Just released - Read the latest Defenders Advantage report -Download today

Security and identity

We offer security products that help you meet your policy, regulatory, and business objectives. The rich set of controls and capabilities we offer is always expanding.

Explore our products

CategoryProduct Key features
Cloud security

Platform for defending against threats to your Google Cloud assets.

  • Centralized visibility and control

  • Threat prevention

  • Threat detection

  • Asset discovery and inventory

Compliance and security controls for sensitive workloads.

  • Enforcement of data location

  • Limit personnel access

  • Built-in security controls

  • Enforcement of product deployment location

Permissions management system for Google Cloud resources.

  • Single access control interface

  • Fine-grained control

  • Automated access control recommendations

  • Context-aware access

Help protect your applications and websites against denial of service and web attacks.

  • Adaptive protection

  • Support for hybrid and multicloud deployments

  • Pre-configured WAF rules

  • Bot management

Manage encryption keys on Google Cloud.

  • Centrally manage encryption keys

  • Deliver hardware key security with HSM

  • Provide support for external keys with EKM

  • Be the ultimate arbiter of access to your data

Scalable zero-trust platform with integrated threat and data protection.

  • Security layered to protect users, data, resources, and applications

  • Access policies based on identity and context

  • Experience that is simple for admins and end-users with an agentless approach

Incorporate the same OSS packages that Google uses into your own developer workflows.

  • Code scanning and vulnerability testing

  • Enriched metadata

  • SLSA-compliant builds

  • Verified provenance and automatic SBOMs

Cloud provider visibility through near real-time logs.

  • Explicitly approve access with Access approval

  • Access justifications shows the reason for access

  • Resource and method identification

View, monitor, and analyze Google Cloud and Anthos assets across projects and services.

  • Fully managed inventory service

  • Export all your assets at a point of time

  • Export asset change history

  • Real-time notification on asset config change

Sensitive data inspection, classification, and redaction platform.

  • Data discovery and classification

  • Mask your data to safely unlock more of the cloud

  • Measure re-identification risk in structured data

Cloud-first, managed network threat detection with industry-leading security.

  • Intrusion detection service

  • Cloud-first network threat detection

  • Industry-leading threat intelligence

Encrypt data in use with Confidential VMs.

  • Real-time encryption in use

  • Lift and shift confidentiality

  • Enhanced innovation

Global and flexible next-generation firewall to protect your cloud resources.

  • Hierarchical firewall policies

  • Intrusion Detection and Prevention Service

  • Domain filtering

  • Built-in TLS inspection

Store API keys, passwords, certificates, and other sensitive data.

  • Replication policies

  • First-class versioning

  • Cloud IAM integration

  • Audit logging

Protect sensitive data in Google Cloud services using security perimeters.

  • Helps mitigate data exfiltration risks

  • Centrally manage multi-tenant service access at scale

  • Establish virtual security perimeters

  • Deliver independent data access control

Virtual machines hardened with security controls and defenses.

  • Verifiable integrity with secure and measured boot

  • vTPM exfiltration resistance

  • Trusted UEFI firmware

  • Tamper-evident attestations

Unified platform for IT admins to manage user devices and apps.

  • Advanced account security

  • Device security on Android, iOS, and Windows

  • Automated user provisioning

  • Unified management console

Use identity and context to guard access to your applications and VMs.

  • Centralized access control

  • Works with cloud and on-premises apps

  • Protects apps and VMs

  • Simpler for admins and remote workers

Hardened service running Microsoft® Active Directory (AD).

  • Compatibility with AD-dependent apps

  • Familiar features and tools

  • Multi-region and hybrid identity support

  • Automatic patching

Smart access control for your Google Cloud resources.

  • Smart access control

  • Helps you understand and manage policies

  • Greater visibility

  • Advanced automation

Help protect your website from fraudulent activity, spam, and abuse.

  • Scores that indicate likely good or abusive actions

  • Take action based on scores

  • Tune the service to your website’s needs

  • Flexible API; integrate on your site or mobile app

Add Google-grade identity and access management to your apps with our customer identity and access management (CIAM) platform.

  • Authentication as a service

  • Broad protocol support

  • Multi-tenancy

  • Intelligent account protection

Detect malicious URLs on your website and in client applications.

  • Check against comprehensive list of known unsafe URLs

  • Application agnostic

  • Allow client apps to check URLs with Lookup API

  • Download and store unsafe lists with Update API

A fully managed sensitive data protection service.

  • Designed to help you discover, classify, and protect your valuable data assets with ease

Monitor and secure egress web traffic to help protect cloud workloads.

