Latest news with #GoogleSecurityOperations


Associated Press
14-05-2025
- Business
- Associated Press
StrikeReady Launches on Google Cloud Marketplace to Deliver Day One Risk Resolution With AI-Native Security Operations Platform
Security teams can now deploy StrikeReady's AI-powered Security Command Center in minutes - deeply integrated with Google Cloud's suite of security solutions and built for instant value DALLAS, TX - StrikeReady has officially landed on Google Cloud Marketplace. Now part of the Google Cloud ISV Connect Program, StrikeReady is not just joining the ecosystem—it's broadening it. StrikeReady—a launchpad for the future of unified cyber defense—has graduated from the Google Springboard program. StrikeReady is not just adapting to the AI era—the company has pioneered it since 2019. StrikeReady leverages Google Gemini while integrating deeply with Google Security Operations—which includes Chronicle, Google Threat Intelligence—which includes Mandiant intelligence and VirusTotal, Google Security Command Center, Identity and Access Management, Gmail, and more—giving organizations a unified, vendor-neutral platform that reduces mean time to respond (MTTR) by up to 90%. Customers can deploy StrikeReady directly within their Google Cloud environments, which streamlines procurement, leverages existing Google Cloud budgets, and accelerates time to value. StrikeReady is a purpose-built platform that unifies fragmented tech stacks and supercharges security teams with automation that delivers functional AI on Day One. StrikeReady accelerates your risk management program by finally delivering risk resolution. You can integrate your Google Cloud and third-party tech stack, simplify and streamline analyst experience and collaborate while managing risk across your alerts, logs, assets, vulnerabilities, identities, and more. 'StrikeReady enables your team to fully deploy Google Cloud security solutions, Gemini AI model integration and automation—all on Day One,' said Yasir Khalid, Founder and CEO of StrikeReady. 'Unifying the user experience, while integrating collaboration in the StrikeReady platform, empowers users of any skill set to maximize their impact on investigating, remediating, and resolving risks to their organization. Key Differentiators: 'Bringing StrikeReady to Google Cloud Marketplace enables customers to quickly deploy and manage the StrikeReady platform on Google Cloud's trusted, global infrastructure,' said Dai Vu, Managing Director, Marketplace & ISV GTM Programs at Google Cloud. 'StrikeReady can now securely scale and support customers that want to use its AI-powered platform to help amplify their risk investigation, remediation and resolution efforts.' To begin a conversation on how you can transform your security operations with native AI on Day One, visit us below. About StrikeReady Founded in 2019, StrikeReady introduced the first unified, vendor-agnostic, AI-powered Security Command Center delivering full-spectrum risk visibility, intelligent threat management, and automated response from a single, integrated platform. By unifying identities, assets, vulnerabilities, and advanced simulations in one place, StrikeReady empowers organizations to proactively defend against modern threats and stay ahead of an ever-shifting cyber landscape. Moving beyond conventional AI, StrikeReady leverages its Large Action Model (LAM) to automate actions across the tech stack, creating a force multiplier for security teams seeking truly proactive risk management. Recognized by Gartner as the only Virtual Security Assistant in its Emerging Technologies report, StrikeReady is dedicated to reshaping the future of cybersecurity. For more information visit Media Contact Company Name: StrikeReady Contact Person: Cara Harbor Email: Send Email Country: United States Website: Press Release Distributed by To view the original version on ABNewswire visit: StrikeReady Launches on Google Cloud Marketplace to Deliver Day One Risk Resolution With AI-Native Security Operations Platform


Techday NZ
30-04-2025
- Business
- Techday NZ
Google Cloud unveils agentic AI to boost security operations efficiency
Google Cloud has outlined its plans to integrate agentic AI into its security operations in an effort to automate routine tasks and improve efficiency for security teams. The use of agentic AI within security is intended to move beyond existing assistive AI by allowing intelligent agents to independently identify, reason through, and dynamically execute tasks, while keeping human analysts informed and involved in the process. Building on customer experiences with Gemini in Security Operations, Google Cloud aims to develop a security operations centre (SOC) where these intelligent agents collaborate with human analysts. Hector Peña, Senior Information Security Director at Apex Fintech Solutions, commented on the current benefits, stating: "No longer do we have our analysts having to write regular expressions that could take anywhere from 30 minutes to an hour. Gemini can do it within a matter of seconds." Google Cloud has recently developed new AI agents as part of its Gemini in Security suite. The alert triage agent in Google Security Operations is designed to perform dynamic investigations and deliver verdicts on alerts. This agent is expected to be available in preview to selected customers in the second quarter of 2025. It analyses the context of each alert, gathers supporting information, and provides an audit log detailing the evidence, reasoning, and decisions behind its verdicts. This tool aims to reduce repetitive work for Tier 1 and Tier 2 security analysts who manage high volumes of daily alerts. In Google Threat Intelligence, the malware analysis agent is designed to undertake the reverse engineering of potentially malicious files. Also expected to be available for preview to selected customers in Q2 2025, this agent examines suspicious code, creates and executes deobfuscation scripts, and presents a summary along with a determining verdict regarding the file's safety. The agentic SOC concept involves connecting multiple specialised agents that collaborate with analysts to automate a variety of security workflows. Google Cloud believes this could yield significant efficiency gains, enabling security professionals to dedicate more attention to complex threats and strategic priorities. Google Cloud provided examples of critical SOC functions that could be automated or orchestrated through agentic AI. These include data management, alert triage, investigation, response actions, threat research, threat hunting, malware analysis, exposure management, and detection engineering. To support the deployment of reliable AI agents, Google Cloud leverages its broad security data and expertise, advanced AI research, and integrated technology stack. The company stated that these resources allow for the development of agents capable of human-like planning and reasoning, producing consistent and high-quality outcomes across security tasks. Google also pointed to the modularity of this approach, with new agents constructed through the combination of existing security capabilities. Interoperability is also a focus for Google Cloud, with the introduction of the Agent2Agent (A2A) protocol to enable communication among agents developed by different developers, and the model context protocol (MCP) for standardised interaction between AI and security applications. Google Cloud is open-sourcing MCP servers for Google Unified Security, allowing customers to build custom workflows that combine Google Cloud and other security solutions. The company emphasises its commitment to an open ecosystem in which agents from various vendors and products can work together. Grant Steiner, Principal Cyber-Intelligence Analyst, Enablement Operations, Emerson, said: "We see an immediate opportunity to use MCP with Gemini to connect with our array of custom and commercial tools. It can help us make ad-hoc execution of data gathering, data enrichment, and communication easier for our analysts as they use the Google Security Operations platform." Google Cloud also introduced SecOps Labs, an initiative offering customers early access to AI pilots in Google Security Operations, and providing a mechanism for the community to give feedback. The initial set of pilots includes autonomous conversion of threat reports into detection rules, the generation of automation playbooks based on historical incident analysis, and updates to data parsers using natural language commands. SecOps Labs is intended as a space for teams to trial and refine AI capabilities, and help shape future Google Security Operations technologies by offering feedback based on real-world experiences.