Security Operations Suite arrow_forward expand_more
Solutions arrow_forward expand_more
Why Chronicle arrow_forward expand_more
Why Chronicle

Rely on a modern approach to threat detection and response.

Why Chronicle
Resources arrow_forward expand_more
Security Operations Suite arrow_forward expand_more
Solutions arrow_forward expand_more
Why Chronicle arrow_forward expand_more
Why Chronicle

Rely on a modern approach to threat detection and response.

Why Chronicle
Resources arrow_forward expand_more
Mandiant is now part of Google Cloud. Learn More Mandiant is now part of Google Cloud. .

Knowledge base

Explore Chronicle resources, including white papers, webinars, case studies and data sheets.

Report
3 Ways to Apply a Risk-Based Approach to Threat Detection, Investigation and Response

Access the Gartner report to take your threat detection, investigation and response to the next level.

REPORTS
State of Cloud Threat Detection and Response Report

We polled 400 security leaders and hands-on SecOps practitioners to understand how they identify, protect against, and remediate cloud-based threats. In the report, you'll learn how the move to cloud can transform your security operations today and in the future.

CASE STUDY
Case Study: Chronicle SIEM Customers

Learn how implementing Chronicle SIEM helped various customers add the speed, scale and intelligence necessary to overcome data and resource limitations.

CASE STUDY
Case Study: RAD Cyber Security & CyberSec Services

Learn how RAD Cyber Security and CyberSec Services leveraged Chronicle to build fast, effective and highly-differentiated services for their customers.

EBOOK
The Art of Recognizing and Surviving SOC Burnout

The industry’s deepest dive yet into the occupational hazards emanating from the SOC and what analysts, engineers and managers can do about them.

INFOGRAPHIC
SOC Email Ettiquette 101

Communication is tantamount when a security threat is affecting an organization, but there’s a reason most SOC pros chose computing over journalism. Yet the burden is on you to make clear, salient points to the rest of the business about active digital dangers.

WEBINAR
Strategic Threat Hunting with SOAR and Threat Intel

Regardless of the size or maturity level of your security operations center, every SOC team must build upon certain foundational principles. From there, teams can develop optimal workflows leading to proactive threat detection, intelligence-driven investigation and response.

WHITEPAPER
Top Security Playbooks

Knowing exactly which steps to take when an alert emerges is a prerequisite for successful security operations. Playbooks not only help ensure predictable and consistent results before, during and after an incident, but they also aid in empowering your analysts and cutting down on mistakes.

WHITEPAPER
VirusTotal Enterprise for Threat Investigations

Download VTE for Threat Investigations to discover how to leverage the full power of VirusTotal.

WHITEPAPER
Future of the SOC, SOC People: Skills not Tiers

This second paper in our series, “The Future of the SOC” entitled, “SOC People - Skills not Tiers,” focuses on the single most important component of the SOC: the people.

CASE STUDY
Case Study: Telepass

Hear Telepass explain their adoption of Chronicle to consume all their security events into one place, filter out false positives, respond to real threats more efficiently, and integrate with other Google Cloud security services.

CASE STUDY
Delivery Services Organization Case Study

Download this Google Cloud case study to How one of the world’s largest shipping companies turned to SOAR to shrink threat response times and demonstrate security value to stakeholders.

Case Study
Case Study: Secrutiny

Using Chronicle SIEM and SOAR, Secrutiny is able to improve threat detection and response for customers. Watch this customer video to see how.

Case Study
Case Study: Vertiv

Using Google Cloud and Chronicle, Vertiv is able to conduct thorough security investigations and close cases faster. Watch this customer video to see how.

VIDEO
Interview with Sunil Potti and Cristina Pitarch of Google Cloud

Tune in to hear Sunil Potti and Cristina Pitarch from Google Cloud discuss Google's latest thinking and the importance of staying ahead of the ever-changing cybersecurity landscape.

REPORT
SANS Product Review: Chronicle SIEM

Discover why SANS said Chronicle SIEM is "a paradigm changer in how security investigations are conducted and believe it will be a force multiplier for most security teams."

