Author Archives: leavmecha

Prevent Devastating Ransomware Attacks With These 4 Actions – Charles Leaver

Written By Alan Zeichick And Presented By Charles Leaver

 

Ransomware is real, and is threatening individuals, services, schools, health centers, local governments – and there’s no indication that ransomware is stopping. In fact, it’s most likely increasing. Why? Let’s be honest: Ransomware is most likely the single most efficient attack that cyber criminals have actually ever created. Anybody can develop ransomware using easily available tools; any cash received is most likely in untraceable Bitcoin; and if something fails with decrypting someone’s hard disk, the cyber criminal isn’t really affected.

A business is impacted by ransomware every forty seconds, in accordance with some sources, and 60% of malware problems were ransomware. It strikes all sectors. No industry is safe. And with the rise of RaaS (Ransomware-as-a-Service) it’s gon na worsen.

The good news: We can resist. Here’s a four-step fight strategy.

Great Standard Hygiene

It starts with training workers ways to manage malicious emails. There are falsified messages from service partners. There’s phishing and target spearphishing. Some will survive email spam/malware filters; employees have to be taught not to click on links in those messages, or naturally, not to give permission for plugins or apps to be set up.

However, some malware, like ransomware, is going to get through, often making use of out-of-date software or unpatched systems, just like in the Equifax breach. That’s where the next action comes in:

Ensuring that end points are completely patched and totally up-to-date with the latest, most safe and secure operating systems, applications, utilities, device drivers, and code libraries. That way, if there is an attack, the endpoint is healthy, and has the ability to best battle the infection.

Ransomware isn’t really an innovation or security problem. It’s an organization problem. And it’s so much more than the ransom that is demanded. That’s nothing compared to loss of efficiency because of downtime, poor public relations, disgruntled clients if service is disrupted, and the expense of reconstructing lost data. (And that presumes that important intellectual property or protected financial or client health data isn’t stolen.).

What else can you do? Backup, backup, backup, and safeguard those backups. If you don’t have safe, secured backups, you cannot bring back data and core infrastructure in a prompt style. That consists of making daily snapshots of virtual machines, databases, applications, source code, and setup files.

Services require tools to spot, identify, and avoid malware like ransomware from dispersing. This needs continuous visibility and reporting of exactly what’s occurring in the environment – including “zero day” attacks that haven’t been seen before. Part of that is keeping track of endpoints, from the smart phone to the PC to the server to the cloud, to guarantee that endpoints are up-to-date and protected, and that no unexpected changes have been made to their underlying configuration. That way, if a machine is infected by ransomware or other malware, the breach can be identified rapidly, and the device isolated and closed down pending forensics and recovery. If an endpoint is breached, quickly containment is critical.

The Four Tactics.

Great user training. Upgrading systems with patches and fixes. Supporting whatever as frequently as possible. And utilizing tracking tools to help both IT and security groups identify problems, and react quickly to those problems. When it comes to ransomware, those are the four battle-tested strategies we need to keep our companies safe.

You can learn more about this in a brief eight-minute video, where I talk with a number of market professionals about this concern:

Your Security Will Improve With Microsoft And Ziften – Charles Leaver

Written By David Shefter And Presented By Charles Leaver

 

Recently we announced a partnership with Microsoft that combines Ziften’s Zenith ® systems and security operations platform, and Windows Defender Advanced Threat Protection (ATP) providing a cloud based, “single pane of glass” to identify, see, investigate, and respond to sophisticated cyber-attacks and breaches on Windows, macOS, and Linux-based devices (desktops, laptop computers, servers, cloud, etc).

Windows Defender ATP plus Ziften Zenith is a security service that makes it possible for enterprise clients to identify, investigate, respond and fix innovative risks on their networks, off-network, and in the data center and cloud.

Imagine a single option throughout all the devices in your business, providing scalable, state of the art security in an economical and easy to use platform. Enabling business throughout the world to protect and manage devices through this ‘single pane of glass’ delivers the guarantee of lower operational costs with real improved security providing real time international risk security with details collected from billions of devices worldwide.

Microsoft and Ziften Architecture

The diagram below provides an overview of the service elements and integration between Windows Defender ATP and Ziften Zenith.

Endpoint examination abilities allow you to drill down into security signals and comprehend the scope and nature of a prospective breach. You can submit files for deep analysis, receive the results and take action without leaving the Windows Defender ATP console.

