Statements (53)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:software
|
gptkbp:bfsLayer |
3
|
gptkbp:bfsParent |
gptkb:Job_Search_Engine
|
gptkbp:can_be_used_with |
Content Delivery Networks (CD Ns)
Other Google Cloud services |
gptkbp:character_customization |
Specific business needs
|
gptkbp:enables |
Access control
|
gptkbp:enhances |
Application security
|
https://www.w3.org/2000/01/rdf-schema#label |
Google Cloud Armor Security
|
gptkbp:includes |
Predefined rules
|
gptkbp:integrates_with |
gptkb:Cloud_Computing_Service
|
gptkbp:is_available_in |
Multiple regions
|
gptkbp:is_compatible_with |
Various security standards
|
gptkbp:is_designed_for |
Web applications
|
gptkbp:is_designed_to |
Protect sensitive data
Reduce downtime |
gptkbp:is_effective_against |
Mobile applications
Application layer attacks Bot attacks |
gptkbp:is_integrated_with |
Third-party security tools
|
gptkbp:is_part_of |
Google Cloud security suite
Google's cloud offerings Google's security strategy |
gptkbp:is_protected_by |
Data breaches
SQL injection attacks Cross-site scripting (XSS) attacks |
gptkbp:is_scalable |
High traffic websites
|
gptkbp:is_supported_by |
Google's security team
|
gptkbp:is_used_by |
Enterprises
|
gptkbp:is_used_for |
Compliance monitoring
|
gptkbp:is_used_to |
Secure AP Is
|
gptkbp:managed_by |
gptkb:Google_Cloud_Console
|
gptkbp:offers |
Security policies
Threat intelligence User-defined rules Custom rules Integration with Cloud Logging |
gptkbp:provides |
Traffic management
Incident response capabilities Real-time logging Automated security updates Web application firewall (WAF) Multi-layered security Detailed security reports D Do S protection Security policies for backend services |
gptkbp:setting |
Specific applications
|
gptkbp:suitable_for |
gptkb:financial_services_company
E-commerce platforms |
gptkbp:supports |
API security
Geo-based access control HTTP(S) load balancing |
gptkbp:utilizes |
gptkb:Google's_global_infrastructure
|