• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Subscribe
  • Project of the Week
  • About Us
    SEARCH
Compliance, IT Infrastructure, Network Security, News

Google Launches Threat Ready With Mandiant

Threat Ready with Mandiant is a new Google offering designed to leverage the incident response and expertise from newly acquired Mandiant.

January 24, 2023 Zachary Comeau Leave a Comment

Google Mandiant

Google is beginning to roll intelligence and expertise from cybersecurity firm Mandiant into its enterprise offerings with the launch of Threat Ready, a new solution designed to help protect enterprises with Mandiant expertise.

The new offering comes after Google acquired the cybersecurity defense and response firm last year for $5.4 billion, and the announcement marks the beginning of a deeper integration between the two companies. Now, Threat Ready with Mandiant is available for Google Cloud customers running on-prem and multi-cloud environments.

According to a blog from Sunil Potti, vice president and general manager of Google Cloud Security, data shows that threat actors are dwelling inside victim systems and networks for three weeks, and threat actors are diversifying their efforts to target and access organizations.

“This means organizations need to act fast to harden their environments, and should take advantage of the latest frontline expertise to help better protect their businesses from advanced adversaries,” Potti writes.

The new offering comes as a response to those new cyberattack trends, including those involving on-prem and multi-cloud environments.

Potti says Threat Ready with Mandiant is a three-part strategy for mitigating threats and reducing risks in diverse environments, including:

  • An in-depth assessment to identify relevant threats to help organizations understand their most relevant threats and priorities
  • Testing the effectiveness of existing security defenses by simulating attacks
  • Accessing incident response and security experts from Mandiant

“The customized protection for multi-cloud environments and workloads can be achieved by improving existing cloud architecture and configurations, identifying security threats, validating technology controls relevant to cloud-hosted environments with integrations to tools such as Chronicle and Security Command Center, and offering access to Mandiant incident response experts and consulting services,” Potti says.

Mandiant, previously part of cybersecurity company FireEye, become an independent company in 2021 after FireEye sold its services and managed detection business for $1.2 billion.

Google announced its acquisition of Mandiant in March 2022 and finalized the deal in September 2022.

Tagged With: Cybersecurity, Google, Mandiant

Related Content:

  • Sony SRG A PTZ Cameras Sony Introduces Two New AI-Enabled PTZ Cameras
  • Microsoft Office 365 Government Secret cloud, MIcrosoft Microsoft Makes Office 365 Secret Cloud Available for…
  • Concept of File management. Searching files in database., 3d vector illustration. Gen Z vs. Baby Boomers: Which Generation Has…
  • Wesco Conference Room as a Service, hybrid work, Fintech Company Standardizes on Wesco’s Conference Room as…

Free downloadable guide you may like:

  • Harnessing the Power of Digital SignageHarnessing the Power of Digital Signage

    Choosing the best solutions for messaging, branding, and communicating in today’s content-everywhere landscape

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Get the FREE Tech Decisions eNewsletter

Sign up Today!

Latest Downloads

Harnessing the Power of Digital Signage
Harnessing the Power of Digital Signage

Choosing the best solutions for messaging, branding, and communicating in today’s content-everywhere landscape

Blueprint Series Cover: What works for hybrid work
Blueprint Series: What Works for Hybrid Work

Download this free resource to learn about how IT leaders can effectively manage and implement a hybrid work model.

Guide to creating a ransomware response plan download
Blueprint Series: Creating a Ransomware Response Plan

Chances are ransomware hackers are researching your company right now. They’re investing time and money to choose the most profitable targets and a...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!
Sharp Microsoft Collaboration HQ Logo

Learn More About the
Windows Collaboration Display

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Subscribe to the Newsletter
  • Contact Us
  • Media Solutions & Advertising
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSTERMS OF USEPRIVACY POLICY

© 2023 Emerald X, LLC. All rights reserved.