Detect and Contain Risks

With the Windows Defender ATP and Ziften Zenith integration, organizations can easily find and contain threats on Windows, macOS, and Linux systems from a single console. Windows Defender ATP and Ziften Zenith provide:

Based on behavior, cloud-powered, innovative attack detection. Find the attacks that make it past your other defenses (after a breach has been detected).

Rich timeline for forensic examination and mitigation. Quickly investigate the scope of any breach or presumed habits on any machine through a rich, 6-month device timeline.

Built in special threat intelligence knowledge base. Risk intelligence to quickly spot attacks based on monitoring and data from hordes of devices.

The diagram below shows many of the macOS and Linux danger detection and response abilities now available with Windows Defender ATP.

In conclusion, if you’re wanting to secure your endpoints and infrastructure, you need to take a tough look at Windows Defender ATP and Ziften Zenith.

Safeguard Your Organization Against The KRACK Vulnerability – Charles Leaver

Written By Dr Al Hartmann And Presented By Charles Leaver

 

Enough press has been generated over the Wi-Fi WPA2-defeating Key Reinsertion Attack (KRACK), that we don’t need to re-cover that again. The initial discoverer’s site is an excellent location to review the problems and connect to the detailed research paper. This may be the most attention paid to a core communications security failure since the Heartbleed attack. In that earlier attack, a patched variation of the vulnerable OpenSSL code was launched on the very same day as the general disclosure. In this brand-new KRACK attack, comparable responsible disclosure standards were followed, and patches were either currently launched or quickly to follow. Both wireless endpoints and wireless network devices need to be properly patched. Oh, and all the best getting that Chinese knockoff wireless security camera bought off eBay patched quickly.

Here we will just make a couple of points:

Take inventory of your wireless devices and follow up to ensure appropriate patching. (Ziften can carry out passive network stock, consisting of wireless networks. For Ziften monitored end points, the readily available network interfaces in addition to applied patches are reported.) For enterprise IT staff, it is patch, patch, patch every day anyhow, so absolutely nothing brand-new here. But any unmanaged wireless devices must be identified and vetted.

Windows and iOS end points are less prone, while unpatched Android and Linux end points are highly prone. The majority of Linux endpoints will be servers without wireless networking, so not as much exposure there. But Android is another story, especially provided the balkanized state of Android upgrading throughout device manufacturers. More than likely your enterprise’s greatest exposure will be IoT and Android devices, so do your risk analysis.

Prevent wireless access by means of unencrypted protocols such as HTTP. Stick to HTTPS or other encrypted protocols or utilize a safe VPN, but be aware some default HTTPS sites enable compromised devices to coerce downgrade to HTTP. (Note that Ziften network monitoring reports IP addresses and ports used, so take a look at any wireless port 80 traffic on endpoints that are unpatched.).

Continue whatever wireless network health practices you have actually been using to identify and silence rogue access points, unapproved wireless devices, etc. Grooming access point positioning and transmission zones to decrease signal spillage outside your physical borders is likewise a sensible practice, since KRACK opponents must exist locally within the wireless network. Do not give them advantaged placement opportunities within or close by to your environment.

For a more broad discussion around the KRACK vulnerability, check out our current video on the topic:

You Need Effective Training On Security Awareness For Employees – Charles Leaver

Written By Charles Leaver Ziften CEO

 

Effective corporate cybersecurity assumes that people – your workers – do the best thing. That they do not hand over their passwords to a caller who claims to be from the IT department doing a “credentials audit.” That they do not wire $10 million to an Indonesian savings account after getting a midnight request from “the CEO”.

That they don’t set up an “urgent upgrade” to Flash Player based on a pop-up on a porn website. That they do not overshare on social media. That they do not store business info on file-sharing services outside the firewall. That they don’t link to unsecure WiFi networks. And they don’t click on links in phishing emails.

Our research study reveals that over 75% of security events are triggered or helped by staff member mistakes.

Sure, you have actually installed endpoint security, e-mail filters, and anti-malware services. Those precautions will most likely be for nothing, though, if your employees do the wrong thing time and again when in a dangerous situation. Our cybersecurity efforts resemble having an expensive car alarm: If you do not teach your teenager to lock the car when it’s at the shopping mall, the alarm is worthless.

