{"id":1207,"date":"2025-04-14T11:19:15","date_gmt":"2025-04-14T11:19:15","guid":{"rendered":"https:\/\/violethoward.com\/new\/google-cloud-intros-ai-security-agents-unified-security-platform-to-consolidate-ops-triage-threat-intel\/"},"modified":"2025-04-14T11:19:15","modified_gmt":"2025-04-14T11:19:15","slug":"google-cloud-intros-ai-security-agents-unified-security-platform-to-consolidate-ops-triage-threat-intel","status":"publish","type":"post","link":"https:\/\/violethoward.com\/new\/google-cloud-intros-ai-security-agents-unified-security-platform-to-consolidate-ops-triage-threat-intel\/","title":{"rendered":"Google Cloud intros AI security agents, unified security platform to consolidate ops, triage, threat intel"},"content":{"rendered":" \r\n<br><div>\n\t\t\t\t<div id=\"boilerplate_2682874\" class=\"post-boilerplate boilerplate-before\">\n<p><em>Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More<\/em><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-wide\"\/>\n<\/div><p>Enterprise infrastructure is increasingly complex, meaning protecting it is, too.\u00a0<\/p>\n\n\n\n<p>The attack surface is more expansive than ever, and many enterprises have a patchwork quilt of security tools, making it difficult to gain a cohesive understanding of their security posture. Add in AI \u2014 and all the threats it brings \u2014 and security teams are scrambling to keep up.\u00a0<\/p>\n\n\n\n<p><span style=\"box-sizing: border-box; margin: 0px; padding: 0px;\">With <\/span>a new Google Unified Security platform, Google Cloud\u00a0aims to solve this problem \u2014 or at least reduce cybersecurity pain points. Today, the tech giant rolled out the new offering, along with new security agents and several other security capabilities, at Google Cloud Next.\u00a0<\/p>\n\n\n\n<p>Google Unified Security \u201ccreates a single, scalable, searchable security data fabric across the entire attack surface,\u201d Brian Roddy, VP of product management, and Peter Bailey, VP of security operations at Google Cloud, wrote in a blog post today.\u00a0<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-supporting-preemptive-security\">Supporting preemptive security<\/h2>\n\n\n\n<p>Google Unified Security combines Google\u2019s security operations, cloud security, threat intelligence, secure enterprise browsing<span style=\"box-sizing: border-box; margin: 0px; padding: 0px;\"> and\u00a0Mandiant\u00a0expertise into one platform powered by Gemini and featuring semi-autonomous AI. According to Google, it offers preemptive security by providing visibility across networks, clouds, apps,<\/span> and endpoints.<\/p>\n\n\n\n<p>Roddy and Bailey explain that the goal is to help enterprises anticipate and remediate threats before they become realities and prevent attackers from getting into a system. The platform integrates Chrome Enterprise and Google Threat Intelligence data to support detection and remediation and test security controls against the latest known attacker activities.\u00a0<\/p>\n\n\n\n<p>Google Unified Security helps improve enterprise security posture with browser behavior, managed threat hunting and security validation integrations, said Michelle Abraham, IDC\u2019s senior research director for security and Trust. \u201cThis approach offers organizations a more holistic and streamlined defense against today\u2019s complex threat landscape,\u201d she said.\u00a0<\/p>\n\n\n\n<p>Bashar Abouseido, CISO at Charles Schwab, said Google\u2019s automated response capabilities have \u201cdramatically reduced\u201d the financial services company\u2019s investigation resolution time while providing better visibility across its computing environment.\u00a0<\/p>\n\n\n\n<p>\u201cGoogle is transforming security operations and enabling our vision to stay proactive in responding to cyber threats,\u201d he said. \u201cThe platform has empowered our team to focus on strategic initiatives and high value work.\u201d\u00a0<\/p>\n\n\n\n<p>Google Cloud is also working closely with Deloitte Cyber; Adnan Amjad, principal and U.S. cyber leader at Deloitte and Touche LLP noted that Google Unified Security \u201cbrings together a centralized data fabric, integrated threat intelligence, unified SOC and cloud workflows and agentic AI automation \u2014 creating a powerful platform to drive our clients\u2019 security transformation.\u201d\u00a0<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-agents-for-alert-triage-malware-analysis\">Agents for alert triage, malware analysis<\/h2>\n\n\n\n<p>Agentic AI is a hot topic in the enterprise right now<span style=\"box-sizing: border-box; margin: 0px; padding: 0px;\">.\u00a0AI age<\/span>nts\u00a0will eventually be able to work independently and perform tasks autonomously. Google aims to get a head start in this area, today announcing two new semi-autonomous Gemini security agents for alert triage and malware analysis.\u00a0<\/p>\n\n\n\n<p>In the company\u2019s Google Security Operations offering, an alert triage agent will investigate alerts and their context and gather relevant information before rendering a verdict. It will support this with evidence and its step-by-step decision-making.\u00a0<\/p>\n\n\n\n<p>\u201cThis always-on investigation agent will vastly reduce the manual workload of Tier 1 and Tier 2 analysts who otherwise are triaging and investigating hundreds of alerts daily, \u201d Roddy and Bailey wrote.\u00a0<\/p>\n\n\n\n<p>Meanwhile, a malware analysis agent integrated into Google Threat Intelligence will analyze potentially malicious code. The agent can create and execute scripts for deobfuscation \u2014 when threat actors intentionally make code difficult to understand or reverse engineer \u2014 and offer a final verdict and a summary of its work and findings.\u00a0<\/p>\n\n\n\n<p>Google Cloud expects to preview both agents with select customers in Q2 this year.