Security Program Controls/Technologies, Channel partners, Content

Google Chronicle Introduces Threat Detection Solution


Google Chronicle has launched Chronicle Detect, a threat detection solution built on Google Cloud Platform (GCP) infrastructure.

Security teams can use Chronicle Detect to send security telemetry to Chronicle at a fixed cost and map it to a common data model across machines, end-users and threat indicators, according to a prepared statement. In doing so, they can apply threat detection rules to a unified set of data.

In addition, Chronicle Detect allows security teams to leverage advanced threat detection rules out-of-the-box, build their own rules or migrate rules over from legacy tools, Google said. Security teams can access Chronicle Detect threat detection rules and threat indicators from the Uppercase threat research team, use the YARA-L language to edit and build detection rules in the Chronicle interface and leverage a Sigma-YARA converter to transfer their rules to and from Chronicle.

Along with Chronicle Detect, Google has announced new global availability and data localization options, including data center support for capabilities in Europe and the Asia Pacific region. Google also plans to build out Chronicle integrations to help organizations uncover threats on-premises and in Google Cloud and other cloud environments.

A Closer Look at Chronicle

Chronicle offers a security analytics platform that allows security teams to extract signals from security telemetry, the company indicated. The platform provides an elastic container for storing security telemetry and enables security teams to use proprietary data sources, public intelligence feeds and other information to identify and assess threats.

Chronicle has gained mention with some managed security services providers (MSSPs) and technology partners.

True believers include Cyderes, a Top 250 MSSP, and unified endpoint management solutions provider Tanium -- which recently integrated Chronicle into their offerings.

Google Cloud absorbed Chronicle in 2019 and continues to explore partnerships with MSSPs, cyber consulting companies and managed detection and response (MDR) providers.

Dan Kobialka

Dan Kobialka is senior contributing editor, MSSP Alert and ChannelE2E. He covers IT security, IT service provider business strategies and partner programs. Dan holds a M.A. in Print and Multimedia Journalism from Emerson College and a B.A. in English from Bridgewater State University. In his free time, Dan enjoys jogging, traveling, playing sports, touring breweries and watching football.