Monthly Archives: April 2018

We Have Made Our Channel Program Even Better For You – Charles Leaver

Written By Greg McCreight And Presented By Charles Leaver


If you are a reseller, integrator, distributor, managed service provider – the brand-new Ziften Activate Partner Program is here, it’s ready to go, and will be fantastic for your profitability (and for decreasing your customers’ stress and anxiety about cybersecurity).

Ziften is 100 percent focused on the channel, and as we grow and develop in the market, we understand that your success is our success – and that our success is your success. And it is already happening: 96% of our sales in 2017 were through the channel! This is the reason that we built the brand-new Activate Partner Program to provide you the resources you require to grow your organization with Ziften security solutions.

We kicked it all off with a powerful, cross-platform Endpoint Detection and Response (EDR) solution, Ziften Zenith. Customers really love it. Innovation Partners love it. Resellers really love it. The market really love it. And analysts love it.

I have to share this from the conclusion of our broadband testing report, which talks about SysSecOps, or Systems Security Operations – an emerging category where Ziften is leading the market:

Critical to Ziften’s endpoint method in this classification is total visibility – let’s face it, how can you protect what you cannot see or don’t know is there to start with? With its Zenith platform, Ziften has a solution that delivers on all the essential SysSecOps requirements and more …

Overall, Ziften has an extremely competitive solution in what is a really legitimate, emerging IT category through SysSecOps and one that must be on the assessment short-list.

In addition to this: Microsoft recently partnered with Ziften to produce an integration between Zenith and Microsoft Windows Defender ATP, to enable Microsoft clients to protect Linux and Mac systems with the same single pane of glass as they use to protect Windows systems.

Enough about Ziften. Let’s concentrate on you. You and the Activate Partner Program.

We have actually assembled a multi tier partner program that has better discounts, more resources, and strong market development support. We understand a one-size-fits-all program doesn’t work, not in today’s market.

With Activate, we take a hands-on stance to bringing on board brand-new partners; making it easy for those for whom security is a relatively small element of your services; and rewarding top tier partners who have devoted themselves to Ziften.

Here’s what you will receive with the Activate Partner Program – and we’ll work alongside with you to make sure that Activate fulfills your needs completely:

Security for more of your customer’s environment – end points, servers, and cloud

Visibility and security for your customer’s complex, multi-cloud deployments

Easy security tool integrations to deliver genuinely custom, differentiated solutions

Hands on, customized support and life-cycle expertise

Abundant monetary rewards that motivate your long-term investment and reward on-going success

Market advancement assistance to drive incremental demand and list building

First-rate, hands-on support from our field sales, sales engineers, technical support, and marketing experts

The Activate program combines our effective security solutions, financial investments, and hands on help to assist you develop more business opportunities and close more deals.

Your Essential Guide To Cloud Asset Migration – Charles Leaver

Written By Logan Gilbert And Presented By Charles Leaver


It bears reiterating – the Web has forever altered the world for individuals and companies alike. When it comes to the latter, every aspect of modern IT is going through digital transformation. IT departments everywhere are under pressure to make info extremely available and at lower expense – all while securing vital data from corruption, loss, or cyber theft.

Central to this technique is the migration of data centers to the cloud. In fact, nineteen percent of service workloads are anticipated to be in the public cloud by the end of 2019, and 50% over the next ten years.

What is Cloud Asset Migration?

Cloud migration is the process of moving data, applications or other service elements from a company’s on premise infrastructure to the cloud or moving them from one cloud service to another.

The diagram shown below highlights this migration of file-server(s), data, and application(s) from an on premise server infrastructure to a cloud environment.

Cloud providers make it possible for businesses to migrate some or all IT infrastructure to the cloud for scale, speed, service flexibility, ease of handling, and decreased expenses. The advantages are absolutely nothing short of compelling.

Utilizing Cloud Computing is changing the corporate landscape. With the technological advancements, people are leaning more to a virtual office meaning that you can work from anywhere and anytime utilizing cloud computing.

Cloud Asset Migration Considerations

However, as with any significant IT infrastructure change, a move to the cloud needs thoughtful preparation and execution for the procedure to occur within the budget plan and on-time. Moving a server, database, application, or all of the above to the cloud is not without risk. System failures, efficiency degradation, loss of data and more are likely to happen as a result of misconfigurations, system failures, and security exploits.

Case in point: forty three percent of those who have actually gone through a cloud asset migration have actually experienced a failure or delayed application. Why is this? Since each asset migration is a ‘snowflake’ with its own level of intricacy.

Let’s look at three areas to consider for successful cloud asset migration.

1. Have a Plan

Initially, there needs to be a tactical migration plan. That plan ought to help address questions such as the following:

Which IT assets should be migrated in the first place?
If you are migrating some, or all, of your infrastructure to the cloud, how will you establish and maintain asset control?
How will you identify what you have – prior to and after the relocation?
Do you even have to migrate all of it?
What comes first?

2. Tidy up Exactly What remains in Place Today

To answer these strategic concerns efficiently, you’ll need definitive visibility into each asset under roof today, as well as pertinent characteristics of each asset. Whether your assets today are running on physical or virtual server infrastructure, you have to comprehend:

What assets exist today? Discover all the linked assets and comprehend whether they are currently handled and unmanaged.
Recognize low usage and/or unused systems. Should these systems be removed or repurposed prior to migration?
Determine low usage and/or unused applications. Are these applications required at all? Should they be gotten rid of prior to migration?
Recognize and clean up aspects of duplication, be it systems and/or applications.
Now determine those business-critical systems and applications that will now be moved as part of your strategy. With this comprehensive asset data in hand, you can sharpen your migration method by segmenting exactly what must – and ought to not be moved – or at least crisply prioritize based on business value.

3. Prepare For Cloud Visibility Post Migration

Now that you’re armed with extensive, precise existing and historic asset data, how will you preserve this level of visibility after your effective cloud asset migration?

While the cost benefits of migrating to the cloud are typically extremely compelling, uncontrolled asset/ virtual device expansion can rapidly deteriorate those cost benefits. So, prior to performing your cloud asset migration, make certain you have a cloud visibility solution in place that:

Finds/ monitors all linked assets throughout your single or multi-cloud environment
Inventories, fingerprints, and classifies found assets
Informs on new or unforeseen asset discovery and/or behavior within the cloud environment
Incorporates with existing ticketing, workflow, and/or CMDB systems

Cloud Visibility and Security with Ziften

Ongoing cloud visibility into each device, user, and application means you can administer all elements of your infrastructure better. You’ll avoid losing resources by preventing VM proliferation, plus you’ll have a comprehensive body of data to satisfy audit requirements for NIST 800-53, HIPAA, and other compliance guidelines.

Follow the above when you move to the cloud, and you’ll avoid weak security, insufficient compliance, or functional SNAFUs. Ziften’s technique to cloud visibility and security gives you the intelligence you need for cloud asset migration without the difficulties.