and stay secure.<\/p>\n<p>It\u2019s been our belief at Google from the beginning that if you put security first, everything else will follow. We continue to develop new ways to give our customers the capabilities they need to keep up with today\u2019s ever-evolving security challenges. That\u2019s why today we\u2019re announcing more than 20 enhancements aimed to deepen and expand the control businesses have over their security environment. You can read all of our announcements in more detail on our posts covering <a href=\"https:\/\/cloudplatform.googleblog.com\/2018\/03\/introducing-new-ways-to-protect-and-control-your-GCP-services-and-data.html\" rel=\"noopener\" target=\"_blank\">Google Cloud Platform<\/a>, <a href=\"https:\/\/www.blog.google\/products\/g-suite\/helping-g-suite-customers-stay-secure-new-proactive-phishing-protections-and-management-controls\">G Suite<\/a> and <a href=\"https:\/\/blog.google\/topics\/connected-workspaces\/keeping-cloud-entry-points-secure-google-chrome-enterprise\/\" rel=\"noopener\" target=\"_blank\">Chrome Enterprise<\/a> updates. Here, we\u2019d like to highlight three unique examples of our security functionality.<\/p>\n<h2><\/h2>\n<h2><span style=\"color: #008080;\"><strong>Unprecedented control to better protect your data<\/strong><\/span><\/h2>\n<p>Google Cloud was designed, built, and is operated with security top of mind\u2014from our\u00a0<a href=\"https:\/\/cloudplatform.googleblog.com\/2017\/12\/how-Google-protects-your-data-in-transit.html\" rel=\"noopener\" target=\"_blank\">data encryption<\/a> both at rest and in transit by default. On top of this foundation, our customers have the freedom to deploy their own security controls based on their unique needs and the level of assurance they require. Today, we\u2019re announcing <a href=\"http:\/\/cloud.google.com\/vpc-service-controls\/\" rel=\"noopener\" target=\"_blank\">VPC Service Controls<\/a> to add to our broad set of protections.<\/p>\n<p>Currently in alpha, VPC Service Controls help enterprises keep their sensitive data private while using GCP\u2019s fully managed storage and data processing capabilities. Imagine constructing an invisible border around everything in an app that prevents its data from escaping, and having the power to set up, reconfigure and tear down these virtual perimeters at will. You can think of it like a firewall for API-based services on GCP. Well-defined VPC service controls can give admins a greater level of control to prevent data exfiltration from cloud services as a result of breaches or insider threats.<\/p>\n<p>With this managed service, enterprises can configure private communication between cloud resources and hybrid VPC networks. By expanding perimeter security from on-premise networks to data stored in GCP services, enterprises can feel confident running sensitive data workloads in the cloud.<\/p>\n<p>VPC Service Controls give admins even more precise control over which users can access GCP resources with Access Context Manager. Enterprises can create policies to grant access based on contextual attributes like user location, IP address and endpoint security status. These policies help ensure the appropriate level of protection is in place when allowing access to data in cloud resources from the internet.<\/p>\n<p>Google Cloud is the first cloud provider to offer virtual security perimeters for API-based services with simplicity, speed and flexibility that far exceeds what organizations can achieve in a physical, on-premises environment.<\/p>\n<h2><\/h2>\n<h2><strong><span style=\"color: #008080;\">Visibility into data risks, with actionable security insights<\/span><\/strong><\/h2>\n<p>As use of cloud services continues to grow, clear visibility into an organization\u2019s cloud footprint and the security status of its infrastructure is more important than ever. Businesses need the right data and actionable insights to stop threats before security incidents turn into damaging breaches. To that end, we\u2019re announcing <a href=\"https:\/\/cloud.google.com\/security-command-center\/\" rel=\"noopener\" target=\"_blank\">Cloud Security Command Center<\/a>, currently in alpha.<\/p>\n<p>Cloud Security Command Center is a security and data risk platform for GCP that helps enterprises gather data, identify threats and act on them before they result in business damage or loss. First, Cloud Security Command Center gives enterprises consolidated visibility into their cloud assets across App Engine, Compute Engine, Cloud Storage and Cloud Datastore. People can quickly understand the number of projects they have, what resources are deployed, where sensitive data is located, and how firewall rules are configured. With ongoing discovery scans, enterprises can view the history of their cloud assets to understand exactly what changed in their environment and act on unauthorized modifications.<\/p>\n<p>Cloud Security Command Center also provides powerful security insights into cloud resources. For example, security teams can determine things like whether a cloud storage bucket is open to the internet or contains personally identifiable information, or whether cloud applications are vulnerable to cross-site scripting (XSS) vulnerabilities\u2014to name just a few.