{"id":103390,"date":"2019-11-12T12:00:40","date_gmt":"2019-11-12T20:00:40","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=103390"},"modified":"2019-11-12T09:03:57","modified_gmt":"2019-11-12T17:03:57","slug":"google-ignite","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2019\/11\/google-ignite\/","title":{"rendered":"Google Cloud at Ignite Europe \u201819"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Most enterprises have hybrid or multi-cloud deployments, and maintaining consistent security posture across all deployments is one of their top priorities. In December 2018, we announced an <\/span><a href=\"https:\/\/cloud.google.com\/blog\/products\/identity-security\/expanding-our-partnership-with-palo-alto-networks-to-simplify-cloud-security-and-accelerate-cloud-adoption\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400;\">expanded partnership with Palo Alto Networks<\/span><\/a><span style=\"font-weight: 400;\"> with exactly that goal in mind. With <\/span><a href=\"https:\/\/cloud.google.com\/security\/products\/\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400;\">Google Cloud\u2019s native security toolkit<\/span><\/a><span style=\"font-weight: 400;\"> and deep integrations with Palo Alto Networks cloud security products such as the <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/cloud-security\/vm-series\"><span style=\"font-weight: 400;\">VM-Series<\/span><\/a><span style=\"font-weight: 400;\">, <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/cloud-security\/public-cloud-products\"><span style=\"font-weight: 400;\">Prisma Cloud<\/span><\/a><span style=\"font-weight: 400;\">, and <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/cloud-security\/prisma-saas\"><span style=\"font-weight: 400;\">Prisma SaaS<\/span><\/a><span style=\"font-weight: 400;\">, you can define a consistent security posture in Google Cloud and on-premises. Let\u2019s look into some of these integrations.\u00a0<\/span><\/p>\n<p><b>Governance and compliance:<\/b><span style=\"font-weight: 400;\"> Prisma Cloud provides continuous monitoring and compliance reporting for your resource configurations, network configurations and user activity on Google Cloud. It can now detect risks and provide auto-remediation across ten core Google Cloud Platform (GCP) services, such as Compute Engine, Google Kubernetes Engine (GKE), and Cloud Storage. Prisma Cloud is also integrated with GCP\u2019s Security Baseline API (in alpha), which provides visibility into the compliance posture of Google Cloud platform. With this integration, customers can get compliance visibility into their full stack.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In addition, with <\/span><a href=\"https:\/\/cloud.google.com\/security-command-center\/\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400;\">Cloud Security Command Center<\/span><\/a><span style=\"font-weight: 400;\"> integration, customers can incorporate Prisma Cloud findings into their single pane of glass view by simply enabling the integration in <\/span><a href=\"https:\/\/console.cloud.google.com\/marketplace\/details\/redlock-gcp\/redlock-cscc\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400;\">GCP marketplace<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><b>Security analytics: <\/b><span style=\"font-weight: 400;\">Along with security governance and compliance assurance, Prisma Cloud integrates with <\/span><a href=\"https:\/\/cloud.google.com\/vpc\/docs\/using-flow-logs\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400;\">VPC flow logs<\/span><\/a><span style=\"font-weight: 400;\"> to provide useful insight into east-west and north-south traffic flows by correlating data with various security intelligence sources.<\/span><\/p>\n<p><b>Security for GCP workloads: <\/b><span style=\"font-weight: 400;\">Palo Alto Networks Twistlock protects GCP compute workloads and applications, spanning hosts, containers and serverless functions, throughout the development lifecycle. Twistlock automatically learns normal app behaviors and prevents anything abnormal. Twistlock integrates with any continuous integration (CI)\/continuous development (CD) process, registry and production environment to provide full lifecycle vulnerability management and compliance, runtime defense, cloud native firewalling and access control<\/span><b>.\u00a0<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Additionally, Palo Alto Networks VM-Series firewalls protect compute workloads with next-generation security capabilities and can be deployed directly through <\/span><a href=\"https:\/\/console.cloud.google.com\/marketplace\/details\/paloaltonetworksgcp-public\/vmseries-payg-bundle2?id=d08fc3ff-30ec-49fb-8263-92575f370c03&amp;project=acme-1-235022&amp;organizationId=750492540376&amp;orgonly=true&amp;supportedpurview=project\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400;\">GCP Marketplace<\/span><\/a><span style=\"font-weight: 400;\">. Deploying the VM-Series with <\/span><a href=\"https:\/\/cloud.google.com\/load-balancing\/\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400;\">Google Cloud Load Balancers<\/span><\/a><span style=\"font-weight: 400;\"> allows horizontal scalability as your workloads grow and high availability to protect against failure scenarios. VM-Series also takes advantage of <\/span><a href=\"https:\/\/cloud.google.com\/armor\/\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400;\">Cloud Armor<\/span><\/a><span style=\"font-weight: 400;\"> to block malicious IP addresses at Google\u2019s edge, saving on compute cycles that analyze other critical traffic flows.