This tool lets companies Google their systems for hackers

    The tool, called Backstory, is a global security telemetry platform, developed by Chronicle, a spin-off of X - the moonshot factory owned by Google’s parent Alphabet
    By ASIAN NEWS INTERNATIONAL
    | Updated on Mar 06 2019, 03:43 PM IST
    Backstory is a cloud service where companies can privately upload, store, and analyse their internal security telemetry to detect and investigate potential cyber threats.
    Backstory is a cloud service where companies can privately upload, store, and analyse their internal security telemetry to detect and investigate potential cyber threats. (Getty Images/iStockphoto)
    Backstory is a cloud service where companies can privately upload, store, and analyse their internal security telemetry to detect and investigate potential cyber threats.
    Backstory is a cloud service where companies can privately upload, store, and analyse their internal security telemetry to detect and investigate potential cyber threats. (Getty Images/iStockphoto)

    A new security tool has been developed that uses the search engine model, allowing companies to see if their systems have been hijacked by miscreants in order to stop the damage in time.

    Also read: Looking for a smartphone? To check mobile finder click here.

    The tool, called Backstory, is a global security telemetry platform, developed by Chronicle, a spin-off of X - the moonshot factory owned by Google's parent Alphabet. It uses Google's internal security tools.

    Backstory is a cloud service where companies can privately upload, store, and analyse their internal security telemetry to detect and investigate potential cyber threats, Chronicle notes in its Medium post.

    As Cnet reports, Backstory stores huge amounts of information provided by the Chronicle's customers. This information is a record of all that goes on company networks, including data such as which websites given computer connects to, whether it is a legit website or one running malware.

    ALSO READ: Google's Project Zero team discovers rare 'high severity' flaw in Apple's macOS

    The system then compares the network activity against a continuous stream of threat intelligence signals, from a variety of sources, to detect potential threats instantly. Chronicle says the data of companies remains private and is not scanned by anyone else for any other purpose.

    ALSO READ: WebAuthn: The new web standard aims to make passwords obsolete

    Follow HT Tech for the latest tech news and reviews , also keep up with us on Twitter, Facebook, and Instagram. For our latest videos, subscribe to our YouTube channel.

    First Published Date: 06 Mar, 02:13 PM IST
    NEXT ARTICLE BEGINS
    keep up with tech