Monthly Archives: April 2018

Charles Leaver – The Lowdown On The Intelligent Security Association From Microsoft

Published by:

Written By David Shefter And Presented By Charles Leaver


It’s an excellent plan: Microsoft has actually produced a system for third party security businesses, like Ziften, to work together to much better protect our customers. Everybody wins with the brand-new Microsoft Intelligent Security Association, revealed this week – and we are proud to be a founding member and part of the launch. Congratulations to Microsoft!

Security Intelligence Sharing

Among the most exciting tasks coming out of Microsoft has been the new Microsoft Intelligent Security Graph, a risk intelligence engine built on machine learning. The Intelligent Security Graph forms the foundation of the brand-new association – and the foundation of a lot of new opportunities for development.

As Microsoft states, “At the present time, with the immense computing benefits offered by the cloud, the Machine learning and Artificial Intelligence is finding new ways to use its abundant analytics engines and by applying a combination of automated and manual processes, machine learning and human specialists, we are able to create an intelligent security graph that learns from itself and develops in real-time, lowering our collective time to discover and respond to new occurrences.”

The need for much better, more intelligent, security is substantial, which is why we’re delighted to be an establishing member of the new association.

As Microsoft’s Brad Anderson, Microsoft Corporate Vice President, Enterprise Mobility + Security, recently wrote, “Roughly 96% of all malware is polymorphic – meaning that it is just experienced by a single user and device before being changed with yet another malware variation. This is since most of the time malware is captured almost as fast as it’s produced, so malware developers continuously evolve to attempt and stay ahead. Data such as this hammers home how crucial it is to have security options in place that are as nimble and innovative as the attacks.”

Advanced Endpoint Detection and Response

Which brings us to the kind of sophisticated endpoint detection and response (EDR) that Ziften offers to desktops, servers, and cloud assets – giving the enterprise distinct all-the-time visibility and control for any asset, anywhere. Nobody offers the capability you’ll discover in Ziften’s Zenith security platform.

That’s where the Microsoft Intelligent Security Association shines. At the end of the day, even the very best defenses can be breached, and security groups must react faster and more strongly to make sure the safety of their data and systems.

Ziften and Microsoft are delivering totally integrated risk protection that covers customers’ endpoints – implying client devices, servers, and the cloud – with a structure of shared intelligence and the power of the cloud to transform tracking of enterprise systems.

What Microsoft is Saying

“The Intelligent Security Association improves cooperation from leading sources to secure clients,” said Microsoft. “Having actually already accomplished strong client momentum with our incorporated Ziften and Microsoft Windows Defender ATP solution, clients stand to additionally gain from continued collaboration.”

In addition, “Continued integration and intelligence sharing within the context of the Microsoft Intelligent Security Graph enables joint clients to faster and accurately identify, investigate and react to attacks throughout their entire endpoint and cloud base.”

What Ziften is Saying

Ziften’s CEO, Chuck Leaver, is telling everyone that our founding membership in the Microsoft Intelligent Security Association is a significant win for our joint clients and prospects – and it combines everybody in the Microsoft universe and beyond (note that Ziften’s Mac and Linux products are likewise part of the Microsoft collaboration). “As security vendors, we all acknowledge the requirement to cooperate and team up to safeguard our clients and their staff members. Kudos to Microsoft for pioneering this market effort,” Chuck said.

The outcome: Improved security for our customers, and tighter integration and more innovation in the market. It’s a real win for everybody. Apart from the hackers, naturally. They lose. No apologies guys.

Charles Leaver – Check Out Ziften’s New Channel Program

Published by:

Written By Greg McCreight And Presented By Charles Leaver


If you are a reseller, integrator, distributor, managed service provider – the new Ziften Activate Partner Program is here, it’s ready, and it’s going to be terrific for your bottom line (and for decreasing your customers’ stress and anxiety about cybersecurity).

Ziften is 100% dedicated to the channel, and as we grow and progress in the market, we understand that your success is our success – and also our success is your success. And it is already happening: 96 percent of our sales in 2017 came through the channel! That’s why we built the brand-new Activate Partner Program to give you the resources you need to grow your company with Ziften security solutions.

We kicked it all off with a very effective, cross-platform Endpoint Detection and Response (EDR) solution, Ziften Zenith. Customers love it. Innovation Partners love it. Resellers really love it. The market really love it. And analysts really love it.

I have to share this from the conclusion of our broadband testing report, which discusses SysSecOps, or Systems Security Operations – an emerging classification where Ziften is leading the market:

Key to Ziften’s endpoint method in this category is total visibility – after all, how can you secure what you can’t see or do not know what is there to start with? With its Zenith platform, Ziften has a solution that ticks all the SysSecOps boxes and more …

Overall, Ziften has a really competitive offering in what is a really legitimate, emerging IT category in the form of SysSecOps and one that must be on the assessment short-list.

In addition to this: Microsoft recently partnered with Ziften to develop an integration between Zenith and Microsoft Windows Defender ATP, to permit Microsoft customers to protect Linux and Mac systems with the same single pane of glass as they utilize to secure Windows systems.

Enough about us. Let’s concentrate on you. How you will benefit with the Activate Partner Program.

