-
Video
-
Table of contents
-
Video

- Description
- Transcript
- Discussion
About the talk
COVID-19 has undoubtedly made securing the enterprise more complicated. How do you navigate a world of remote workers, untrusted (home) networks, and 10x the number of online transactions? What should you expect, and how should you (re-) prioritize your security initiatives? Learn how to achieve operational security with operational simplicity, and how Google Cloud is helping customers while keeping costs down.
Speakers: Sunil Potti, Vint Cerf
Watch more:
Google Cloud Next ’20: OnAir → https://goo.gle/next2020
Subscribe to the Google Cloud Channel → https://goo.gle/GoogleCloud
#GoogleCloudNext
SOLKEY205
fullname: Sunil Potti, Vint Cerf;
About speakers
I'm vice president and GM for security and Google Cloud. Really appreciate you taking some time away from work, especially in this interesting times. I hope you're all feeling safe and stay engaged for that working at home and checked. This first few months of dealing with covid-19 organizations expected to slow down. In the strategy, we actually saw the officer that is most customers that use for cloud-based services. The more things change. And in some cases, in the case of Costco read, you've got to manage The New Normal with distributed Workforce,
new digital strategies, many companies are transitioning to online safely. Newmarket models emerging, they are actually real opportunities to actually bring forward. What would have been transformation that would have taken many years now becoming many weeks And so that's really what vehicles are generally embraced and the case of security because we believe that we can actually create from these things, we sort of like doing that across a few dimensions and a couple of the most important thing in peace and
security. Do you say if you posture especially in this new distribution lineman, but at the same time and if you can do both of them at the same time, then we have a game-changing capability to embrace the new normal but in a safer way. So let me talk about these things in more detail, protecting your users, your data on your applications, by Staind compliant. We all know a Scavenging, the best of times during the times of Crisis and change it obviously becomes way more difficult really unique
powerful capabilities to simplify your security operations to start with the way your feeling that we currently have public match. OK Google is now being manifested as Enterprise consumable Products as well as Mark Nason security Wedding Date us entered one of the most popular too. So we currently have on our platform is out security Command Center SEC, which is a major security posture management system, which prevents and detects abuse of her Cloud resources. A centralized security findings from GC Services and Parking Services, hope you're
not down. Is I did a whole slew of new capabilities in SEC premium. Michigan spot. That's using Google intelligence for events in TCP logs in containers, which is just another example of bringing call. Google IP to our Enterprise customers, whatever they are, and lots of surface. A much larger set of legs and perform automated compliance scanning and uploading verify that you could figure your resources properly and safely and documented for anyone who has keeping deployment and management
simple. The first one is assured your clothes, which is really a set of controls for customers in regulated Industries, where you can configure and deeply sensitive workloads. I called you a security and compliance, but just in a few clicks. It should work loads. Is it the separate Cloud instance with limited functionality that runs months behind on getting new features? It actually is a software that leverages the power of one, Google, but remove the trade-off between the cloud and having the
ends of the flip side of that is, how do you actually bring a lot more confidence trust into the platform? And the 2nd Dimension, is that what we're calling as confidential computing? And to tell you more about our efforts here, there's no better person than a cheap evangelist windsurf or deodorant. Hey everyone, 1971 email showed up as an arpanet project. It opened up new possibilities mailing list like sci-fi lovers and yum. Yum 4 restaurant reviews were created, spam follow not very long after when someone from digital Equipment Corporation Santa have a job posting at that
time, email was only used by government and academic. We know, it was only a matter of time before organizations saw the infinite possibilities that email would open up. There are few moments in life when new technologies emerge that can fundamentally change, how the future is going to unfold at Google. We believe the future of cloud computing will increasingly shift to private incryptid services for users can be confident that their data is not being exposed to Cloud providers or their own insiders. This is the future. We want to help bring about a confidential
Computing makes it possible. When organizations are ready to move, their workloads to the cloud. One of the biggest challenges is how to process sensitive data. While still keeping it private Google cloud and Crips all data in transit between our users enter data centers, as well as it Rest by default. However, when data is being processed, there's no easy solution to keep it in crafted. We believe the customer shouldn't have to choose between usability performance and confidentiality to complement our encryption in transit and addressed. We will now offer the ability to encrypt data
in use while it's being processed and you can enable this in just a few clicks, this is called confidential Computing and the first product in our confidential Computing portfolio. Confidential vm's is now in beta for you to try Confidential Computing environments. Keep data is encrypted memory and elsewhere outside the CPU. Jada is decrypted within the CPU boundary by memory controllers using a bed Hardware keys that Google doesn't have access to and was confidential bm's. This level of confidentiality can be achieved without the need to make
