{"id":46840,"date":"2022-05-26T16:00:02","date_gmt":"2022-05-26T16:00:02","guid":{"rendered":"http:\/\/c0f44443-c31d-403b-a1bf-a96efd2fdf90"},"modified":"2022-05-26T16:00:02","modified_gmt":"2022-05-26T16:00:02","slug":"google-is-adding-these-it-security-integrations-to-chrome","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/google-is-adding-these-it-security-integrations-to-chrome\/","title":{"rendered":"Google is adding these IT security integrations to Chrome"},"content":{"rendered":"<figure class=\"c-shortcodeImage u-clearfix c-shortcodeImage-large\">\n<div class=\"c-shortcodeImage_imageContainer\">\n<div class=\"c-shortcodeImage_image\"><picture class=\"c-cmsImage\"><!----> <img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/google-is-adding-these-it-security-integrations-to-chrome\/\" alt=\"chrome-icon-close-up.jpg\" height=\"729.5925\" width=\"1092\"><\/picture><\/div>\n<p> <!----> <!----><\/div>\n<p> <!----><figcaption> <span class=\"c-shortcodeImage_credit g-outer-spacing-top-xsmall g-color-gray70 u-block g-text-xsmall\">Shutterstock<\/span><\/figcaption><\/figure>\n<p>Google on Thursday announced it&#8217;s adding a collection of plug-and-play integrations into Chrome with popular IT security tools. This will make it easier for IT teams to keep workers safer &#8212; on the Chrome browser and using Chrome OS devices &#8212; with the security products they already use.&nbsp;<\/p>\n<p>The new Chrome Enterprise Connectors Framework currently comprises tools in a handful of different categories: There are integrations for identity and user access, integrations for endpoint management, and integrations for security insights and reporting.&nbsp;<\/p>\n<p>The Connectors Framework is part of Google&#8217;s larger effort to promote a&nbsp;<a href=\"https:\/\/cloud.google.com\/blog\/products\/identity-security\/security-summit-google-cloud-charts-a-safer-future\" target=\"_blank\" rel=\"noopener\">zero trust<\/a> security model:<\/p>\n<ul>\n<li><strong>For identity and user access<\/strong>: the Netskope Security Cloud integration optimizes user access to critical data based on verifying the user, the device and action requested by the user. The Okta Identity Engine&#8217;s policy support for Chrome OS provides authentication controls. <\/li>\n<li><strong>For endpoint management across mobile and desktop:<\/strong>&nbsp;there are new BlackBerry UEM and Samsung Knox Manage integrations. In addition to these two new integrations, VMware Workspace ONE will update its existing integration to the new Chrome Policy API and will be available through Google&#8217;s Trusted Tester Program soon. <\/li>\n<li><strong>For security insights and reporting:<\/strong>&nbsp;there&#8217;s the new Splunk Cloud Platform integration. Palo Alto Networks and Crowdstrike integrations will be available through the Trusted Tester Program soon.<\/li>\n<\/ul>\n<p>Google is also making it easier to find these integrations with a new Security &amp; Trust category within&nbsp;<a href=\"https:\/\/chromeenterprise.google\/os\/recommended\/\" target=\"_blank\" rel=\"noopener\">Chrome Enterprise Recommended<\/a>.<\/p>\n<p>Meanwhile, to keep sensitive data from being leaked or stolen from devices, Google is introducing Chrome OS Data Controls for IT admins. They&#8217;ll be able to define rules that are triggered by certain actions that could lead to data loss, such as copy and paste, screen capture or printing.<\/p>\n<div class=\"c-shortcodePinbox-textList\">\n<h2 class=\"c-sectionHeading\"> Google I\/O 2022 <\/h2>\n<\/p><\/div>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/google-is-adding-these-it-security-integrations-to-chrome\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The new Chrome Enterprise Connectors Framework is a collection of plug-and-play integrations with popular IT security tools.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-46840","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Google is adding these IT security integrations to Chrome 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/google-is-adding-these-it-security-integrations-to-chrome\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Google is adding these IT security integrations to Chrome 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/google-is-adding-these-it-security-integrations-to-chrome\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-26T16:00:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/article\/google-is-adding-these-it-security-integrations-to-chrome\/\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/google-is-adding-these-it-security-integrations-to-chrome\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/google-is-adding-these-it-security-integrations-to-chrome\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Google is adding these IT security integrations to