<\/p>\n<p>Finally, Cloud Security Command Center helps enterprises leverage and act on intelligence from Google and other leading security vendors. Administrators can identify threats like botnets, cryptocurrency mining, and suspicious network traffic with built-in anomaly detection developed by the Google Security team, as well as integrate insights from vendors such as Cloudflare, CrowdStrike, Dome9, RedLock, Palo Alto Networks, and Qualys to help detect DDoS attacks, compromised endpoints, compliance policy violations, network intrusions, and instance vulnerabilities and threats. With ongoing security analytics and threat intelligence, enterprises can better assess their overall security health in a central dashboard or through APIs, and immediately act on risks.<\/p>\n<p>This is just one example of how we\u2019re providing enterprises more visibility. Earlier this year, we announced the <a href=\"https:\/\/gsuite.google.com\/products\/admin\/security-center\/\" rel=\"noopener\" target=\"_blank\">security center<\/a> for G Suite, which provides security analytics and recommendations for our G Suite customers. Today we\u2019re introducing additions to security center, including new charts which highlight phishing threats and suspicious device activity.<\/p>\n<h2><span style=\"color: #008080;\"><strong>Transparency into how we interact with your data<\/strong><\/span><\/h2>\n<p>Trust is paramount when choosing a cloud provider. We want to be as open and transparent as possible, allowing customers to see everything that happens to their data. Cloud Audit Logging\u00a0helps answer the question of which administrators did what, where, when and why on your GCP projects.<\/p>\n<p>And now, <a href=\"https:\/\/cloud.google.com\/access-transparency\/\" rel=\"noopener\" target=\"_blank\">Access Transparency<\/a> offers an immutable audit trail of actions taken by Google engineers and support whenever they interact with your content on GCP. Access Transparency builds on our already robust controls that restrict Google administrator activity to actions only with valid business justifications, such as responding to a specific ticket our customers have initiated or recovering from an outage.<\/p>\n<p>Together, Cloud Audit Logs and Access Transparency Logs provide a more comprehensive view of admin activity in your cloud environment. We believe that trust is created through transparency, which is why we\u2019re proud that GCP is the first to offer this level of visibility into cloud provider administrative activity.<\/p>\n<h2><span style=\"color: #008080;\"><strong>What cloud security means for businesses<\/strong><\/span><\/h2>\n<p>Today\u2019s updates are just a few examples of how we\u2019re making it easier and more secure for businesses to build and grow in the cloud\u2014with many more still to come. We believe a more secure business landscape is better for everyone, and we\u2019ll continue to develop ways to help businesses be more secure.<\/p>\n<p><strong><i>Lava is a cloud solutions provider with more than a decade of experience in areas such as marketing automation, CRM implementation, change management, and consultation. We are also an <\/i><a href=\"https:\/\/lavaprotocols.com\/crm\/\"><i>authorised Salesforce Partner <\/i><\/a><i>in Malaysia. We pride ourselves in not just being a CRM partner but in also understanding the needs of our customers and taking their business to the next level.<\/i><\/strong><\/p>\n<p><span class=\"et_bloom_bottom_trigger\"><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>by Gerhard Eschelbeck, Vice President of Security &#038; Privacy, Google From collaboration tools that accelerate productivity, to platforms that spur innovation, to AI-powered tools that drive better customer insights, the cloud is increasingly where we turn to transform businesses. It\u2019s also where an increasing number of enterprises are turning to help protect their data and [\u2026]<\/p>\n","protected":false},"author":1,"featured_media":2624,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[18,59,67],"class_list":["post-2623","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-blog","tag-cloud-horizon","tag-google-for-work"],"jetpack_featured_media_url":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-content\/uploads\/2024\/10\/securebusinessinthecloud.jpg","_links":{"self":[{"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/posts\/2623","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/comments?post=2623"}],"version-history":[{"count":0,"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/posts\/2623\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/media\/2624"}],"wp:attachment":[{"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/media?parent=2623"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/categories?post=2623"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/tags?post=2623"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}