\u00a0<\/p>\n\n\n\n<p>Roddy and Bailey assert that AI agents \u201crepresent a catalyst for security teams to reduce toil, build true cyber-resilience and drive strategic program transformation.\u201d\u00a0<\/p>\n\n\n\n<p>\u201cAgentic AI is powering a fundamental shift in how security operations are conducted,\u201d they write. \u201cOur vision is a future where intelligent agents work alongside human analysts, offloading routine tasks, augmenting their decision-making and freeing them to focus on complex issues.\u201d\u00a0<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-google-cloud-introduces-new-dspm-capabilities-compliance-management\">Google Cloud introduces new DSPM capabilities, compliance management<\/h2>\n\n\n\n<p>No doubt, AI is one of the most transformative technologies in enterprise today \u2014 but its prevalence across enterprise workflows also makes it a serious security risk. Google Cloud is updating its Security Command Center, including specific AI protections and a \u201cModel Armor\u201d that integrates directly into Vertex AI.\u00a0<\/p>\n\n\n\n<p>With the new protections, security teams can discover AI inventory, secure models and data and detect and respond to threats specifically targeting AI systems. With Model Armor, they can apply content safety and security controls around prompts and responses for various models and clouds.\u00a0<\/p>\n\n\n\n<p>Along with these new capabilities, Google is also introducing a new data security posture management (DSPM) tool to help enterprises discover and classify sensitive data, set and enforce data security and compliance controls and monitor for violations. Further, Security Command Center now features a new compliance manager that provides a full view of an enterprise\u2019s compliance state.\u00a0\u00a0<\/p>\n\n\n\n<p>Other security announcements from Google Cloud Next:\u00a0<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>New data pipeline management capabilities in Google Security Operations that enable enterprises to transform and prepare data for downstream use, filter and route it to different destinations and redact sensitive data.\u00a0<\/li>\n\n\n\n<li>Chrome Enterprise updates, including new phishing protections against lookalike sites and other portals that attempt to steal user credentials. Organizations can also configure assets and branding to fight against phishing attempts disguised on internal domains.\u00a0<\/li>\n\n\n\n<li>New Mandiant Threat Defense service for Google Security Operations. Mandiant experts can work alongside customers\u2019 security teams and support AI-assisted threat hunting, perform investigations and launch responses based on security orchestration, automation and response (SOAR) playbooks.\u00a0<\/li>\n<\/ul>\n<div id=\"boilerplate_2660155\" class=\"post-boilerplate boilerplate-after\"><div class=\"Boilerplate__newsletter-container vb\">\n<div class=\"Boilerplate__newsletter-main\">\n<p><strong>Daily insights on business use cases with VB Daily<\/strong><\/p>\n<p class=\"copy\">If you want to impress your boss, VB Daily has you covered. We give you the inside scoop on what companies are doing with generative AI, from regulatory shifts to practical deployments, so you can share insights for maximum ROI.<\/p>\n<p class=\"Form__newsletter-legal\">Read our Privacy Policy<\/p>\n<p class=\"Form__success\" id=\"boilerplateNewsletterConfirmation\">\n\t\t\t\t\tThanks for subscribing. Check out more VB newsletters here.\n\t\t\t\t<\/p>\n<p class=\"Form__error\">An error occured.<\/p>\n<\/p><\/div>\n<div class=\"image-container\">\n\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/venturebeat.com\/wp-content\/themes\/vb-news\/brand\/img\/vb-daily-phone.png\" alt=\"\"\/>\n\t\t\t\t<\/div>\n<\/p><\/div>\n<\/div>\t\t\t<\/div>\r\n<br>\r\n<br><a href=\"https:\/\/venturebeat.com\/security\/google-cloud-intros-ai-security-agents-unified-security-platform-to-consolidate-ops-triage-threat-intel\/\">Source link <\/a>","protected":false},"excerpt":{"rendered":"<p>Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More Enterprise infrastructure is increasingly complex, meaning protecting it is, too.\u00a0 The attack surface is more expansive than ever, and many enterprises have a patchwork quilt of security tools, making it difficult to gain a cohesive understanding [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1208,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[33],"tags":[],"class_list":["post-1207","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ai-automation"],"aioseo_notices":[],"jetpack_featured_media_url":"https:\/\/violethoward.com\/new\/wp-content\/uploads\/2025\/04\/Google-Cloud.jpeg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/violethoward.com\/new\/wp-json\/wp\/v2\/posts\/1207","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/violethoward.com\/new\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/violethoward.com\/new\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/violethoward.com\/new\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/violethoward.com\/new\/wp-json\/wp\/v2\/comments?post=1207"}],"version-history":[{"count":0,"href":"https:\/\/violethoward.com\/new\/wp-json\/wp\/v2\/posts\/1207\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/violethoward.com\/new\/wp-json\/wp\/v2\/media\/1208"}],"wp:attachment":[{"href":"https:\/\/violethoward.com\/new\/wp-json\/wp\/v2\/media?parent=1207"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/violethoward.com\/new\/wp-json\/wp\/v2\/categories?post=1207"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/violethoward.com\/new\/wp-json\/wp\/v2\/tags?post=1207"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69e302c146fa5c92dc28ac12. Config Timestamp: 2026-04-18 04:04:16 UTC, Cached Timestamp: 2026-04-29 02:35:30 UTC -->