Security awareness isn’t enough, of course. Employees will make errors, and there are some attacks that don’t need a worker bad move. That’s why you need endpoint security, email filters, anti-malware, etc. However let’s speak about effective security awareness training.

Why Training Often Doesn’t Have an Effect

First – in my experience, a great deal of employee training, well, is poor. That’s specifically true of online training, which is normally horrible. But most of the times, whether live or canned, the training lacks trustworthiness, in part because many IT professionals are poor and unconvincing communicators. The training often focuses on interacting and imposing guidelines – not changing risky habits and habits. And it resembles getting compulsory photocopier training: There’s absolutely nothing in it for the employees, so they don’t accept it.

It’s not about imposing rules. While security awareness training might be “owned” by various departments, such as IT, CISO, or HR, there’s typically a lack of understanding about exactly what a safe awareness program is. First of all, it’s not a checkbox; it needs to be continuous. The training needs to be delivered in different ways and times, with a combination of live training, newsletters, small-group discussions, lunch-and-learns, and yes, even resources online.

Securing yourself is not complex!

But a huge problem is the lack of objectives. If you have no idea what you’re aiming to do, you can’t see if you have actually done a good job in the training – and if risky behaviors really change.

Here are some sample objectives that can lead to effective security awareness training:

Provide employees with the tools to recognize and handle ongoing daily security threats they might get online and by means of email.

Let staff members understand they are part of the team, and they cannot simply rely on the IT/CISO teams to manage security.

Halt the cycle of “unintentional lack of knowledge” about safe computing practices.

Change state of minds towards more safe practices: “If you observe something, state something”.

Evaluation of company guidelines and procedures, which are discussed in actionable terms which relate to them.

Make it Appropriate

No matter who “owns” the program, it’s necessary that there is visible executive backiong and management buy-in. If the execs don’t care, the workers won’t either. Efficient training won’t discuss tech buzzwords; rather, it will focus on changing behaviors. Relate cybersecurity awareness to your workers’ personal life. (And while you’re at it, teach them the best ways to keep themselves, their family, and their house safe. Odds are they do not know and hesitate to ask).

To make security awareness training really pertinent, solicit worker ideas and encourage feedback. Procedure success – such as, did the number of external links clicked by staff members go down? How about contacts to tech assistance originating from security infractions? Make the training timely and real-world by including current rip-offs in the news; unfortunately, there are a lot of to choose from.

In other words: Security awareness training isn’t really enjoyable, and it’s not a silver bullet. However, it is vital for making sure that dangerous staff member habits do not undermine your IT/CISO efforts to protect your network, devices, applications, and data. Make certain that you continuously train your staff members, which the training works.

Splunk And Ziften Generate Passion At Splunk .conf – Charles Leaver

Written By Josh Applebaum And Presented By Charles Leaver

 

Like a number of you, we’re still recuperating from Splunk.conf recently. As usual,. conf had terrific energy and the people who were in attendance were enthusiastic about Splunk and the many usage cases that it offers through the big app ecosystem.

One crucial statement during the 7 days worth discussing was a brand-new security offering known as “Content Updates,” which basically is pre-built Splunk searches for helping to find security occurrences.

Basically, it has a look at the most recent attacks, and the Splunk security team creates brand-new searches for how they would look through Splunk ES data to discover these kinds of attacks, and then ships those brand-new searches down to customer’s Splunk ES environments for automated signals when seen.

The very best part? Because these updates are using primarily CIM (Common Info Model) data, and Ziften populates a great deal of the CIM models, Ziften’s data is currently being matched against the new Content Updates Splunk has created.

A fast demonstration revealed which suppliers are adding to each kind of “detection” and Ziften was mentioned in a great deal of them.

For instance, we have a current article that shares how Ziften’s data in Splunk is utilized to find and react to WannaCry.

Overall, with the around 500 people who came by the cubicle over the course of.conf I need to say it was among the very best occasions we’ve performed in regards to quality discussions and interest. We had nothing but favorable reviews from our extensive discussions with all walks of business life – from highly technical analysts in the public sector to CISOs in the monetary sector.

The most typical conversation normally started with, “We are just starting to implement Splunk and are brand-new to the platform.” I like those, given that people can get our Apps free of charge and we can get them an agent to try out and it gets them something to use right out of the box to show worth instantly. Other folks were very skilled and truly liked our approach and architecture.

Bottom line: People are genuinely thrilled about Splunk and genuine services are readily available to help people with real problems!

