
In the recent Google Cloud Next conference, Google has announced Cross-Cloud Network, a solution to connect applications across different clouds. The new platform aims to simplify multi-cloud networking with a focus on speed and security.
Cross-Cloud Network is a network infrastructure that centralizes security and abstract workloads deployed in other clouds. It is designed to be an open and programmable networking platform that enables fast and secure connectivity between different clouds and on-prem locations.
The new service targets the networking requirements of three common multi-cloud workloads: build distributed applications, deliver internet-facing applications, and secure access for the hybrid workforce. It takes advantage of Google’s encrypted global network with 187+ PoPs in over 200 countries and territories.
To improve security, Cross-Cloud Networks leverages Cloud Armor, Google Cloud’s DDoS defense service and Web Application Firewall, and security products by Palo Alto NetworksBroadcom Symantec Furthermore, Google announced the preview of Cloud NGFW, a next-generation firewall developed with Mandiant and Palo Alto Networks that claims threat protection with 20x higher efficacy compared to other cloud firewall.
Google Cloud introduced Private Service Connect, a feature to provide connectivity to managed service networking without leaving the Google Cloud network. Other improvements also introduced existing services to simplify building distributed applications: global access for accessing services across regions, PSC Interfaces for private and secure managed service egress, and organization policies.
To accelerate the delivery of internet-facing applications and customize services such as specialized monitoring or authentication, Cloud Load Balancers announced support for Service Extension Callouts.
The integration with AWS, Azure, Oracle Cloud Infrastructure, and Alibaba Cloud networks is simplified using the existing Cross-Cloud Interconnect.
The Cross-Cloud Network can integrate with any external provider and works in co-locations or on-premises without maintaining any infrastructure. As for the published solution brief, private locations can be connected to the Cross-Cloud Network using IPsec-based HA-VPN tunnels, Partner Interconnect, or Dedicated Interconnect.