WHITEPAPER
Threat Detection, Investigation, and Response in the Cloud

Download this Google Cloud white paper to discover best practices for detection and response in the cloud and how cloud adoption can spark a transformative SecOps journey.

Security Analyst Diaries
Security Analyst Diaries: Episode 6

Domain prevalence, and threat detection with Chronicle SIEM

DATASHEET
Chronicle SIEM Datasheet

Simplify threat detection, investigation and hunting using the intelligence, speed and scale of Google.

DATA SHEET
Chronicle Security Operations Datasheet

Simplify threat detection, investigation and response (TDIR) using the intelligence, speed and scale of Google.

DATA SHEET
Chronicle SOAR Datasheet

Chronicle SOAR enables fast and effective response to cyberthreats by combining playbook automation, case management and integrated threat intelligence in one

DATA SHEET
Chronicle SOAR for MSSPs

Chronicle SOAR enables MSSPs to deliver high-value security services with fewer resources, improve margins and keep customers delighted.

BLOG
Fastest Two Minutes in SecOps: Threat hunting [Part 1] [Video]

In this episode of “Fastest Two Minutes in SecOps,” Google Cloud Principal Security Strategist John Stoner introduces you to the benefits of hunting, and also offers words of caution for teams who may rush into the practice before other competencies of their detection and response are sufficiently built out.

CASE STUDY
Case Study: Atos

Learn how Atos, a managed detection and response (MDR) provider, got proactive about its security operations.

WEBINAR
SIEM Augmentation: A Tale of Two SIEMs

In this webinar, you'll find out why you should augment your existing SIEM with Chronicle and how to create an action plan.

INFOGRAPHIC
The SOC Ecosystem

See how modern security operations centers are forging new and symbiotic connections within and outside the organization.

SECURITY ANALYST DIARIES
Security Analyst Diaries: Episode 5

Using GeoIP for detection with Chronicle

CASE STUDY
CISO Testimonial Morgan Sindall

Neil Binnie, CISO at Morgan Sindall, explains why Chronicle is the best tool available for countering potential attacks.

WEBINAR
Streamlining Detection and Response to Cloud Threats

In this webinar, learn why detection and response is different in the cloud and how technology can help.

Case study
Hitting send on SOC efficiency

World's largest shipping company turned to SOAR to shrink threat response times and demonstrate security value to stakeholders.

BLOG
Fastest Two Minutes in SecOps: Autonomic Security Operations [Video]

What if your SOC were able to regulate and improve itself like your nervous system does? That's the goal of Autonomic Security Operations and its continuous detection and response loop, explains our Steve Meckl in the latest "Fastest Two Minutes in SecOps" episode.

INFOGRAPHIC
Have Your SIEM and Augment It Too

These three Chronicle augmentation use cases are proof that a modern SIEM can free you from costliness and complexity as you take on today’s adversaries.

SECURITY ANALYST DIARIES
Security Analyst Diaries: Episode 4

Detection and Response on Google Workspace with Chronicle

Case Study
Giving control back to businesses

Talion, a U.K.-based MSSP, was operating multiple SIEM environments, facing alert overload, skills deficits and burned-out analysts . . .

CASE STUDY
See how Entara uses Chronicle

MSSP Entara leverages the SOAR API to help power its forecheck cyber resilience platform.

WHITEPAPER
How Chronicle SIEM Can Help Augment Your SOC Stack

This paper neatly makes the case for adding Chronicle SIEM to your SOC environment, or if you are a current user, describes how to extract additional use case benefits.

BLOG
A simple SOAR adoption maturity model

Many cybersecurity technologies and disciplines have maturity models, but there are limited frameworks for security operations teams assessing the growth of their SOAR deployment. Now we have one for you to use.

BLOG
New to Chronicle: multi-event rules

The "New to Chronicle" series carries on with another primer into rules, this one focusing on building multi-event rules to enhance your SIEM coverage.