Curious? The Ziften ZFlow App and Technology Add-on assists users of Splunk and Splunk ES usage Ziften-generated prolonged NetFlow from endpoints, servers, and cloud VMs to see exactly what they are missing out on at the edge of their network, their data centers, and in their cloud deployments.

Safeguard Yourself From Cyber Security Problems With Ziften Services – Charles Leaver

Written By Josh Harriman And Presented By Charles Leaver

Having the right tools in place is a given in our market. However having the right tools and services is one thing. Getting the most value out of them can be a difficulty. Even with all the best intents and properly skilled personnel, there can be gaps. Ziften Services can help fill those spaces and keep you on track for success.
Ziften Services can augment, or even straight-out lead your IT Operations and Security groups to much better arm your company with 3 excellent offerings. Every one is customized for a particular requirement and given the statistics from a recent report by ESG (Enterprise Strategy Group) entitled “Trends in Endpoint Security Research Study”, which mentioned 51% of responders in the study said they will be deploying and using an EDR (endpoint detection and response) option now and 35% of them prepare to utilize managed services for the implementation, shows the requirement is out there for correct services around these products and solutions. Therefore, Ziften is offering our services understanding that many companies do not have the scale or proficiency to execute and totally make use of required tools such as EDR.
Ziften services are as follows:
Ziften Assess Service
Ziften Hunt Service
Ziften Respond Service
While each of the 3 services cover a distinct function, the latter two are more complementary to each other. Let’s look at each in a little bit more detail to much better understand the benefits.
Assess Service
This service covers both IT functional and security groups. To determine your success in proper documents and adherence of processes and policies, you need to begin with a good solid baseline. The Assess services begin by carrying out extensive interviews with key decision makers to truly comprehend exactly what is in place. From there, a Ziften Zenith release provides tracking and data collection of key metrics within customer device networks, data centers and cloud deployments. The reporting covers asset management and performance, licensing, vulnerabilities, compliance as well as anomalous behaviors. The result can cover a range of concerns such as M&An evaluations, pre-cloud migration planning and periodic compliance checks.
Hunt Service
This service is a true 24 × 7 managed endpoint detection and response (MDR) offering. Organizations struggle to fully cover this essential aspect to security operations. That could be because of limited personnel or crucial know-how in risk hunting methods. Again, utilizing the Ziften Zenith platform, this service utilizes continuous monitoring throughout client devices, servers, cloud VMs supporting Windows, Mac OSX and Linux operating systems. Among the primary results of this service is dramatically reducing threat dwell times within the environment. This has been discussed frequently in the past few years and the numbers are shocking, generally in the order of 100s of days that risks stay covert within companies. You require someone that can actively hunt for these foes as well as can retrospectively look back to past occasions to find behaviors you were not aware of. This service does provide some hours of dedicated Incident Response as well, so you have all your bases covered.
Respond Service
When you are against the ropes and have a true emergency, this service is what you require. This is a tried and true IR team prepared for battle 24 × 7 with a broad series of response tool sets at their disposal. You will get instant event examination and triage. Suggested actions align with the severity of the danger and what response actions have to take place. The groups are really versatile and will work from another location or if required, can be on site where conditions require. This could be your whole IR team, or will enhance and mix right in with your existing group.
At the end of the day, you need services to help optimize your possibilities of success in today’s world. Ziften has 3 fantastic offerings and wants all our customers to feel protected and lined up with the best operational and security posture available. Please connect to us so we can help you. It’s exactly what we love to do!

With Vulnerability Lifecycle Management Your Job Will Be Safer – Charles Leaver

Written By Dr Al Hartmann And Presented By Charles Leaver

 

The following heading hit the news recently on September 7, 2017:

Equifax Inc. today revealed a cybersecurity event potentially impacting approximately 143 million U.S. consumers. Criminals exploited a U.S. site application vulnerability to access to particular files. Based on the business’s investigation, the unauthorized access occurred from mid-May through July 2017.

Lessons from Past Debacles

If you like your occupation, value your role, and dream to retain it, then don’t leave the door ajar for attackers. A significant data breach frequently begins with an unpatched vulnerability that is easily exploitable. Then the inescapable happens, the hackers are inside your defenses, the crown jewels have actually left the building, the press releases fly, high-priced specialists and external legal counsel accumulate billable hours, regulators descend, lawsuits are flung, and you have “some serious ‘splainin’ to do”!

