Chronicle Security Operations’ momentum is holding strong with additional functionality to save our customers’ time and resources. We are continuing to bolster threat detection, investigation and response capabilities for cloud environments while also focusing on everyday functionality. We’ve compiled the top features released in Q2 below.
Simplified End-to-End TDIR
Outcomes-driven security for your Google Cloud environment.
-
One click ingestion, understanding of each cloud service log/data format, attack vectors, and more
-
Curated detections based on Google’s knowledge of cloud threats
-
Visualization of cloud threats with rich cloud and off-cloud context
-
Repeatable, automated response playbooks
See Google Cloud blog for more details.
Manage Credentials via an External Vault
Easily prevent the unauthorized use of passwords. With the new capability to manage credentials in an external vault, customers can now store their passwords, API keys, certificates, etc. and pull them into the Chronicle SOAR platform.
Multiple Environment Support
Chronicle SOAR now supports configuring one agent for multiple environments so customers can easily separate between different networks or business units, or between different customers of an MSSP.
Exclusion Filtering for Curated Detections
Quickly and easily filter out noisy or unwanted detections from your Chronicle SIEM curated detection results, reducing overall workload.
Interested in seeing more? Schedule a demo today to see how you can leverage these new features.