TrustRadius: an HG Insights company

Google Security Operations

Score8 out of 10

11 Reviews and Ratings

What is Google Security Operations?

Chronicle is a cloud-native SecOps platform used to proactively uncover the latest threats in near real-time, and enable security teams to detect, investigate and respond with speed and precision. It is based on the former Siemplify.

Media

Marketplace
Case Management
Interactive Investigation
Incident Management
Incident Response Playbooks
Interactive Dashboards

1 / 6

Google SecOps a replacement for legacy SIEM

Use Cases and Deployment Scope

Google Security Operations actually replaces our company old SIEM solution. The new UDM feature actually changes the way anyone can query the logs and get high quality co-relation.

Pros

  • UDM model, makes use of co-relation across various field.
  • The UI is quite nice and easy to understand.
  • The search throughout is high which makes it easy to query and get results.

Cons

  • The alert page is very underdeveloped as compared to other solutions.
  • The page which handles automation UI is also very hard to understand.

Return on Investment

  • SOC analyst can get faster result when query SIEM solutions for answers.
  • Although there is a learning curve for the new query language but it's quite very strong and query accurate results.

Usability

Alternatives Considered

Vectra AI Platform and CrowdStrike Falcon

Other Software Used

UKG Pro, ADP Global Payroll

Siemplify simplifies work through automation.

Use Cases and Deployment Scope

Siemplify, now part of Google Cloud is implemented in our IT department to inspect and visualize data to identify breaches and automate manual processes. The automation of processes has minimized the time we need to inspect and fix up security problems. It provides us with a sole pane of glass for SOC to work out of. We scale and carry out a lot of out-of-the-box integrations with multiple software across the single pane of glass.

Pros

  • automation of repetitive processes
  • customized playbooks.
  • The alert triage quality.

Cons

  • Playbook should put on view every domain that it is able to read.

Most Important Features

  • group alerts
  • integration capabilities.
  • threat surveillance

Return on Investment

  • automates repetitive tasks increasing output
  • has reduced unnecessary workload on our analysts.
  • Its high security intelligence has minimized time for remediation o security breaches.

Other Software Used

Splunk Enterprise Security (ES), IBM Resilient Security Orchestration, Automation and Response (SOAR)

SOARing high with automation

Use Cases and Deployment Scope

We are using Siemplify as out SOAR platform and this has really help us identify all the security events and alerts across the organization.I love the fact how this allows to create custom integrations and connectors when required. The playbook is very handy and how it allows to quickly triage the alerts and also has an option to add threat intelligence prior to analyzing that particular event.

Pros

  • SOAR
  • Threat Intel
  • SIEM

Cons

  • Connector improvement
  • UX experience
  • Reporting

Most Important Features

  • Threat Intelligence

Return on Investment

  • Python is required
  • Need to understand conenctors

Alternatives Considered

Rapid7 InsightConnect

Other Software Used

ServiceNow Security Operations