  • Configure your clients to explicitly use Secure Web Proxy as a gateway

Meet digital sovereignty requirements with partner-operated sovereignty controls for Google Cloud.

  • Robust controls that can be created to provide additional security measures


Supporting digital sovereignty with uncompromising power of choice.


  • Solutions that provide sovereignty, choice, and security for customers across the world

Frontline Intelligence and expertise

Access the latest intel from the frontlines.

  • Driven by expertise and intelligence

  • Prioritize resources

  • Operationalize threat intelligence

  • Understand your active threats

See your organization through the eyes of the attacker.

  • Automated external asset discovery and enumeration

  • Infrastructure integrations into cloud and DNS providers

  • Technology fingerprinting and searchable inventory

  • Active and passive checks for external assets

Unique visibility into threats.

  • Static threat indicators

  • Behavior activity and network comms

  • In-the-wild information

Know your security can be effective against today's adversaries.

  • Report evidence of cyber preparedness and value of security investments

  • Capture data on your security controls to help optimize cyber defenses

  • Pinpoint vulnerabilities and immediate changes required before an attack occurs

Visibility into deep, dark, and open web.

  • Monitor

  • Anticipate

  • Detect

Mitigate cyber threats and reduce business risk with the help of frontline experts.

  • Improve cyber defenses through assessments

  • Access experts to prioritize and execute improvements

  • Prove security effectiveness and strategic investments through technical testing

Help tackle breaches rapidly and confidently.

  • Incident responders are available 24x7

  • Rapid response to minimize business impact

  • Quickly and fully recover from a breach

Find actionable incidents in real time

  • Can accelerate alert triage and investigation

  • Can reduce dwell time with continuous threat hunting

  • Help resolve incidents quickly

  • Extend your team with access to expertise and intelligence

Secure your AI systems and harness the power of AI for your defenders

  • Secure the use of AI

  • Validate the defenses protecting AI

  • Use AI to enhance cyber defenses

Comprehensively address business risk related to cyber threats

  • Mitigate risk and minimize liability resulting from cyber attacks

  • Simplify cyber risk management

  • Full spectrum of cyber security services

Enhance security capabilities to help outmaneuver today’s threat actors and provide resilience against future compromise.

  • Improve capabilities against threats

  • Advance approach to cyber risk management

  • Strengthen defenses against supply chain attacks

  • Evaluate insider threats

See how your security program performs under pressure with simulated attacks against your environment to harden systems and operations.

  • Test security controls and operations

  • Evaluate with real-world attacks

  • Harden against the latest threats

  • Identify and close security gaps

Establish and mature cyber defense capabilities across functions.

  • Work to improve processes and technologies

  • Up-level threat detection, containment, and remediation capabilities

  • Receive hands-on support to implement necessary changes

  • Help optimize security operations and hunt functions

Operationalize threat intelligence.

  • Make confident, timely decisions about the threats actively targeting you

  • Empower your team with expert insights and focused defenses via personalized research

  • Build and develop your threat intelligence program

Let Mandiant help you advance your cybersecurity resilience — before, during, and after an incident.

  • Engage with security experts to evaluate threats

  • Understand how to best strengthen your cyber defenses beyond just technology solutions

Incident response retainer and security experts you need, when you need them.


  • Allows you to establish terms and conditions for incident response services before a cybersecurity incident is suspected

  • A trusted partner on standby

  • A proactive approach that can reduce both response time and the impact of a breach

Evolve your organization's cybersecurity skills with Mandiant Academy


  • Stay ahead of cyber criminals with skills training on the latest security techniques and threats

  • Instructor-led classes, certification programs, and hands-on exercises led by top experts

Security operations

Detect, investigate, and respond to threats fast

  • Detect more threats with less efforts

  • Investigate with the right context

  • Respond with speed and precision


Uncover hidden attacks with elite threat hunters by your side.

  • Identify detection and visibility gaps

  • Reduce attacker dwell time

  • Hunt on 12-months of hot data directly within Google SecOps

Explore our products

Platform for defending against threats to your Google Cloud assets.

  • Centralized visibility and control

  • Threat prevention

  • Threat detection

  • Asset discovery and inventory

Access the latest intel from the frontlines.

  • Driven by expertise and intelligence

  • Prioritize resources

  • Operationalize threat intelligence

  • Understand your active threats

Detect, investigate, and respond to threats fast

  • Detect more threats with less efforts

  • Investigate with the right context

  • Respond with speed and precision


Take the next step

Start building on Google Cloud with $300 in free credits and 20+ always free products.

Google Cloud