This tool lets companies Google their systems for hackers | HT Tech

This tool lets companies Google their systems for hackers

The tool, called Backstory, is a global security telemetry platform, developed by Chronicle, a spin-off of X - the moonshot factory owned by Google’s parent Alphabet

By: ASIAN NEWS INTERNATIONAL
| Updated on: Mar 06 2019, 15:43 IST
Backstory is a cloud service where companies can privately upload, store, and analyse their internal security telemetry to detect and investigate potential cyber threats.
Backstory is a cloud service where companies can privately upload, store, and analyse their internal security telemetry to detect and investigate potential cyber threats. (Getty Images/iStockphoto)

A new security tool has been developed that uses the search engine model, allowing companies to see if their systems have been hijacked by miscreants in order to stop the damage in time.

The tool, called Backstory, is a global security telemetry platform, developed by Chronicle, a spin-off of X - the moonshot factory owned by Google's parent Alphabet. It uses Google's internal security tools.

You may be interested in

MobilesTablets Laptops
23% OFF
Samsung Galaxy S23 Ultra 5G
  • Green
  • 12 GB RAM
  • 256 GB Storage
Google Pixel 8 Pro
  • Obsidian
  • 12 GB RAM
  • 128 GB Storage
Vivo X100 Pro 5G
  • Asteroid Black
  • 16 GB RAM
  • 512 GB Storage
Apple iPhone 15 Plus
  • Black
  • 6 GB RAM
  • 128 GB Storage

Backstory is a cloud service where companies can privately upload, store, and analyse their internal security telemetry to detect and investigate potential cyber threats, Chronicle notes in its Medium post.

Also read
Looking for a smartphone? To check mobile finder click here.

As Cnet reports, Backstory stores huge amounts of information provided by the Chronicle's customers. This information is a record of all that goes on company networks, including data such as which websites given computer connects to, whether it is a legit website or one running malware.

ALSO READ: Google's Project Zero team discovers rare 'high severity' flaw in Apple's macOS

The system then compares the network activity against a continuous stream of threat intelligence signals, from a variety of sources, to detect potential threats instantly. Chronicle says the data of companies remains private and is not scanned by anyone else for any other purpose.

ALSO READ: WebAuthn: The new web standard aims to make passwords obsolete

Catch all the Latest Tech News, Mobile News, Laptop News, Gaming news, Wearables News , How To News, also keep up with us on Whatsapp channel,Twitter, Facebook, Google News, and Instagram. For our latest videos, subscribe to our YouTube channel.

First Published Date: 06 Mar, 14:13 IST
NEXT ARTICLE BEGINS