Chrome\",\"datePublished\":\"2022-05-26T16:00:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/google-is-adding-these-it-security-integrations-to-chrome\/\"},\"wordCount\":312,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/google-is-adding-these-it-security-integrations-to-chrome\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.zdnet.com\/article\/google-is-adding-these-it-security-integrations-to-chrome\/\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/google-is-adding-these-it-security-integrations-to-chrome\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/google-is-adding-these-it-security-integrations-to-chrome\/\",\"name\":\"Google is adding these IT security integrations to Chrome 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/google-is-adding-these-it-security-integrations-to-chrome\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/google-is-adding-these-it-security-integrations-to-chrome\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.zdnet.com\/article\/google-is-adding-these-it-security-integrations-to-chrome\/\",\"datePublished\":\"2022-05-26T16:00:02+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/google-is-adding-these-it-security-integrations-to-chrome\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/google-is-adding-these-it-security-integrations-to-chrome\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/google-is-adding-these-it-security-integrations-to-chrome\/#primaryimage\",\"url\":\"https:\/\/www.zdnet.com\/article\/google-is-adding-these-it-security-integrations-to-chrome\/\",\"contentUrl\":\"https:\/\/www.zdnet.com\/article\/google-is-adding-these-it-security-integrations-to-chrome\/\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/google-is-adding-these-it-security-integrations-to-chrome\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Google is adding these IT security integrations to Chrome\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Google is adding these IT security integrations to Chrome 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/google-is-adding-these-it-security-integrations-to-chrome\/","og_locale":"en_US","og_type":"article","og_title":"Google is adding these IT security integrations to Chrome 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/google-is-adding-these-it-security-integrations-to-chrome\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-05-26T16:00:02+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/article\/google-is-adding-these-it-security-integrations-to-chrome\/","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/google-is-adding-these-it-security-integrations-to-chrome\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/google-is-adding-these-it-security-integrations-to-chrome\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Google is adding these IT security integrations to Chrome","datePublished":"2022-05-26T16:00:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/google-is-adding-these-it-security-integrations-to-chrome\/"},"wordCount":312,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/google-is-adding-these-it-security-integrations-to-chrome\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/article\/google-is-adding-these-it-security-integrations-to-chrome\/","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/google-is-adding-these-it-security-integrations-to-chrome\/","url":"https:\/\/www.threatshub.org\/blog\/google-is-adding-these-it-security-integrations-to-chrome\/","name":"Google is adding these IT security integrations to Chrome 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/google-is-adding-these-it-security-integrations-to-chrome\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/google-is-adding-these-it-security-integrations-to-chrome\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/article\/google-is-adding-these-it-security-integrations-to-chrome\/","datePublished":"2022-05-26T16:00:02+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/google-is-adding-these-it-security-integrations-to-chrome\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/google-is-adding-these-it-security-integrations-to-chrome\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/google-is-adding-these-it-security-integrations-to-chrome\/#primaryimage","url":"https:\/\/www.zdnet.com\/article\/google-is-adding-these-it-security-integrations-to-chrome\/","contentUrl":"https:\/\/www.zdnet.com\/article\/google-is-adding-these-it-security-integrations-to-chrome\/"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/google-is-adding-these-it-security-integrations-to-chrome\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Google is adding these IT security integrations to Chrome"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/46840","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=46840"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/46840\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=46840"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=46840"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=46840"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}