Orca Security, the pioneer of agentless cloud security, announced that it has deepened its partnership with Google Cloud by integrating with Google Workspace. Through this integration, the Orca platform now ingests rich data and context about Google Cloud user policies — including vital security settings and usage history — giving security teams a comprehensive solution to reduce their cloud attack surface. Building on Orca’s partnership with Google Cloud and previously announced integrations, Orca supports a wide range of Google Cloud services to address customers’ needs.
With identity misconfigurations representing one of the most dangerous risks in cloud security, Orca’s integration with Google Workspace expands its cloud infrastructure entitlement management (CIEM) capabilities for Google Cloud. Learning from data from Google Workspace, the Orca Cloud Security Platform enhances security teams’ ability to detect misconfigurations, follow least-privilege best practices, and identify suspicious user activity. Unifying Google Workspace data with Orca’s insights into the broader cloud risk context also enables Orca to surface how risks can be combined to create dangerous attack paths and gives security teams the information they need to remediate threats strategically.
“Our Google Workspace integration further expands visibility into Google Cloud identity risks for our joint customers,” said Gil Geron, CEO and Co-founder of Orca Security. “Through our close partnership, Orca Security and Google Cloud are fortifying cloud estates against identity misconfigurations and related security threats, and enhancing reliability and security in the cloud.”
Beyond misconfigurations, Orca also alerts security teams to suspicious activity related to identities. The Google Workspace integration enables Orca to expand Cloud Detection and Response (CDR) capabilities to cover a wider range of user behavior anomalies on Google Cloud. As a result, security operations center (SOC) and incident response (IR) teams can accelerate triage and investigation into potential security events.
SOURCE: Businesswire