<\/span><\/p>\n<p><b>Security for hybrid containerized workloads:<\/b> <a href=\"https:\/\/cloud.google.com\/anthos\/\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400;\">Anthos<\/span><\/a><span style=\"font-weight: 400;\"> (formerly Cloud Services Platform) lets you build and manage modern hybrid applications. Istio is an open service mesh that can be deployed on Google Kubernetes Engine (GKE) as part of Anthos to provide a uniform way to connect, manage, and secure microservices. With the NGFW policy engine (an Istio mixer adapter developed by Palo Alto Networks) customers can secure east-west traffic based on attributes such as source namespace, source service, destination namespace, destination service and protocol through Panorama. The NGFW policy engine also provides detailed telemetry from the service mesh for forensics and analytics. The NGFW policy engine can be deployed to a Kubernetes cluster hosted on-premise or in the cloud directly through the <\/span><a href=\"https:\/\/console.cloud.google.com\/marketplace\/details\/redlock-gcp\/ngfw-policy-engine\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400;\">GCP marketplace<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><b>Data Protection for G Suite: <\/b><span style=\"font-weight: 400;\">Prisma SaaS is a security service that connects directly to SaaS applications for data classification, data loss prevention and threat detection.\u00a0 It leverages an out-of-band, API-based approach that enables granular inspection of data at rest in G Suite as well as ongoing monitoring of user activity and administrative configurations.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Learn more about our partnership and integrations at <\/span><a href=\"https:\/\/ignite.paloaltonetworks.com\/usa\/usa_home.html\"><span style=\"font-weight: 400;\">Ignite Europe \u201819<\/span><\/a><span style=\"font-weight: 400;\">:<\/span><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><b>Visit the Google Cloud booth (#300).<\/b><span style=\"font-weight: 400;\"> See our interactive demos such as Google Cloud SCC, Cloud Armor, VPC service controls, and integrations with Palo Alto Networks products.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Attend our sessions. <\/b><span style=\"font-weight: 400;\">On Wednesday, November 13th at 11:00 AM, Palo Alto Networks will share a comprehensive look at how they are migrating their internal data centers to Google Cloud. On Thursday, November 14th at 2:30 PM we\u2019ll share a comprehensive look at container security with Google Cloud.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Schedule 1:1 time with us. <\/b><span style=\"font-weight: 400;\">Talk with our team about whatever security questions you have. Fill out <\/span><a href=\"https:\/\/docs.google.com\/forms\/d\/e\/1FAIpQLSeRUV2Li5wzMXgwqji_Gc71lDSUhjv4-D_qHbwX7DAE9yFVWA\/viewform?usp=sf_link\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400;\">this form<\/span><\/a><span style=\"font-weight: 400;\"> to schedule time.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">We hope to see you there,<\/span><\/p>\n<p><b>The Google Cloud Team<\/b><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn about Google Cloud\u2019s native security toolkit and deep integrations with Palo Alto Networks cloud security products.<\/p>\n","protected":false},"author":663,"featured_media":103405,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[642],"coauthors":[6883],"class_list":["post-103390","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-google"],"jetpack_featured_media_url":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/11\/ignite-19-eu-blog-600x382.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/103390","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/663"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=103390"}],"version-history":[{"count":4,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/103390\/revisions"}],"predecessor-version":[{"id":103420,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/103390\/revisions\/103420"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/103405"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=103390"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=103390"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=103390"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=103390"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}