Monthly Archives: April 2018

Pioneering Intelligent Security Association From Microsoft – Charles Leaver

Written By David Shefter And Presented By Charles Leaver


It’s an excellent strategy: Microsoft has actually produced a mechanism for third party security companies, like Ziften, to work together to much better protect our customers. Everyone wins with the new Microsoft Intelligent Security Association, revealed this week – and we overjoyed to be an establishing member and part of the launch. Congratulations to Microsoft!

Security Intelligence Sharing

Among the most interesting tasks coming out of Microsoft has actually been the brand-new Microsoft Intelligent Security Graph, a danger intelligence engine built on artificial intelligence. The Intelligent Security Graph forms the structure of the brand-new association – and the structure of a great deal of new opportunities for innovation.

As Microsoft states, “Today, with the immense computing advantages presented by the cloud, the Machine learning and Artificial Intelligence is finding new ways to utilize its rich analytics engines and by applying a mix of automated and manual procedures, artificial intelligence and human professionals, we are able to produce an intelligent security graph that learns from itself and evolves in real time, minimizing our cumulative time to find and react to new events.”

The need for much better, more intelligent, security is huge, and that’s why we’re delighted to be an establishing member of the brand-new association.

Brad Anderson, Corporate Vice President at Microsoft, Enterprise Mobility + Security, recently composed, “Around 96% of all malware is polymorphic – meaning that it is only experienced by a single user and device before being changed with yet another malware version. This is because in most cases malware is captured nearly as fast as it’s developed, so malware developers continually develop to attempt and stay ahead. Data like this reinforces how essential it is to have security solutions in place that are as nimble and ingenious as the attacks.”

Advanced Endpoint Detection and Response

And that brings us to the type of innovative endpoint detection and response (EDR) that Ziften offers to desktops, servers, and cloud assets – providing the enterprise unique 24/7 visibility and control for any asset, anywhere. No one offers the functionality you’ll discover in Ziften’s Zenith security platform.

That’s where the Microsoft Intelligent Security Association comes in. At the end of the day, even the very best defenses can be breached, and security teams should respond more quickly and more aggressively to guarantee the security of their data and systems.

Ziften and Microsoft are providing totally integrated risk security that covers clients’ endpoints – meaning client devices, servers, and the cloud – with a structure of shared intelligence and the power of the cloud to change tracking of organizational systems.

What Microsoft is Saying

“The Intelligent Security Association improves cooperation from leading sources to safeguard customers,” stated Microsoft. “Having currently accomplished strong customer momentum with our incorporated Ziften and Microsoft Windows Defender ATP solution, customers stand to further benefit from continued collaboration.”

What’s more, “Continued integration and intelligence sharing within the context of the Microsoft Intelligent Security Graph allows joint customers to quicker and accurately detect, investigate and react to attacks across their entire endpoint and cloud base.”

What Ziften is Stating

Chuck Leaver, Ziften CEO, is telling everybody that our founding membership in the Microsoft Intelligent Security Association is a substantial win for our joint clients and prospects – and it brings together everybody in the Microsoft world and beyond (note that Ziften’s Mac and Linux solutions are also part of the Microsoft partnership). “As security suppliers, all of us acknowledge the requirement to work together and collaborate to protect our customers and their staff members. Kudos to Microsoft for pioneering this industry effort,” Chuck said.

The result: Improved security for our clients, and tighter integration and more development in the market. It’s a real win for everybody. Except for the hackers, obviously. They will lose. No apologies people.

We Have Made Our Channel Program Even Better For You – Charles Leaver

Written By Greg McCreight And Presented By Charles Leaver


If you are a reseller, integrator, distributor, managed service provider – the brand-new Ziften Activate Partner Program is here, it’s ready to go, and will be fantastic for your profitability (and for decreasing your customers’ stress and anxiety about cybersecurity).

Ziften is 100 percent focused on the channel, and as we grow and develop in the market, we understand that your success is our success – and that our success is your success. And it is already happening: 96% of our sales in 2017 were through the channel! This is the reason that we built the brand-new Activate Partner Program to provide you the resources you require to grow your organization with Ziften security solutions.

We kicked it all off with a powerful, cross-platform Endpoint Detection and Response (EDR) solution, Ziften Zenith. Customers really love it. Innovation Partners love it. Resellers really love it. The market really love it. And analysts love it.

I have to share this from the conclusion of our broadband testing report, which talks about SysSecOps, or Systems Security Operations – an emerging category where Ziften is leading the market:

Critical to Ziften’s endpoint method in this classification is total visibility – let’s face it, how can you protect what you cannot see or don’t know is there to start with? With its Zenith platform, Ziften has a solution that delivers on all the essential SysSecOps requirements and more …

Overall, Ziften has an extremely competitive solution in what is a really legitimate, emerging IT category through SysSecOps and one that must be on the assessment short-list.

In addition to this: Microsoft recently partnered with Ziften to produce an integration between Zenith and Microsoft Windows Defender ATP, to enable Microsoft clients to protect Linux and Mac systems with the same single pane of glass as they use to protect Windows systems.

Enough about Ziften. Let’s concentrate on you. You and the Activate Partner Program.

