I find it has similar use cases, such as logging and monitoring, playbook creation, incident response, and integration with multiple technologies like threat intelligence. The same use cases apply to this product as well.
Senior Solution Architect at Stichting Inlichtingenbureau
Real User
Top 5
2024-12-23T14:52:00Z
Dec 23, 2024
My primary use case of Chronicle is to solve vulnerabilities, detect threats, and investigate threats. It allows me to ingest and analyze large volumes of security data using logs and network information to identify potential threats. It helps in monitoring, conducting annual audits, and ensuring compliance.
I am an implementation architect, so I have admin access to Google Chronicle. Google Chronicle is a SIEM tool that collects and stores data from various sources, such as network logs, cloud logs, device logs, security logs, and audit logs. It offers four types of ingestion: forwarder, cloud, ingestion API, and direct ingestion.
Find out what your peers are saying about Google, Splunk, Microsoft and others in Security Information and Event Management (SIEM). Updated: January 2025.
Security Consultant at a tech consulting company with 1,001-5,000 employees
Consultant
Top 20
2023-11-06T09:18:16Z
Nov 6, 2023
I've been using the solution as a consultant while working for a client who has chosen Google Chronicle as their SIEM solution. We are using the product as a centralized log management solution and as a solution for threat intelligence. We use it to analyze incoming log information and automatically generate alerts from indicators that have been compromised.
Security Information and Event Management (SIEM) tools offer comprehensive visibility and management of an organization’s security events through real-time analysis and correlation of data from multiple sources.
SIEM solutions provide a centralized platform for managing security alerts and logs from various sources such as network devices, servers, and applications. They help identify and mitigate potential threats by analyzing event data for unusual patterns and correlations. These tools...
My primary use case for Google Chronicle suite is threat detection and threat hunting.
I find it has similar use cases, such as logging and monitoring, playbook creation, incident response, and integration with multiple technologies like threat intelligence. The same use cases apply to this product as well.
My primary use case of Chronicle is to solve vulnerabilities, detect threats, and investigate threats. It allows me to ingest and analyze large volumes of security data using logs and network information to identify potential threats. It helps in monitoring, conducting annual audits, and ensuring compliance.
I am an implementation architect, so I have admin access to Google Chronicle. Google Chronicle is a SIEM tool that collects and stores data from various sources, such as network logs, cloud logs, device logs, security logs, and audit logs. It offers four types of ingestion: forwarder, cloud, ingestion API, and direct ingestion.
We are one of the five partners of Google Chronicle Suite in the world. We resell the solution, and we implement it for Google.
The solution is implemented in our organization. Most employees use it. We use it for storage and security. We are using it for endpoint security.
We use the product for MDR requirements.
We use the product as a SIEM.
I've been using the solution as a consultant while working for a client who has chosen Google Chronicle as their SIEM solution. We are using the product as a centralized log management solution and as a solution for threat intelligence. We use it to analyze incoming log information and automatically generate alerts from indicators that have been compromised.
We use the product for search engine integration and its ability to monitor and address network attention or login issues 24/7.