As Google Cloud continues to strengthen its infrastructure, one of its latest announcements, known as the Cloud Intrusion Detection System, or IDS, is the first step in Google’s concept of invisible security on the cloud. Easily deployed with a couple clicks of your mouse, Google IDS provides a new frontline of defense against DDoS attacks, spyware, ransomware, and other types of network-oriented attacks.
Too Much of a Good Thing
Unfortunately, the biggest challenge to Google IDS is the fact that more services and applications are moving to the cloud on a daily basis. As such, the IDS needs to be updated continuously in order to keep up with the latest cloud-based threats.
Although these levels of increasing cloud adoption are usually considered positive, these new apps and services might actually lessen the effectiveness of intrusion detection systems; including Google IDS. However, since appropriate intrusion detection is a requirement of some industry standards, particularly the Payment Card Industry Data Security Standard, or PCI DSS, Google IDS could save cloud-connected companies the time, hassle, and expense of maintaining proprietary or third-party intrusion detection services.
Google’s new IDS is based on threat detection technology that was initially developed by the team at Palo Alto Networks, Inc. According to a company spokesperson, their system results in minimal false positives.
Features Galore
Thankfully, Google IDS has no shortage of useful functionality. Some of the top benefits include:
• Network-based threat detection: Easily detect exploits and other evasive techniques that target your network infrastructure, application layers, buffer overflows, and more.
• Cloud-native management: Google IDS is deployable with just a few clicks of the mouse. There is no confusing user interface or APIs. Moreover, it automatically scales to meet your exact organization’s needs.
• Industry-leading security: Thanks to the team at Palo Alto Networks, Google IDS is equipped with a next-gen threat analysis engine that is continuously updated with new threats signatures and definitions.
• Full traffic visibility: Google IDS uses Google Cloud’s Packet Mirroring to quickly identify suspicious activities within your network.
• Compliance: As mentioned, Google IDS is a critical component of many industry compliance requirements, including PCI-DSS. If you’re an online retailer, or if you operate an online storefront that accepts credit card payments, compliance with PCI-DSS is mandatory.
• Prioritization: Google IDS makes it easy to prioritize threats according to five different levels: Informational, Low, Medium High, and Critical.
• Masquerade detection: In many cases, malicious software enters your network while disguised as a legitimate or genuine piece of software. Google IDS was designed to spot these masquerade attacks with App-ID technology. Pioneered by the team at Palo Alto Networks, this protocol uses multiple identification techniques to spot the most evasive threats.
• Performance: Google IDS is capable of maintaining exceptional performance, even while processing large traffic loads.
Now that you have a better idea of Google’s new IDS, including insight into some of the threats it targets, it’s time to put their technology to use for your organization. {{https://cloud.google.com/intrusion-detection-system|Google IDS}} is available now.
Google Cloud’s Intrusion Detection System is Now Available
Comments
No comments yet. Sign in to add the first!