Archive for March, 2018

Chuck Leaver – Great Security Opportunity For Microsoft Channel Partners

Written By Greg McCreight And Presented By Chuck Leaver

 

Windows Defender Advanced Threat Protection (WDATP) is very good, popular with Microsoft channel partners around the world. It is probable that you’re currently dealing with Microsoft clients to set up and look after WDATP on their Windows end points.

I’m thrilled to tell you about a new opportunity: Get a fast start with an industry-leading service that integrates right into WDATP: Ziften Zenith. For a restricted time, Microsoft channel partners can utilize our brand-new “Fast Start” program to collaborate with Ziften.

With “Fast Start,” you delight in all the benefits of Ziften’s leading tier partner status for a complete year, and we’ll assist you to get up and running quickly with joint market and business advancement resources – and with a waiver of the usual sales volume dedication related to Gold Status.

If you do not know Ziften, we provide infrastructure visibility and collaborated risk detection, prevention, and response across all endpoint devices and cloud environments. Zenith, our flagship security platform, easily deploys to client devices, servers, and virtual machines.

Once installed, Zenith continuously collects all the info essential to properly assess the existing and historic state of all handled devices including system, user habits, network connection, application, binary, and procedure data. Zenith offers your clients’ IT and security teams with constant visibility and control of all managed assets including continuous monitoring, alerting, and automated or manual actions.

Zenith is cross-platform – it operates with and safeguards Windows, Mac, Linux, and other end points.

What’s specifically notable – and here’s the chance – is that Ziften has worked together with Microsoft to incorporate Zenith with Windows Defender ATP. That suggests your customers can utilize WDATP on Windows systems and Zenith on their macOS and Linux systems to discover, view, and respond to cyberattacks all using just the WDATP Management Console for all the systems. Zenith is hidden in the background.

A single pane of glass, to handle Windows, Mac, Linux endpoints, which can consist of desktops, notebooks, and servers. That makes Zenith an ideal solution to provide to your existing WDATP clients… and to make your bids for new WDATP business more comprehensive for multi-platform business potential customers.

Furthermore, offering Zenith can assist you speed client migrations to Windows 10, and offer more Business E5 commercial editions.

” Fast Start” with Gold Status for a Year

Ziften is absolutely concentrated on the channel: 96% of our sales in 2017 were through the channel. We are delighted to bring the “Fast Start” program to existing Microsoft channel partners, anywhere in the world.

With “Fast Start,” you can sign up for the Ziften Channel Program with these advantages:

Expedited Approval and On-Boarding – Ziften channel managers and field sales work directly with you to get operating providing the Zenith endpoint security service integrated with Windows Defender ATP.

Superior Security Value – You’ll be uniquely positioned to provide clients and potential customers higher security worth throughout more of their overall environment than ever, increasing the variety of supported and secured Windows, Mac, and Linux systems.

Hands-On Collaboration – Ziften dedicates field sales, sales engineers, and marketing to support your daily pre-sales engagements, drive brand-new sales opportunities, and assist to close more deals with Microsoft and Ziften endpoint security.

Here’s what one major Microsoft channel partner, states about this – this is Ronnie Altit, creator and CEO of Insentra, a “partner-obsessed” Australian IT services company that works solely through the IT channel:

” As a large Microsoft reseller, teaming with Ziften to provide their Zenith security platform integrated with Microsoft Windows Defender ATP was a no-brainer. We’re thrilled at the seamless integration between Zenith and Windows Defender ATP giving our customers holistic protection and visibility throughout their Windows and non-Windows systems. Ziften has actually been a pleasure to work with, and helpful at every step of the procedure. We expect to be exceptionally successful offering this powerful security service to our clients.”

Chuck Leaver – The Girl Scouts Are Raising The Profile Of Women In Cybersecurity

Written By Kim Foster And Presented By Chuck Leaver

 

It’s clear that cybersecurity is getting more international attention than before, and businesses are rightfully worried if they are training sufficient security specialists to fulfill growing security dangers. While this issue is felt across the commercial world, numerous people did not anticipate Girl Scouts to hear the call.

Beginning this fall, countless Girl Scouts nationwide have the chance to receive cybersecurity badges. Girl Scouts of the U.S.A teamed up with Security Company (and Ziften tech partner) Palo Alto Networks to create a curriculum that informs girls about the essentials of computer system security. In accordance with Sylvia Acevedo, CEO of GSUSA, they developed the program based upon need from the ladies themselves to safeguard themselves, their computers, and their household networks.

The timing is good, given that in accordance with a study launched in 2017 by (ISC), 1.8 million cybersecurity positions will be unfilled by 2022. Combine increased need for security pros with stagnant growth for females – only 11 percent for the past several years – our cybersecurity staffing difficulties are poised to get worse without significant effort on behalf of the industry for better inclusion.

Obviously, we can’t rely on the Girl Scouts to do all of the heavy lifting. Broader educational efforts are a given: according to the Computing Technology Industry Association, 69% of U.S. ladies who do not have a career in infotech pointed out not knowing exactly what chances were readily available to them as the reason they did not pursue one. One of the great untapped chances of our market is the recruitment of more diverse specialists. Targeted educational programs and increased awareness must be high concern. Raytheon’s Ladies Cyber Security Scholarship is a fine example.

