Google's Zero Trust Security Platform BeyondCorp Enterprise Now Available – TechDecisions

Google’s cloud security team has announced the general availability of the company’s new zero trust product offering BeyondCorp Enterprise that extends and replaces BeyondCorp Remote Access.

According to Google, this release is in response to global cybersecurity incidents that are forcing companies to rethink their security plans as attackers become more sophisticated and skillful.

In a blog post, Sunil Potti, vice president and general manager of Google Cloud Security, said the company has for more than a decade been internally using BeyondCorp to protect Google’s applications, data and users.

“BeyondCorp Enterprise brings this modern, proven technology to organizations so they can get started on their own zero trust journey,” Potti wrote in the blog. “Living and breathing zero trust for this long, we know that organizations need a solution that will not only improve their security posture, but also deliver a simple experience for users and administrators.”

BeyondCorp Enterprise replaces and improves BeyondCorp Remote Access, Google’s subscription-based zero trust service that the company launched in April to help remote employees access internal applications without having to use a VPN.

Read Next: Google Says Company Mitigated 2.5 Tbps DDoS Attack, Largest Ever

As defined by cybersecurity giant Crowdstrike, Zero Trust is the IT security concept that all users – even those inside the enterprise network – are required to be authenticated, authorized and continuously validated before being granted or keeping access to applications and data.

According to Potti, BeyondCorp Enterprise brings three key benefits to customers and partners:

  • A scalable, reliable zero trust platform in a secure and agentless architecture that includes non-disruptive, agentless support through the Chrome Browser, Google’s global network with 144 network edge locations in more than 200 countries and territories, an entire surface protected by Google’s DDoS protection service and built-in, verifiable security.
  • Continuous and real-time end-to-end protection that includes embedded data and threat protection in Chrome, phishing-resistant authentication, continuous authorization for every interaction between a user and protected resource, end-to-end security, and automated public trust SSL certificate lifecycle management.
  • A solution that is open and extensible and built on an expanding ecosystem of technology partners in Google’s BeyondCorp Alliance, open at the endpoint to incorporate signals from security partners and extensible to the app too allow integration into services from partners.
Read More   Kampala expels boss of MTN's Uganda arm, citing 'national security' - RTL Today

Customers can’t “merely flip a switch” to implement zero trust in their own organizations, Potti said, reflecting on the company’s decade-long zero trust journey.

“Nonetheless, these enterprises understand the zero trust journey is an imperative,” Potti wrote. “As a result, we’ve invested many years in bringing our customers a solution that is cost-effective and requires minimal disruption to existing deployments and business processes, using trust, reliability and scale as our primary design criteria.”


Leave a Reply

This website uses cookies. By continuing to use this site, you accept our use of cookies.