Google aims to up cloud security game with Titan chip

Security chip details to be revealed today - report

The Googleplex Google HQ by Trey Ratcliff on Flickr https://www.flickr.com/photos/stuckincustoms/4323977677

Google will reveal details of its Titan computer chip this week, according to Reuters, with the security chip expected to be marketed as a reason to move to the tech giant's public cloud.

The Titan chip is apparently the size of an ear stud, and it has been already installed on equipment in the company's data centres, such as servers and network cards, to prevent them being tampered with, Reuters reported.

The chips were first announced back in March, but Google didn't provide much detail about them then, only that they work by scanning hardware to see if anything's been tampered with and, if so, that the chip would block the affected machine from booting, preventing any malicious activity from spreading around the network.

At the moment, it's being used on Google's own servers to protect its search, email and video services, but now it's thought the company wants to release it to customers to safeguard their applications and services hosted on Google's cloud platform.

Google has previously explained it wants to differentiate itself from its biggest public cloud rivals - Amazon Web Services (AWS) and Microsoft - to appeal to the enterprise market and specifically businesses working in highly regulated sectors.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

"It allows us to maintain a level of understanding in our supply chain that we otherwise wouldn't have," Neal Mueller, head of infrastructure product marketing for Google Cloud Platform, said, as reported by Reuters.

The company told Reuters it's already won some customers off the back of Titan, such as Metamarkets, a real-time analytics firm that needed a secure environment in which to store data.

However, some critics think Google has a lot of work to do before it can keep up with its main competitors - simply adding another layer of security won't necessarily mean it's able to swallow any of AWS's 41% marketshare or Microsoft's 13%.

Main image sredit: Trey Ratcliff on Flickr

Featured Resources

Digital Risk Report 2020

A global view into the impact of digital transformation on risk and security management

Download now

6 ways your business could suffer if you don’t backup Office 365

Office 365 makes it easy to lose valuable data regularly, unpredictably, unintentionally, and for good

Download now

Get the best out of your workforce

7 steps to unleashing their true potential with robotic process automation

Download now

8 digital best practices for IT professionals

Don't leave anything to chance when going digital

Download now
Advertisement

Recommended

Visit/mobile/google-android/354816/android-11-developer-access-arrives-earlier-than-expected
Google Android

Android 11 developer access arrives earlier than expected

20 Feb 2020
Visit/policy-legislation/data-protection/354814/google-to-shift-uk-user-data-to-the-us-post-brexit
data protection

Google to shift UK user data to the US post-Brexit

20 Feb 2020
Visit/hardware/routers/354782/google-nest-wifi-review-a-solid-improvement-but-not-for-long
routers

Google Nest Wifi review: A solid improvement, but not for long

14 Feb 2020
Visit/marketing-comms/unified-communications-uc/354662/google-developing-all-in-one-messaging-app-for
unified communications (UC)

Google developing all in one messaging app for business

29 Jan 2020

Most Popular

Visit/mobile/28299/how-to-use-chromecast-without-wi-fi
Mobile

How to use Chromecast without Wi-Fi

5 Feb 2020
Visit/operating-systems/27717/how-to-fix-a-stuck-windows-10-update
operating systems

How to fix a stuck Windows 10 update

12 Feb 2020
Visit/policy-legislation/data-protection/354814/google-to-shift-uk-user-data-to-the-us-post-brexit
data protection

Google to shift UK user data to the US post-Brexit

20 Feb 2020
Visit/security/34616/the-top-ten-password-cracking-techniques-used-by-hackers
Security

The top ten password-cracking techniques used by hackers

10 Feb 2020