Security Best Practices: Getting Started with Google Cloud & Security Solutions Across Cloud

Ron Gerber with Angelbeat Seminars
Ron Gerber with Angelbeat Seminars
2.1 هزار بار بازدید - 3 سال پیش - Gautami Nadkarni, cloud customer engineer
Gautami Nadkarni, cloud customer engineer at Google, will discuss the Google Cloud Platforms security model, world-scale infrastructure, and unique capability to innovate, that keeps your organization secure and compliant, as you create an integrated solution across the cloud and on-prem. Some of the highly relevant topics to be covered during this technical briefing include:
Infrastructure: Take advantage of the same secure-by-design infrastructure, built-in protection, and global network that Google uses to protect your information, identities, applications, and devices.
Operational device security: We develop and deploy infrastructure software using rigorous security practices. Our operations teams detect and respond to threats to the infrastructure from both insiders
and external actors, 24/7/365.
Internet communication: Communications over the Internet to our public cloud services are encrypted in transit. Our network and infrastructure have multiple layers of protection to defend our customers against Denial-of-service attacks.
Identity: Identities, users, and services are strongly authenticated with multiple factors. Access to sensitive data is protected by advanced tools like phishing-resistant Security Keys.
Storage services: Data stored on our infrastructure is automatically encrypted at rest and distributed for availability and reliability. This helps guard against unauthorized access and service interruptions.
Service deployment: Any application that runs on our infrastructure is deployed with security in mind.
We don't assume any trust between services, and we use multiple mechanisms to establish and maintain trust. Our infrastructure was designed to be multi-tenant from the start.
Hardware infrastructure: From the physical premises to the purpose-built servers, networking equipment, and custom security chips to the low-level software stack running on every machine, our entire hardware infrastructure is Google-controlled, -secured, -built, and -hardened.
Security products: Meet your policy requirements and protect your critical assets with our unique security products and capabilities.
Analyze risks at the speed of search: Ingest, index, correlate, and use new telemetry, in seconds.
Analyze massive amounts of historical security data to gain visibility and insights. With Chronicle, you can combine intelligence about threats both in the wild and inside your network to speed investigations.
Protect users with up-to-date intel: Google Cloud’s user protection technology is proven through Google’s years of experience keeping people safe online. But protecting your users today also requires our constantly updated lists of unsafe web resources to identify phishing and deceptive sites as well as sites that host malware or unwanted software.
Fully scalable security analytics: Built on core Google infrastructure, our security analytics solutions give you an elastic container for storing huge volumes of enterprise security telemetry.
Application security: Protect your applications from fraudulent activity, spam, and abuse. Detect malicious URLs on your website and in client applications. Quickly identify known bad sites. Help prevent costly exploits from automated bots.
Transparency & privacy: You control how your data is used and shared. We share details about our infrastructure, operations, and what's happening with your data.
Know that your security comes first in everything we do: We promptly notify you if we detect a breach of security that compromises your data.
Control what happens to your data: We process customer data according to your instructions. You can access it or take it out at any time.
Know that customer data is not used for advertising: You own your data. Google Cloud does not process your data for advertising purposes.
Know where Google stores your data and rely on it being available when you need it: We publish the locations of our Google data centers; they are highly available, resilient, and secure.
Depend on Google's independently-verified security practices: Our adherence to recognized international security and privacy standards is certified and validated by independent auditors —wherever your data is located in Google Cloud.
Trust that we never give any government entity access to your data or to our servers storing your data: We reject government requests that are invalid, and we publish a transparency report for government requests.

For More Information Please Visit: https://www.angelbeat.com
3 سال پیش در تاریخ 1400/03/07 منتشر شده است.
2,151 بـار بازدید شده
... بیشتر