We’ve assembled a multi tier partner program that has better discounts, more resources, and powerful market advancement support. We understand a one-size-fits-all program does not work, not in today’s market.

With Activate, we take a hands-on stance to onboarding new partners; making it easy for those for whom security is a fairly small element of your business; and rewarding top tier partners who have actually dedicated themselves to Ziften.

Here’s exactly what you get with the Activate Partner Program – and we’ll work alongside with you to ensure that Activate fits your needs perfectly:

Security for more of your consumer’s environment – end points, servers, and the cloud

Visibility and security for your customer’s complex, multi-cloud implementations

Basic security tool integrations to deliver truly customized, differentiated solutions

Hands-on, tailored assistance and life-cycle competence

Rich financial rewards that motivate your long term investment and reward on-going success

Market development support to drive incremental need and lead generation

First-rate, hands-on assistance from our field sales, sales engineers, technical support, and specialists

The Activate program combines our effective security services, financial investments, and hands on support to assist you create more business opportunities and close more deals.

Charles Leaver – Preparing Properly For Cloud Asset Migration

Published by:

Written By Logan Gilbert And Presented By Charles Leaver


It bears repeating – the Internet has actually permanently altered the world for people and organizations alike. In the case of the latter, every aspect of modern-day IT is going through digital improvement. IT departments all over are under pressure to make information highly available and at lower cost – all while securing critical data from damage, loss, or cyber theft.

Central to this method is the migration of data centers to the cloud. In fact, 19% of organization workloads are anticipated to be in the general public cloud by the end of 2019, and fifty percent over the next ten years.

What is Cloud Asset Migration?

Cloud migration is the procedure of moving data, applications or other organization aspects from an organization’s on premise infrastructure to the cloud or moving them from one cloud service to another.

The diagram below illustrates this migration of file-server(s), data, and application(s) from an on premise server infrastructure to a cloud environment.

Cloud service providers allow businesses to move some or all IT infrastructure to the cloud for scale, speed, service flexibility, ease of management, and reduced expenses. The benefits are nothing except compelling.

Utilizing Cloud Computing is transforming the corporate landscape. With the technological advancements, people are leaning more to a virtual office space meaning that you can work from anywhere and anytime making use of cloud computing.

What To Consider With Cloud Asset Migration

However, just like any significant IT infrastructure modification, a relocate to the cloud requires thoughtful planning and execution for the procedure to occur within budget and on-time. Moving a server, database, application, or all the above to the cloud is not without threat. System outages, performance destruction, data loss and more are likely to take place as a result of misconfigurations, system failures, and security exploits.

Case in point: 43% of those who have gone through a cloud asset migration have actually experienced a failed or postponed application. Why is this? Because each asset migration is a ‘snowflake’ with its own level of intricacy.

Let’s take a look at three areas to consider for effective cloud asset migration.

1. Have a Strategy

Initially, there needs to be a tactical migration strategy. That plan ought to assist respond to concerns like the following:

Which IT assets should be migrated in the first place?
If you are moving some, or all, of your infrastructure to the cloud, how will you develop and maintain asset control?
How will you identify what you have – prior to and after the move?
Do you even need to migrate everything?
What is the first thing to move?

2. Tidy up What remains in Place Now

To answer these strategic questions efficiently, you’ll require conclusive visibility into each asset under roof now, as well as relevant attributes of each asset. Whether your assets today are operating on physical or virtual server infrastructure, you have to comprehend:

What assets are there now? Discover all the connected assets and understand whether they are presently managed and unmanaged.
Recognize low usage and/or unused systems. Should these systems be removed or repurposed prior to migration?
Identify low use and/or unused applications. Are these applications needed at all? Should they be gotten rid of prior to migration?
Determine and tidy up aspects of duplication, be it systems and/or applications.
Now determine those business-critical systems and applications that will now be moved as part of your strategy. With this comprehensive asset data in hand, you can sharpen your migration technique by segmenting what must – and ought to not be moved – or at least clearly focus on based on business value.

3. Prepare For Cloud Visibility Post Migration

Now that you’re armed with comprehensive, precise existing and historical asset data, how will you keep this level of visibility after your successful cloud asset migration?

While the cost advantages of moving to the cloud are frequently exceptionally compelling, uncontrolled asset/ virtual device expansion can rapidly erode those cost benefits. So, prior to performing your cloud asset migration, make certain you have a cloud visibility solution in place that:

Finds/ screens all connected assets across your single or multi-cloud environment
Records, finger prints, and classifies found assets
Alerts on brand-new or unforeseen asset discovery and/or habits within the cloud environment
Incorporates with existing ticketing, workflow, and/or CMDB systems

Ziften Cloud Visibility and Security

Continuous cloud visibility into each device, user, and application indicates you can administer all elements of your infrastructure more effectively. You’ll avoid wasting resources by preventing VM expansion, plus you’ll have a detailed body of data to satisfy audit requirements for NIST 800-53, HIPAA, and other compliance regulations.

Follow the above when you migrate to the cloud, and you’ll avoid weak security, insufficient compliance, or operational problems. Ziften’s approach to cloud visibility and security offers you the intelligence you need for cloud asset migration without the headaches.