Security News > 2020 > October > Cysiv partners with Google Cloud to help customers simplify the security of their cloud workloads
Google Cloud's global sales force will now collaborate with Cysiv to help customers simplify the security of their cloud workloads.
Security is a shared responsibility, and Cysiv's capabilities complement Google Cloud's secure infrastructure, storage, services and communications, with important measures that will further ensure customer's sensitive data, workloads and IT environment are adequately protected from cyberattacks and insider threats, while meeting compliance requirements.
According to Gartner "Through 2024, workloads that leverage the programmability of cloud infrastructure to improve security protection will demonstrate improved compliance and at least 60% fewer security incidents than those in traditional data centers."
"Security is top-of-mind for every organization, and we're committed to providing customers with the technology and partnerships they need in order to accelerate their cloud journeys securely and confidently," said Vineet Bhan, Head of Security Partnerships at Google Cloud.
"Security is a top priority for our customers, as we help them migrate to Google Cloud and develop custom applications," said, Miles Ward, CTO of SADA, a Google Cloud Premier Partner and 2019 and 2018 Google Cloud Global Partner of the Year.
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/13X6jdj4rgg/
Related news
- Google Cloud/Cloud Security Alliance Report: IT and Security Pros Are ‘Cautiously Optimistic’ About AI (source)
- Google Cloud Next 2024: New Data Center Chip and Chrome Enterprise Premium Join the Ecosystem (source)
- New Google Workspace feature prevents sensitive security changes if two admins don’t approve them (source)
- Exposing the top cloud security threats (source)
- Google Chrome: Security and UI Tips You Need to Know (source)
- Breakthrough in Quantum Cloud Computing Ensures its Security and Privacy (source)
- Cloud Console Cartographer: Open-source tool helps security teams transcribe log activity (source)
- The first steps of establishing your cloud security strategy (source)
- eBook: Cloud security skills (source)
- Building a strong cloud security posture (source)