Network based systems

Google Cloud IDS Network-Based Threat Detection Service Now Generally Available

Recently, Google announced the general availability of its Cloud ID for network threat detection. This core network security offering helps detect network threats and helps organizations meet compliance standards that require an intrusion detection system.

Earlier this year, the company announcement Public preview of Cloud IDS as a new security network offering. It is generally available now, including new enhancements such as service availability in all regions, autoscaling, automated daily update of detection signatures, customer support HIPAA Compliance Requirements, ISO27001 certification, and integration with Google’s security analysis platform the Chronicle. Note that in the preview, the offering was already integrated with five platforms from other vendors: Splunk Cloud Platform, Splunk Enterprise Platform, Exabeam Advanced Analytics, The Devo Platform and Palo Alto Networks Cortex XSOAR, and the company plans to ” other integrations in 2022.

Cloud IDS is designed with Palo Alto Networks Threat Detection Technologies, which provide high levels of security effectiveness that allow customers to detect malicious activity with few false positives. In addition, according to the latest Google Cloud blog post, Cloud IDS offers simple setup and deployment and gives customers visibility into the traffic entering their cloud environment (north-south traffic) and in traffic between workloads (east-west traffic). It allows security teams to focus their resources on high priority issues instead of designing and operating complex network threat detection solutions.

Customers can implement Cloud IDS in their virtual cloud networks to ensure network security. Jonny almaleh, specialist in PSO networks at Google Cloud, explains in a previous blog post on Cloud IDS:

To provide visibility into threats and intrusions detected by IDS instances, Cloud IDS feeds threat logs and security alerts into Cloud Logging and the Cloud IDS UI in the customer project. All of this is done under the hood, making it easy to deploy and manage Cloud IDS.


Several Google Cloud customers like Avaya, Lytics and Meditech use Cloud IDS. In another Google blog post on a Cloud IDS use case, Tom moriarty, Chief Information Security Officer at Meditech, said:

We use Google Chronicle as a security analysis tool for our corporate environment. By integrating Cloud IDS with Chronicle, we are able to analyze the threats highlighted by Cloud IDS.

Cloud IDS pricing is based on an hourly rate for the Cloud IDS endpoint and inspected traffic. More details about the service are available on the documentation pages.

Source link