Upgrade & Secure Your Future with DevOps, SRE, DevSecOps, MLOps!
We spend hours scrolling social media and waste money on things we forget, but wonât spend 30 minutes a day earning certifications that can change our lives.
Master in DevOps, SRE, DevSecOps & MLOps by DevOps School!
Learn from Guru Rajesh Kumar and double your salary in just one year.
Source:-https://www.crn.com/
Google Cloud Tuesday unveiled BeyondCorp Enterprise, its new zero trust identity and security platform with agentless support delivered through Googleâs Chrome browser thatâs used by more than 2 billion users globally.
Now generally available, BeyondCorp Enterprise is designed to provide continuous and real-time end-to-end protection, scalable DDoS protection and built-in, verifiable platform security. It includes embedded data and threat protection built into Chromeâwhich has been quietly updated alreadyâ to prevent malicious or unintentional data loss and exfiltration and malware infections from the network to the browser; phishing-resistant authentication; and continuous authorization for all interactions between a user and BeyondCorp-protected resources.
Many of the zero trust options from other providers focus on the connection from the user to the app or the user to the network, according to Rick Caccia, Google Cloud securityâs marketing head. BeyondCorp Enterprise is the only system where every single interactionâfrom user to app, app to app to other infrastructure components all the way throughâis reauthorized, Caccia said.
âThe years of security weâve built into the system enables the trust that cloud users need,â Caccia said.
The turnkey product offering encompasses a series of functionalities that leverage what Sunil Potti, general manager and vice president of cloud security for Google Cloud, calls âsignificant amplifiers that only Google can provide.â
âEssentially, all of our PoPs [points of presence] now are lighted up with the same functionality that powers Google employees,â Potti said. â[Theyâre] now available to essentially both protect, but also transit, the Google network from wherever users are to wherever their apps are in the form of BeyondCorp Enterprise.â
The offering extends to connections to Googleâs 144 global network edge locations.
The Chrome browser now has built-in capabilities that use Googleâs Cloud Data Loss Prevention and Safe Browsing APIs, a Google service that lets client applications check URLs against Googleâs constantly updated lists of unsafe web resources.
âWe worked with Chrome to build all those into BeyondCorp Enterprise and turn it on,â Caccia said. âIt also uses things like two-factor keys so that we can prevent against phishing and credential theft. In the network itself, we have cloud-based micro-segmentation, so that every piece of the network implements authorizations, sort of from component to component. And we have our own global certificate management system built in that customers can use to make sure that theyâve got updated certs anywhere that encryption has to happen.â
As evidenced by the SolarWinds breach, being able to verify a platform from chips to apps and having features such as binary authorization to make sure that apps havenât had their source code tampered with are important, Caccia noted.
âAll of those are in the network,â he said. âIt means that customers can trust this as a platform to run on.â
Google Cloudâs BeyondCorp Approach
Zero trust is a security concept based on the premise that there is no inherent trust in a network, and that all access to a network must be secured, authorized and granted based on knowledge of identities and devices.
BeyondCorp refers to the zero trust access approach that Google Cloud started pursuing in 2011. Itâs the technology suite that it uses internally to protect Googleâs applications, data and users, allowing its own employees to work from untrusted networks on a variety of devices without using a client-side VPN.
âGiven the new work-from-home environment, but also the recent attacks, ultimately someone has to come in and say, âLook, unlike a mobile world, where a new OS really had built-in security, we still live in a world of heterogenous OSes, whether it be public clouds, private clouds and so forth,â Potti said. âSo unless we make a seismic change in terms of offering a zero trust OS of some sort as a layer that sits on top of this hybrid environment, I donât think weâll ever make a sea change in terms of trust and risk management. Thatâs really the genesis behind how weâre thinking about BeyondCorp Enterprise as a truly comprehensive view towards zero trust.â
BeyondCorp Enterprise extends and replaces BeyondCorp Remote Access, Googleâs cloud offering introduced last April that allows organizationsâ employees and extended workforces to access internal web applicationsâcustomer service systems, call center applications, software bug trackers, project management dashboards, employee portalsâfrom almost any device, without a traditional remote-access VPN, while protecting their data.