We have yet to see if the head splainer in the current Equifax breach will make it through, as he is still in ‘splainin’ mode, asserting the breach started with the exploitation of an application vulnerability.

In such cases the normal rhumba line of resignations is – CISO initially, followed by CIO, followed by CEO, followed by the board of directors shakeup (specifically the audit and business duty committees). Don’t let this take place to your professional life!

Actions to Take Immediately

There are some common sense actions to take to prevent the inescapable breach disaster resulting from unpatched vulnerabilities:

Take stock – Inventory all data and system assets and map your network topology and attached devices and open ports. Know your network, it’s division, what devices are attached, what those devices are running, what vulnerabilities those systems and apps expose, what data assets they gain access to, the level of sensitivity of those assets, what defenses are layered around those assets, and what checks remain in place along all potential access points.

Improve and toughen up – Execute best practices recommendations for identity and access management, network division, firewall software and IDS setups, operating system and application configurations, database access controls, and data file encryption and tokenization, while streamlining and trimming the number and intricacy of subsystems throughout your business. Anything too complex to handle is too complex to protect. Select setup hardening heaven over breach response hell.

Constantly monitor and scrutinize – Routine audits are necessary but not enough. Continually monitor, track, and assess all pertinent security events and exposed vulnerabilities – have visibility, event capture, analysis, and archiving of every system and session login, every application launch, every active binary and vulnerability exposure, every script execution, every command issued, every networking contact, every database transaction, and every delicate data access. Any holes in your security event visibility develop an opponent free-fire zone. Establish key performance metrics, monitor them ruthlessly, and drive for unrelenting enhancement.

Don’t accept operational reasons for insufficient security – There are always safe and secure and reliable functional policies, but they might not be pain-free. Not suffering a catastrophic data breach is long down the organizational discomfort scale from the alternative. Functional expedience or running traditional or misaligned priorities are not valid excuses for extenuation of bad cyber practices in an intensifying threat environment. Make your voice heard.

Don’t Dismiss The Equifax Data Breach Take Action Now – Charles Leaver

Written By Michael Levin And Presented By Charles Leaver

 

Equifax, among the 3 major U.S. based credit reporting services simply revealed a significant data breach where cyber criminals have actually taken sensitive info from 143 million United States consumers.

Ways that the Equifax security breach WILL impact you:

– Personal – Your individual and family’s identity details is now at risk and will be targeted!

– Company – Your businesses may be affected and targeted.

– Nationally – Terrorist, Nation States and organized criminal groups could be included or use this data to commit cyber crimes to acquire financial gain.

Safeguarding yourself is not complicated!

Five recommendations to secure yourself right away:

– Register for a credit tracking service and/or lock your credit. The quickest way to be informed that your credit is jeopardized is through a credit monitoring service. Equifax has actually already started the process of setting up free credit tracking for those impacted. Other credit monitoring services are available and should be considered.

– Track all your financial accounts including credit cards and all bank accounts. Guarantee that all notices are switched on. Make sure you are getting instant text and e-mail notices for any modifications in your account or increased balances or transactions.

– Protect your bank and monetary accounts, guarantee that two-factor authentication is switched on for all accounts. Learn more about 2 level authentication and turn it on for all monetary accounts.

– Phishing email messages can be your greatest day-to-day danger! Slow down when managing e-mail messages. Stop immediately clicking on every email link and attachment you get. Instead of clicking on links and attachments in e-mail messages, go independently to the sites outside of the e-mail message. When you receive an e-mail, you were not anticipating from a name you recognize consider calling the sender separately before you click links or attachments.

– Strong passwords – consider altering all your passwords. Establish strong passwords and secure them. Use different passwords for your accounts.

Other Security Thoughts:

– Backup all computers and update operating systems and software routinely.

– Social media security – Sharing too much details on social networks increases the risk that you will be taken advantage of. For instance, informing the world, you are on a trip with pictures opens the danger your house will be broken into.

– Secure your devices – Do not leave your laptop computer, phone or tablet unattended even for a moment. Do not leave anything in your automobile you do not want taken because it’s just a matter of time.

– Internet of things and device management – Understand how all your devices connect to the Internet and what info you are sharing. Inspect security settings for all devices and be sure to include smart watches and physical fitness bands.

