Google Cloud Introduces Security AI Workbench for Faster Threat Detection and Analysis

Google’s cloud division is following in the footsteps of Microsoft with the launch of Security AI Workbench that leverages generative AI models to gain better visibility into the threat landscape.

Users, like with Microsoft’s GPT-4-based Security Copilot, can “Conversationally search, analyze, and investigate security data” with an aim to reduce mean time-to-respond as well as quickly determine the full scope of events.

Another key offering is Security Command Center AI, which utilizes Sec-PaLM to provide operators with “Near-instant analysis of findings and possible attack paths” as well as impacted assets and recommended mitigations.

“Because Security AI Workbench is built on Google Cloud’s Vertex AI infrastructure, customers control their data with enterprise-grade capabilities such as data isolation, data protection, sovereignty, and compliance support,” Google Cloud’s Sunil Potti said.

The development comes days after Google announced the creation of a new unit called Google DeepMind that brings together its AI research groups from DeepMind and the Brain team from Google Research to “Build more capable systems more safely and responsibly.”

News of Google’s Security AI Workbench also follows GitLab’s plans to integrate AI into its platform to help developers from leaking access tokens and avoid false positives during security testing.

Share this article on social media:

Subscribe to Our Newsletter!
Stay on top of cybersecurity risks, evolving threats and industry news.
This field is for validation purposes and should be left unchanged.

The Latest Cybersecurity News

From major cyberattacks, newly discovered critical vulnerabilities to recommended best practices, read it here first:

Tell us About your Needs
Get an Answer the Same Business Day

Got an urgent request? Call us at 1-877-805-7475 or Book a meeting.

What happens next:

A Vumetric expert will contact you to learn more about your cybersecurity needs and goals.

The project's scope will be defined (Target environment, deadlines, requirements, etc.)

A detailed quote including all-inclusive pricing and statement of work is sent to you.

This field is for validation purposes and should be left unchanged.


Everything You Need to Know

Gain confidence in your future cybersecurity assessments by learning to effectively plan, scope and execute projects.


Enter your Email Address

This field is for validation purposes and should be left unchanged.

* No free email provider (e.g:,, etc.)

This site is registered on as a development site. Switch to a production site key to remove this banner.