We have actually assembled a multi tier partner program that has better discounts, more resources, and strong market development support. We understand a one-size-fits-all program doesn’t work, not in today’s market.

With Activate, we take a hands-on stance to bringing on board brand-new partners; making it easy for those for whom security is a relatively small element of your services; and rewarding top tier partners who have devoted themselves to Ziften.

Here’s what you will receive with the Activate Partner Program – and we’ll work alongside with you to make sure that Activate fulfills your needs completely:

Security for more of your customer’s environment – end points, servers, and cloud

Visibility and security for your customer’s complex, multi-cloud deployments

Easy security tool integrations to deliver genuinely custom, differentiated solutions

Hands on, customized support and life-cycle expertise

Abundant monetary rewards that motivate your long-term investment and reward on-going success

Market advancement assistance to drive incremental demand and list building

First-rate, hands-on support from our field sales, sales engineers, technical support, and marketing experts

The Activate program combines our effective security solutions, financial investments, and hands on help to assist you develop more business opportunities and close more deals.

Your Essential Guide To Cloud Asset Migration – Charles Leaver

Written By Logan Gilbert And Presented By Charles Leaver


It bears reiterating – the Web has forever altered the world for individuals and companies alike. When it comes to the latter, every aspect of modern IT is going through digital transformation. IT departments everywhere are under pressure to make info extremely available and at lower expense – all while securing vital data from corruption, loss, or cyber theft.

Central to this technique is the migration of data centers to the cloud. In fact, nineteen percent of service workloads are anticipated to be in the public cloud by the end of 2019, and 50% over the next ten years.

What is Cloud Asset Migration?

Cloud migration is the process of moving data, applications or other service elements from a company’s on premise infrastructure to the cloud or moving them from one cloud service to another.

The diagram shown below highlights this migration of file-server(s), data, and application(s) from an on premise server infrastructure to a cloud environment.

Cloud providers make it possible for businesses to migrate some or all IT infrastructure to the cloud for scale, speed, service flexibility, ease of handling, and decreased expenses. The advantages are absolutely nothing short of compelling.

Utilizing Cloud Computing is changing the corporate landscape. With the technological advancements, people are leaning more to a virtual office meaning that you can work from anywhere and anytime utilizing cloud computing.

Cloud Asset Migration Considerations

However, as with any significant IT infrastructure change, a move to the cloud needs thoughtful preparation and execution for the procedure to occur within the budget plan and on-time. Moving a server, database, application, or all of the above to the cloud is not without risk. System failures, efficiency degradation, loss of data and more are likely to happen as a result of misconfigurations, system failures, and security exploits.

Case in point: forty three percent of those who have actually gone through a cloud asset migration have actually experienced a failure or delayed application. Why is this? Since each asset migration is a ‘snowflake’ with its own level of intricacy.

Let’s look at three areas to consider for successful cloud asset migration.

1. Have a Plan

Initially, there needs to be a tactical migration plan. That plan ought to help address questions such as the following:

Which IT assets should be migrated in the first place?
If you are migrating some, or all, of your infrastructure to the cloud, how will you establish and maintain asset control?
How will you identify what you have – prior to and after the relocation?
Do you even have to migrate all of it?
What comes first?

2. Tidy up Exactly What remains in Place Today

To answer these strategic concerns efficiently, you’ll need definitive visibility into each asset under roof today, as well as pertinent characteristics of each asset. Whether your assets today are running on physical or virtual server infrastructure, you have to comprehend:

What assets exist today? Discover all the linked assets and comprehend whether they are currently handled and unmanaged.
Recognize low usage and/or unused systems. Should these systems be removed or repurposed prior to migration?
Determine low usage and/or unused applications. Are these applications required at all? Should they be gotten rid of prior to migration?
Recognize and clean up aspects of duplication, be it systems and/or applications.
Now determine those business-critical systems and applications that will now be moved as part of your strategy. With this comprehensive asset data in hand, you can sharpen your migration method by segmenting exactly what must – and ought to not be moved – or at least crisply prioritize based on business value.

3. Prepare For Cloud Visibility Post Migration

Now that you’re armed with extensive, precise existing and historic asset data, how will you preserve this level of visibility after your effective cloud asset migration?

While the cost benefits of migrating to the cloud are typically extremely compelling, uncontrolled asset/ virtual device expansion can rapidly deteriorate those cost benefits. So, prior to performing your cloud asset migration, make certain you have a cloud visibility solution in place that:

Finds/ monitors all linked assets throughout your single or multi-cloud environment
Inventories, fingerprints, and classifies found assets
Informs on new or unforeseen asset discovery and/or behavior within the cloud environment
Incorporates with existing ticketing, workflow, and/or CMDB systems

Cloud Visibility and Security with Ziften

Ongoing cloud visibility into each device, user, and application means you can administer all elements of your infrastructure better. You’ll avoid losing resources by preventing VM proliferation, plus you’ll have a comprehensive body of data to satisfy audit requirements for NIST 800-53, HIPAA, and other compliance guidelines.

Follow the above when you move to the cloud, and you’ll avoid weak security, insufficient compliance, or functional SNAFUs. Ziften’s technique to cloud visibility and security gives you the intelligence you need for cloud asset migration without the difficulties.