SOC, SIEM, Threat hunting

Getting Google Scale Threat Detection With Chronicle Detect – Trevor Welsh – ESW #206

Sponsored By

sponsor Visit for more information!

Chronicle brings Google-scale threat detection to enterprises with the debut of its threat detection solution, Chronicle Detect. It includes a rules engine that operates at the speed of search, a powerful rules language optimized to describe complex threat behavior, and a regular stream of new rules and indicators, built by our elite research team. Chronicle Detect makes it easy for enterprises to move from legacy security tools to a modern threat detection system.

This segment is sponsored by Chronicle.

Visit to learn more about them! Visit for all the latest episodes!

Full Episode Show Notes

Getting Google Scale Threat Detection With Chronicle Detect

Our Chronicle website:

Our new Detect overview:

A recent Chronicle customer panel:

ESG’s Economic Validation report for Chronicle:


[caption id="attachment_210" align="alignleft" width="120"]Adrian Sanabria Adrian Sanabria - Senior Research Engineer[/caption] [caption id="attachment_210" align="alignleft" width="120"]Matt Alderman Matt Alderman - CEO[/caption] [caption id="attachment_210" align="alignleft" width="120"]Paul Asadoorian Paul Asadoorian - Founder & CTO[/caption]


[caption id="attachment_210" align="alignleft" width="120"]Trevor Welsh Trevor Welsh - Global Security Strategist [/caption]


  • Would you like to have all of your favorite Security Weekly content at your fingertips? Do you want to hear from Sam & Andrea when we have upcoming webcasts & technical trainings? Have a question for one of our illustrious hosts, someone from the Security Weekly team, or wish you could “hang” out with the Security Weekly crew & community? Subscribe on your favorite podcast catcher, sign up for our mailing list, and join our Discord Server to stay in the loop on all things Security Weekly! Visit:

  • In our upcoming webcasts & technical trainings, you will learn why you should stop trying to discover & classify data, how to thwart attackers using deception & how to build a risk-based vulnerability management program! Visit to see what we have coming up, or visit to view our previously recorded webcasts!

[audio src=""]
prestitial ad