The worth of training on security awareness:

– This is another cyber crime, where security awareness training can help to lower risk. Being aware of brand-new cyber crimes and frauds in the news is a basic part of security awareness training. Making sure that staff members, family and friends know this scam will significantly reduce the probability that you will be victimized.

– Sharing new frauds and cyber crimes you find out about in the news with others, is very important to guarantee that individuals you care about do not fall victim to these kinds of criminal activities.

Generic Will Not Fit So Choose Extensible – Charles Leaver

Written By Charles Leaver Ziften CEO

 

Whether you call them extensions, or call them personalizations – no matter what they are called, the best technology platforms can be tailored to fit an organization’s specific business requirements. Generic operations tools are great at performing generic operations jobs. Generic security tools are great at dealing with generic security challenges. Generic can just take you so far, though, which’s where extensibility takes over.

Extensibility turns up often when I’m speaking to customers and potential customers, and I’m proud that a Global 10 company selected Ziften over everyone else in the market mainly on that basis. For that client, and numerous others, the capability to deeply tailor platforms is a need.

This isn’t really about merely creating custom-made reports or custom-made notifications. Let’s be truthful – the ability to develop reports are baseline ability of many IT operations and security management tools. Real extensibility goes deep into the service to offer it abilities that resolve real problems for the company.

One client used lots of mobile IoT devices, and had to have our Zenith real time visibility and control system have the ability to access (and monitor) the memory of those devices. That’s not a standard function used by Zenith, due to the fact that our low-footprint agent does not hook into the operating system kernel or work through basic device drivers. Nevertheless, we dealt with the customer to personalize Zenith with that ability – and it ended up being simpler than anybody imagined.

Another customer looked at the basic set of end point data that the agent collects, and wanted to add additional data fields. They likewise wished to setup the administrative console with custom-made actions utilizing those data fields, and press those actions back out to those end points. No other endpoint tracking and security option was able to offer the function for adding that functionality besides Ziften.

What’s more, the client established those extensions themselves … and owns the code and IP. It becomes part of their own secret sauce, their own company differentiator, and distinct to their company. They could not be any more happy. And neither could we.

With many other IT operations and security systems, if clients desire additional functions or capabilities, the only option is to submit that as a future feature demand, and hope that it appears in an upcoming release of the solution. Until then, regrettable.

That’s not how we developed our flagship solutions, Zenith and ZFlow. Due to the fact that our endpoint agent isn’t based on kernel hooks or device drivers, we can allow for significant extensibility, and open up that extensibility for clients to access directly.

Likewise, with our administrative consoles and back-end tracking systems; everything is adjustable. And that was integrated in right from the beginning.

Another aspect of customization is that our real time and historic visibility database can integrate into your other IT operations and security platforms, such as SIEM tools, risk intelligence, IT ticketing system, task orchestration systems, and data analytics. With Zenith and ZFlow, there are no more silos. Ever.

In the world of endpoint tracking and management, extensions are significantly where it’s at. IT operations and enterprise security groups need the capability to tailor their tools platforms to fit their specific requirements for tracking and handling IoT, conventional endpoints, the data center, and the cloud. In numerous client discussions, our integrated extensibility has actually caused eyes to light up, and won us trials and implementations. Inform us about your custom requirements, and let’s see what we can do.

Ziften Is The First To Reveal Its Endpoint Security Architecture So Will Others Follow? – Charles Leaver

Written By Mike Hamilton And Presented By Ziften CEO Charles Leaver

 

Endpoint security is really in vogue these days. And there are lots of different vendors out there touting their services in this market. But it’s in some cases hard to understand exactly what each vendor offers. What’s much more hard is to comprehend how each vendor solution is architected to offer their services.

I believe that the back end architecture of whatever you pick can have a profound influence on the future scalability of your application. And it can develop lots of unexpected work and costs if you’re not cautious.

So, in the spirit of openness, and due to the fact that we believe our architecture is not the same, unique and effective, we welcome all endpoint security vendors to “reveal to us your architecture”.

I’ll kick this off in the following video where I reveal to you the Ziften architecture, and a couple of exactly what I think about tradition architectures for contrast. Specifically, I’ll discuss:

– Ziften’s architecture designed utilizing next-gen cloud principles.
– One business peer-to-peer “mish-mash” architecture.
– Tradition hub-spoke-hub architectures.

I have actually revealed you the power of our really cloud-based platform. Now it’s my rival’s turn. Come on folks – reveal to us your architectures!