Alphabet Launches A Cybersecurity Company - Chronicle

Alphabet, the parent company of Google, Nest, Waymo, and a million other companies, is launching a new company under the Alphabet umbrella.

It's called Chronicle, and the new company wants to apply the usual Google tenets of machine learning and cloud computing to cybersecurity.

The company is already up and running with an absolutely awesome URL, "chronicle.security," along with two introductory blog posts (1, 2), a logo, a Twitter account, and a vague sales pitch for some kind of security analysis product.

The Chronicle team started in February 2016 under Alphabet's "Moonshot factory" X group and, before now, had been in stealth mode.

According to the website, the company is building a "cybersecurity intelligence platform" that can help organizations better manage and understand their own data.

Stephen Gillett, the new CEO of Chronicle, explained the company best by writing:

'We want to 10x the speed and impact of security teams' work by making it much easier, faster and more cost-effective for them to capture and analyze security signals that have previously been too difficult and expensive to find. We are building our intelligence and analytics platform to solve this problem.'

This analytics platform will be powered by the massive amount of computing power and storage in Alphabet's server infrastructure. Gillett says this will give Chronicle two big advantages:

First, Gillett says, Chronicle "should be able to help teams search and retrieve useful information and run analysis in minutes, rather than the hours or days it currently takes."

Second, tons and tons of cheap Google storage will help Chronicle customers "see patterns that emerge from multiple data sources and over years."

Nailing down Chronicle's exact business model is challenging since it isn't selling a product yet. For now, the company is just privately testing "an early alpha program" of its "cybersecurity intelligence platform."

“Presumably, this means turning over a lot of data to Chronicle for analysis, but the company says things will be kept separate from Alphabet with "our own contracts and data policies with our customers."

While Chronicle will act independently of Alphabet and Google, it'll still have access to all of their tech. This should give the fledgling firm a shedload of powerful kit and infrastructure to help keep hackers at bay.

But hackers are getting increasingly crafty and can pry holes in all manner of digital things, so time will tell if Chronicle can live up to its bold claims.

Ars Technica:      The Inquirer

You Might Also Read: 

UK Cybersecurity Firm Sophos Is Trouncing Silicon Valley:

Cyber Security Firm Tanium Raises New Capital At $2.5billion Valuation:

 
« Drones: A Crowd-Management Solution
High Tech Police Tool Up For Winter Olympics »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

QinetiQ

QinetiQ

QinetiQ is one of the world's leading defence technology and security companies. Areas of activity include air, land, sea and space systems, weapons, robotics, C4ISR and cyber security.

Endace

Endace

Endace is a leader in network visibility, network recording and packet capture solutions for security, network and application performance monitoring.

National Centre of Incident Readiness & Strategy for Cybersecurity (NISC) - Japan

National Centre of Incident Readiness & Strategy for Cybersecurity (NISC) - Japan

NISC was established as a secretariat of the Cybersecurity Strategy Headquarters in collaboration with the public and private sectors to create a "free, fair and secure cyberspace" in Japan.

Intland Software

Intland Software

Intland offer an integrated Application Lifecycle Management platform that offers all-round Requirements, Development, and Testing & Quality Assurance functionality.

ComCERT

ComCERT

ComCERT SA is an independent, private consulting company focusing in the assistance of its customers facing the dangers of cyber threats and security incidents.

42Gears

42Gears

42Gears is a leading Unified Endpoint Management provider. Secure, monitor and manage tablets, phones, desktops and wearables.

MythX

MythX

MythX is the premier security analysis service for Ethereum smart contracts.

Keyless Technologies

Keyless Technologies

Simple, secure, and interoperable authentication. Keyless offers unmatched security, privacy and usability, while reducing risk and infrastructure costs.

Authenteq

Authenteq

Authenteq provides an Omni-Channel identity verification and KYC solution that allows your customers to verify their identity through any channel without compromising their privacy.

Upper Peninsula Cybersecurity Institute - Northern Michigan University

Upper Peninsula Cybersecurity Institute - Northern Michigan University

Upper Peninsula Cybersecurity Institute at Northern Michigan University offers non-degree and industry credentials relevant to emerging careers in cybersecurity.

GoSecure

GoSecure

GoSecure Managed Detection and Response helps all organizations reduce dwell time by preventing breaches before they happen.

Open Data Security (ODS)

Open Data Security (ODS)

Open Data Security is a market leader in the information security sector, offering services to companies, governments and individuals, helping them shield from hackers and cyber attacks.

Zyston

Zyston

Zyston's solutions provide end-to-end management of your cybersecurity needs. Our range of services help protect your business where it needs it the most.

Training.com.au

Training.com.au

Training.com.au is a comparison website through which those looking to learn about different aspects of cyber security can compare learning courses from training providers from across Australia.

Innov8tif

Innov8tif

Innov8tif is an AI company specialised in providing ID assurance solutions — helping digital businesses to prevent frauds by verifying and authenticating customers identity.

Sweet Security

Sweet Security

Sweet Security delivers Runtime Attack Security for Cloud Workloads.