CASE STUDY
Case Study: Morgan Sindall

Chronicle enables ingestion and analysis of massive amounts of data, improves detection accuracy, and reduces time to incident resolution.

SECURITY ANALYST DIARIES
Security Analyst Diaries: Episode 3

New Ingestion Metrics, New YARA-L Functions, and New VirusTotal Widget Integrations

Data Sheet
SANS 2022 SOC Survey

The SANS 2022 SOC Survey evaluates key SOC success measures, including staffing, technology and budgeting. Download the survey today, and immediately compare your team to your peers!

WHITEPAPER
The All-in-One Guide to Maturing Your MSSP

Read how managed security services providers can stand out from the competition and drive revenue growth in this all-in-one guide.

THIRD-PARTY REPORT
The SOC Modernization Journey

Download this ESG paper to learn more about the role of XDR in the SOC modernization journey and best practices for a successful SOC transformation.

REPORT
SANS 2022 ATT&CK™ and D3FEND™ Report

Get a better understanding of the ATT&CK and D3FEND frameworks and how they can be utilized to help strengthen incident analysis and response.

CASE STUDY
Case Study: BBVA

BBVA, one of the largest financial institutions in the world, uses Chronicle to predict and prevent cyberattacks using custom AI tools.

SECURITY ANALYST DIARIES
Security Analyst Diaries: Episode 2

Scaling your SOC with Context-Aware Detections

Case Study
Case Study: Longwall

U.K.-based security services provider now is able to save analysts hours per day and concentrate on higher-order tasks.

REPORTS
Cloud Threat Intelligence: Threat Horizons Report

Get actionable threat intelligence to ensure your cloud environments are best protected against ever evolving threats.

Security Analyst Diaries
Security Analyst Diaries: Episode 1

Detecting GCP CIS control violations with native GCP Cloud Audit Logging and Google Chronicle

VIDEO
How to 10x your SOC with Autonomic Security Operations

"ASO gives CISOs a vision of how to drive security operations transformation, how to identify the top metrics, and how to inspire their workforce to be aligned to the same vision."

CASE STUDY
Case Study: Crowe

Learn why Crowe turns to SOAR for greater automation, visibility, and analyst performance.

CASE STUDY
Crowe (Video Testimonial)

Learn why Crowe turns to SOAR for greater automation, visibility, and analyst performance.

PODCAST
Cloud Security Podcast: Episode 46

Learn more about Google Cloud Security solutions that help customers precipitate change.

CASE STUDY
Case Study: Telepass

Telepass, the most widely used electronic tolling system across Europe, uses Chronicle to protect their 6 million users from security threats and make mobility a better experience for their customers.

10X Transformation of the Security Operations Center White Paper

Learn more about Google's approach to modernizing and transforming your security operations center by reading this white paper. It will cover why it is so important to to transform the SOC, what Autonomic Security Operations is and how you can achieve it.

COMPLIANCE
ISO/IEC 27001:2013 Certificate

This certificate validates that Chronicle has implemented the guidelines and general principles for initiating, implementing, maintaining, and improving the management of information security.

Case Study
Case Study: Groupon

Using Google Cloud's Chronicle, Groupon has been able to simplify the way they approach threat response, hunting, and investigations. Watch this customer case study video to see how.

EBOOK
ISMG eBook | Cloud Migration: The Chance to Transform Security

Cloud migration isn’t just an opportunity to transform business; it’s a chance to completely re-do the cybersecurity model, says Dr. Anton Chuvakin. He explains the business benefits of security transformation and how to initiate it from day one in the cloud.

CASE STUDY
Case Study: Healthcare Industry Leader

Read about how a global healthcare giant uses Chronicle to improve ROI on their security investments and reduce time to response significantly.

CASE STUDY
Case Study: NCR

Google Cloud and Chronicle help NCR search through security data faster and retain it longer.

Case Study
Case Study: Quanta Services

Quanta Services is a leading specialty contractor in North America, providing fully integrated solutions for the electric power, pipeline, industrial and communications industries.

Let’s work together

Ready for Google-speed threat detection and response?

Contact us Visit the contact us page