Say buh-bye to legacy SIEMs and see what Chronicle Security Operations' latest release has to offer.

Chronicle SIEM

Detect, investigate, and hunt for threats like never before

Chronicle Security Operations delivers modern security information and event management (SIEM) capabilities at unprecedented speed and scale.

Looking for more on security operations? Visit Chronicle Security Operations.

Features

Cloud-scale security analytics

Eliminate blind spots with cloud-scale ingestion of your security telemetry with 12 months hot retention at unprecedented speed and scale. Forward data from any syslog source, log aggregator, SIEM, or packet capture to Chronicle – and use our one-click integration to instantly drive visibility into your environment.

Context rich investigation

Unify and enrich your security telemetry onto a single correlated timeline view of ongoing threats in your environment. Get faster insights with context rich investigation views that automatically stitch together relevant entities and pinpoint anomalies.
Conduct sub-second search across petabytes of information - as easy as running a Google search. Get actionable threat information in seconds or minutes—not hours or days.

Advanced detection engine

Correlate petabytes of your telemetry with an advanced detection engine continuously updated with new rules and threat indicators by Google researchers. Use Google expertise codified as curated detections for advanced threats and build custom detections with intuitive detection authoring using YARA-L.  

Active breach detection

Automatically correlate active breach threat intelligence by Mandiant with your data to receive early warning signals and get ahead of attackers.

How It Works

Chronicle enables security teams to detect, investigate and respond to threats at Google speed and scale. Chronicle does this by collecting all of your security telemetry data, aggregating it, normalizing it, and applying threat intelligence to identify the highest priority threats.
Read the SANS review

See how Chronicle approaches TDIR

Common Uses

Threat detection

Investigation

Hunting

Pricing

How Chronicle Security Operations pricing works

Chronicle is available in packages and based on ingestion. Includes 1 year of security telemetry retention at no additional cost.

Chronicle Security Operations

Chronicle Security Operations pricing is available in packages and based on ingestion. Includes 1 year of security telemetry retention at no additional cost. 

Contact sales for pricing

How Chronicle Security Operations pricing works Chronicle is available in packages and based on ingestion. Includes 1 year of security telemetry retention at no additional cost.
Product Description Pricing
Chronicle Security Operations

Chronicle Security Operations pricing is available in packages and based on ingestion. Includes 1 year of security telemetry retention at no additional cost. 

Contact sales for pricing

Get a demo

See Chronicle Security Operations in action
Contact us

Talk to Sales

Contact us today for more information on Chronicle Security Operations
Contact us

Learn more about Chronicle

Overcome data and resource constraints

See their stories

See Security Operations from end-to-end

Watch the demo

Business Case

Explore how organizations like yours cut costs, increase ROI, and drive innovation with Chronicle Security Operations

“Chronicle is the perfect partner in our threat hunting and detection process.”

Manuela Italia, Chief Information Security Officer at Telepass

Chronicle helps Telepass keep 6 million drivers safe from security threats

See the customer story

Featured benefits and customers of Chronicle

"Chronicle has reduced our time to completion for an investigation, the MTTR, by approximately 50%. That in itself is incredible, and something you would never accomplish with a traditional SIEM." - Mike Orosz, CISO, Vertiv

Hear their story

“We have advanced capabilities around threat intelligence that are highly integrated into the Chronicle platform. We like the orchestration capabilities that enable us to enrich the data and provide additional context to it, so our SOC and analysts are able to prioritize that work and respond with the attention that is needed.” - Bashar Abouseido, CISO, Charles Schwab

Hear their story

"With Chronicle we don’t have to compromise on the amount of data and different log sources we bring into the SIEM and this is something that we were never able to do before, so it is amazing." - Antonia Nisioti, Head of SOC, Secrutiny

Hear why customers love Chronicle 

  • BBVA logo
  • Morgan Sindall logo
  • Groupon logo
  • Telefonica logo
  • Vertiv logo