any changes to your application. With Google Cloud. We already have a variety of isolation in sand boxing techniques. Then make her a multi-tenant architecture, secure confidential vm's, take this, to the next level by using memory encryption to further, isolate workloads, and tenants from each other and from the cloud infrastructure. Our goal is to ensure the capabilities are agnostic to the hardware were used. In addition to supporting AMD CPUs, we're planning to work on other CPU, vendors and extend support to gpus gpus and
fpgas in parallel. We've helped create the confidential Computing Consortium to engage with stakeholders and work towards more transparent and interoperable services with confidential Computing. We can unlock Computing scenarios which previously have not been possible. Imagine being able to share confidential data sets and collaborate on Research in the cloud, all while preserving privacy. Imagine being able to develop vaccines more quickly and cure diseases. As a result of this Shakira collaboration. Transformational Technologies, solve
problems and make our lives better confidential. Computing can be a catalyst to transform the way organizations process data in the cloud. We can't wait to see the possibilities. This technology will enable for your organization. This is a game-changer just like the Advent of email was 50 years back. And yes, you heard it here first. Then with that, all handed back to Sanel, Thanks again for joining us, always fun to have you in a discussion. That's a real pleasure to hear from you. So as you can see, from all these announcements, our goal is to give you a world-class
security and more importantly, operation Simplicity as you and praise Google Cloud to activate. It is to let me speak to customers. They also tell about priorities of the new not what we were to where you are so that you can Mark Knight Security in place, to protect your customers and your employees. As you can imagine. Now, most of the employees are not all, aren't in your headquarters, they're not bad skin and they're not working from secure networks, so they're at home on home, network account and machine for personal business use.
So protecting your business in this environment requires to rethink because a simple VPN will not cut it, but it's not a long-term durable, safety Foster, especially if you're going to be in this environment for a long time. A Google. We've been operating securely in this way for over a decade and essentially what we have now done is bring that same IP and technology so that you can consume it in this new normal. Now the other dimension is protecting users especially as most customers are going
online and this is actually resulting in increased malicious activity and that's why Google Cloud Creative Solutions to stop Bots. Fraud in general, especially online fraud, and now everything's cold. That can help keep your online Channel. Safe. In the first dimension of protecting employees is beyond carpet remote access and access provides a user-friendly zero trust access to internal abs without of this is how hundred thousand plus Google, employees access systems, everyday organization, such as New York City, cyber
command used to be on car. So that he has access to essential resources, whatever. They are a security security from your data centers and other clouds to detect malware investigate incidents at the speed of search. Now, when you flip it to protecting you or users the first week and that is enough for this solution, which uses signals from over four billion devices to keep your user safe from malicious links in phishing attempts and complimented. We have recaptured Enterprise, which prevents box from taking your customer accounts. It's
able to provide you the second level of an indication and safety to ensure that the customers with logging in Canfield comfort with your friend already for text, over four million website against that come from. So if we capture and reference to protect your customers and make sure that Fraud and Abuse don't Spike as well. We know we can't do it alone. In general adopting, an open pasture both in the technologies that we build with a ton of countries with open sores but also in the way that
we actually embrace Partnerships, The Creator. One plus one equals three kind of effect for a customer's. So this week and go to market activity, including Palo Alto networks on the X or Marketplace and then metanium who's integrating an offering Chronicle with that endpoint security and management solution. The tanium chronicle integrated offering sold by tanium Links, and find data from tanium. With other Telemetry such as DNS and proxy data and Chronicle to provide a clearer picture of threats in the Enterprise. But in the same
single solution set the chronicle retains and it improves customers, the ability to investigate incidents over long periods of time which ultimately is where all the fence line. So you can douching, we all know that defending, the Enterprise requires, continuous Evolution have me, even more clear. With compliance automation, simpler security operations and better protection for employees, and customers, adjust evolve and make today. A normal a safe word, normal this week with the new capabilities, that wasn't using all that we've already bought the market in 2028.
Just keep coming back and fine motor car. Google.com to kill to thank you again for taking the time to support and looking forward to engaging with you all.
Buy this talk
Ticket
Interested in topic “IT & Technology”?
You might be interested in videos from this event
Similar talks
Buy this video
Conference Cast
With ConferenceCast.tv, you get access to our library of the world's best conference talks.
