CIOTechie_Cloudcomputing_Private-Cloud_SaaS_IaaS_Google_Google-Cloud-Security_Advance-Security-Function_Security_Cyber_Breaches_Cybercrime

Google Cloud Security Releases A Series Of New Services To Advance Security Functions And Protection In Enterprises

Cloud Computing News

Google_Cloud-Security-Releases-A-Series-Of-New-Services-To-Advance-Security-Functions-And-Protection-In-Enterprises Google Cloud Security Releases A Series Of New Services To Advance Security Functions And Protection In EnterprisesSearch engine giant Google’s Cloud platform, Google Cloud Security, last week, announced a series of new services to strengthen customers with advanced security functionalities that are easy to implement and use. The new Google Cloud Security’s new services are the Web Risk API, Cloud Armor, and HSM keys.

The Web Risk API has been released in the beta format to make sure the safety of users on the web, and it comprises data on over a million perilous URLs. Every day Billions of URL’s are examined to keep this data up-to-date. With this, client applications can utilize a simple API call to test out URLs against Google’s lists of perilous web resources. This list also involves social engineering sites, deceptive sites, and sites that host malware or unwanted software. The second new service Cloud Armor is a Distributed Denial of Service (DDoS) defense and Web Application Firewall (WAF) service for Google Cloud Platform (GCP) based on the technologies at ease with protecting services like Search, Gmail, and YouTube. It usually offers L3/L4 DDoS defense, in addition to IP Allow/Deny capabilities for applications or services behind the Cloud HTTP/S Load Balance. Cloud Armor also enables users to either permit or block incoming traffic based on IP addresses or ranges using allow lists and deny lists. Users can also customize their defenses and alleviate multifactor attacks through Cloud Armor’s flexible rules language.

In the end, HSM keys to protect data in the Cloud, where it enables users to protect encryption keys and perform cryptographic operations in FIPS 140-2 Level 3 certified HSMs. However, users don’t need to agonize about the operational overhead of HSM cluster management, scaling and patching. As fully incorporated with Cloud Key Management Service (KMS), Cloud HSM allows users to generate and use customer-managed encryption keys (CMEK) that are created and protected by a FIPS 140-2 Level 3 hardware device.