âPost-COVID, we were able to give what I call a âdownpaymentâ on the uber zero trust offering that weâve been working on for a few years in terms of packaging BeyondCorp in its entirety, not just in a piecemeal solution, so that customers anywhere could consume the same capabilities that we currently use to protect our employees and our applications and so forth,â Potti said.
The challenge in developing BeyondCorp Enterprise was enabling disruptive security innovation with a cost-effective offering that requires minimal disruption to existing deployments and business processes, according to Potti.
BeyondCorp Enterprise Partner Ecosystem
Google Cloud designed BeyondCorp Enterprise as an open and extensible offering that can support a variety of complementary security offerings from its BeyondCorp Alliance partners. It intentionally built a forward-looking ability to seamlessly plug in services and value-adds, both in terms of new capabilities on the endpoint or inside the network close to the app, and exchange data and signals, so the overall âIQâ of the system is improving with a partner ecosystem, according to Potti.
That ecosystem includes Citrix Systems, CrowdStrike, VMware and Tanium, a Kirkland, Wash.-based endpoint management and security provider, among others.
âFor most devices, thereâs more to them than the browser, and thatâs where a partner like Tanium [comes in with] their ability to manage the endpoint, make sure there are patches and also to detect and block threats on there,â Caccia said. âWorking together, we have APIs that the two products use so that we can understand the endpoint. Chrome browser drives that, and Tanium can drive that.â
Taniumâs customers include 70 Fortune 100 companies and the U.S. Department of Defense, which have been struggling with need to move toward zero trust.
âWhat the industry historically has presented to them was a very fractured model for this, so that, in essence, they had to cobble together potentially 10 different vendors to get a contiguous zero trust experience,â said Orion Hindawi, Taniumâs co-founder and CEO. âJust keeping that working was something that was beyond the vast majority of companies.â
Managing the endpoint state is required to implement zero trust, and Tanium had been waiting for a provider to come out with a fabric that would allow a contiguous solution, according to Hindawi.
âItâs incredibly convenient that itâs Google, because I think Google, if you look internally, is by far the leading implementer of zero trust in industry in production,â he said. âWhat weâve been able to do with them has been really novel in the sense that weâve been able to spend a lot of time customizing the interfaces that weâre supplying data into. Being able to change state and have that state reflect access and ability to use the environment in real time is incredibly critical.
âWeâve actually seen Google implement on the back end, at the kind of fabric layer, the ability to respond to those inputs incredibly quickly. If something isnât patched correctly, or users are exhibiting behavior that you donât expect, or potentially we see applications that are misbehaving, in real time, you need to be able to condition is identity granted, are you able to use applications,â Hindawi said.
From Taniumâs perspective, endpoint management is critical, according to Hindawi.
âCoupled with a really powerful zero trust element, we really think it can fundamentally transform the way that our customers perceive their responsibility for security,â he said. âAnd I think this is the first time actually in our industry where weâve seen an end-to-end approach that looks like itâs absorbable by customers and that can actually give them the value that zero trust has been purported to provide for a long time, but that theyâve really been searching for a way to implement.â
Deloitte Consulting
Google Cloud will continue collaborating with Deloitte Consultingâs cyber practice to deliver end-to-end architecture, design and deployment services to customers.
âGoogle has built a reputation and a pedigree of sharing and bringing to market the champagne that they drink in-house,â said Arun Perinkolam, a Deloitte Consulting principal who serves as its Google Cloud cyber practice leader.
Organizations today are faced with the rapid dissolution of traditional network parameters as a result of the continued shift to the cloud and hybrid IT, according to Perinkolam.
âThe challenges that organizations now have with traditional perimeter-centric security approaches and technologies have elevated the need for continuous verification of trustâacross an organizationâs device base, user base and application base,â Perinkolam said. âAt Deloitte, we recognize the move to a zero trust model and mindset as the sustainable path forward for organizations who are looking to circumvent some of these challenges while creating a cybersecurity program that is truly next generationâone that can also help address the need for scale across hybrid IT environments and offer a simplified secure user experience. When we look at Googleâs BeyondCorp technology offering, itâs able to address just that.â