Charles Leaver – You Need An Extensible Security Solution Not Generic One

Written By Charles Leaver Ziften CEO


Whether you call them extensions, or call them personalizations – no matter what you call it, the best innovation platforms can be tailored to fit an organization’s specific business requirements. Generic operations tools are great at carrying out generic operations tasks. Generic security tools are great at attending to generic security obstacles. Generic can only take you so far, unfortunately, and that’s where extensibility steps in.

Extensibility turns up often when I’m speaking with clients and possible clients, and I’m proud that a Global 10 company selected Ziften over everybody else in the marketplace primarily on that basis. For that customer, and numerous others, the capability to deeply personalize platforms is a need.

This isn’t really about merely creating customized reports or customized signals. Let’s be sincere – the ability to produce reports are baseline ability of lots of IT operations and security management tools. Real extensibility goes deep into the service to offer it capabilities that solve genuine issues for the company.

One customer used lots of mobile IoT devices, and needed to have our Zenith real time visibility and control system have the ability to access (and track) the memory of those devices. That’s not a standard function provided by Zenith, due to the fact that our low-footprint agent doesn’t hook into the operating system kernel or work through basic device drivers. Nevertheless, we dealt with the client to personalize Zenith with that capability – and it ended up being easier than anyone imagined.

Another client looked at the standard set of endpoint data that the agent gathers, and wanted to include additional data fields. They also wished to setup the administrative console with custom-made actions utilizing those data fields, and press those actions back out to those end points. No other endpoint monitoring and security option was able to offer the facilities for including that functionality other than Ziften.

In addition, the customer developed those extensions themselves … and owns the code and intellectual property. It’s part of their own secret sauce, their own company differentiator, and unique to their company. They couldn’t be happier. And neither could we.

With numerous other IT operations and security systems, if customers want additional features or abilities, the only option is to submit that as a future feature demand, and hope that it appears in an approaching version of the solution. Till then, regrettable.

That’s not how we designed our flagship solutions, Zenith and ZFlow. Due to the fact that our end point agent isn’t really based upon device drivers or kernel hooks, we can allow for significant extensibility, and open that extensibility for clients to access directly.

Similarly, with our administrative consoles and back-end monitoring systems; anything is adjustable. This was integrated in right from the start.

Another aspect of personalization is that our real-time and historical visibility database can integrate into your other IT operations and security platforms, such as SIEM tools, hazard intelligence, IT ticketing system, task orchestration systems, and data analytics. With Zenith and ZFlow, there are no silos. Ever.

When it comes to endpoint tracking and management, extensions are significantly where it’s at. IT operations and enterprise security groups need the ability to personalize their tools platforms to fit their precise requirements for monitoring and managing IoT, conventional endpoints, the data center, and the cloud. In numerous customer discussions, our integrated extensibility has actually caused eyes to light up, and won us trials and deployments. Tell us about your customized needs, and let’s see exactly what we can do.

Leave a Reply

Your email address will not be published. Required fields are marked *