Google Adds Security Integrations in Chrome; Cloud Enterprise Connectors Framework – TechDecisions

To help IT teams gain insights about potential security threats and events from Chrome, Google is launching the Chrome Enterprise Connectors Framework, a new set of plug-and-play integrations with security solution providers, such as Splunk, Palo Alto Networks and CrowdStrike.

Google says the Chrome Enterprise Connectors Framework will help protect users when they navigate to a known malicious site, download or upload a file containing known malware, reuse corporate passwords on non-approved sites and change corporate passwords after using them on non-approved sites.

These integrations are set and configured through the Chrome browser cloud manager, accessible through the Google Admin console.

Once in the admin console, IT teams can configure security events reporting to view them directly in the audit log of the console.

Google Workspace

Using the Google Admin console, IT can enroll Google Chrome browser and get detailed information about browser deployment. IT admins can set policies, manage extensions and more. The Chrome management policies can be set to work alongside any user-based policies that may be in place through Workspace.

Once admins have enabled security events reporting, they then can view the reporting events with audit logs. Premium Google space customers, including those on the enterprise plus or education plus plans, can use the Workspace security investigation tool to identify, triage and act on potential security threats.

Google Cloud BeyondCorp Enterprise Essentials

Google also launched Cloud BeyondCorp Enterprise Essentials to provide organizations an easier way to begin their zero trust journey, adding an additional security layer to the workforce by providing key threat and data protection capabilities.

According to Google, the feature filters and blocks harmful URLs in real-time, identify phishing sites, stop downloads and transfers of malicious content, prevent the loss of sensitive data, prohibiting pasting of protected content and enforcing data protection policies.

For more information, visit the Google Cloud blog.


Leave a Reply

This website uses cookies. By continuing to use this site, you accept our use of cookies.