To gain the rewards of having women invested in shaping the future of technology, it is very important to dispel the exclusionary understanding of “the boys’ club” and keep in mind the groundbreaking contributions made by females of the past. Numerous folk know that the very first computer system developer was a female – Ada Lovelace. Then there is the work of other well-known leaders such as Grace Hopper, Hedy Lamarr, or Ida Rhodes, all who may stimulate some vague recollection among those in our market. Female mathematicians produced programs for one of the world’s first fully electronic general-purpose computers: Kay McNulty, Jean Jennings Bartik, Betty Snyder, Marlyn Meltzer, Fran Bilas, and Ruth Lichterman were simply a few of the initial developers of the Electronic Numerical Integrator and Computer system (better known as ENIAC), though their important work was not commonly recognized for over half a century. In fact, when historians initially discovered photos of the ladies in the mid-1980s, they misinterpreted them for “Refrigerator Ladies” – models posing in front of the machines.

It’s worth noting that many think the same “boys’ club” mentality that neglected the accomplishments of women in history has led to restricted leadership positions and lower wages for contemporary women in cybersecurity, along with outright exclusion of female stars from speaking chances at market conferences. As trends go, excluding brilliant people with suitable knowledge from affecting the cybersecurity market is an unsustainable one if we wish to stay up to date with the bad guys.

Whether or not we jointly take action to promote more inclusive offices – like informing, hiring, and promoting females in larger numbers – it is heartening to see an organization synonymous with fundraising event cookies successfully alert an entire industry to the fact that girls are really interested in the field. As the Girls Scouts these days are offered the tools to pursue a profession in info security, we must expect that they will become the very ladies who eventually reprogram our expectations of what a cybersecurity professional appears like.

Chuck Leaver – A Mac Is A Security Risk Too

Written By Roark Pollock And Presented By Chuck Leaver

 

Got Macs? Great. I have one too. Have you locked your Macs down? If not, your enterprise has a possibly major security weak point.

It’s a misconception to believe that Macintosh computer systems are inherently protected and don’t need to be protected against malware or hacking. Many believe Macs are certainly arguably more protected than Windows desktops and notebooks, due to the style of the Unix-oriented kernel. Definitely, we see less security patches issued for macOS from Apple, compared to security patches for Windows from Microsoft.

Fewer security defects is not absolutely no problems. And safer doesn’t imply 100% safe.

Some Mac Vulnerability Examples

Take, for example, the macOS 10.13.3 update, released on January 23, 2018, for the current versions of the Mac’s operating system. Like a lot of present computer systems running Intel processors, the Mac was susceptible to the Meltdown flaw, which indicated that harmful applications may be able to check out kernel memory.

Apple needed to patch this defect – as well as numerous others.

For instance, another problem could allow harmful audio files to carry out random code, which might break the system’s security integrity. Apple had to patch it.

A kernel flaw meant that a harmful application may be able to execute random code with kernel opportunities, giving hackers access to anything on the device. Apple needed to patch the kernel.

A defect in the WebKit library indicated that processing maliciously crafted web content may result in arbitrary code execution. Apple had to patch WebKit.

Another defect suggested that processing a malicious text message may result in application denial of service, freezing the system. Whoops. Apple had to patch that flaw also.

Don’t Make The Same Errors as Customers

Numerous consumers, believing all the hype about how wonderful macOS is, opt to run without defense, relying on the macOS and its integrated application firewall program to block all manner of bad code. Bad news: There’s no integrated anti virus or anti malware, and the firewall program can just do so much. And lots of businesses wish to overlook macOS when it comes to visibility for posture tracking and hardening, and hazard detection/ risk hunting.

Consumers frequently make these assumptions because they do not know any better. IT and Security experts ought to never ever make the very same mistakes – we must know much better.

If a Mac user sets up bad software applications, or adds a malicious browser extension, or opens a bad email attachment, or clicks a phishing link or a nasty ad, their machine is corrupted – much like a Windows computer. However within the enterprise, we need to be prepared to handle these issues, even with Mac computers.

What To Do?

What do you need to do?

– Set up anti-virus and anti malware on corporate Mac computers – or any Mac that has access to your organization’s material, servers, or networks.
– Track the state of Macs, much like you would with Windows computers.
– Be proactive in applying patches and fixes to Mac computers, again, much like with Windows.

You must also eliminate Macs from your corporate environment which are old and cannot run the most recent variation of macOS. That’s a lot of them, since Apple is pretty good at keeping old hardware. Here is Apple’s list of Mac models that can run macOS 10.13:

– MacBook (Late 2009 or newer).
– MacBook Pro (Mid 2010 or more recent).
– MacBook Air (Late 2010 or more recent).
– Mac mini (Mid 2010 or newer).
– iMac (Late 2009 or newer).
– Mac Pro (Mid 2010 or newer).

When the next version of macOS comes out, some of your older devices might fall off the list. They ought to fall off your inventory as well.

Ziften’s Perspective.

At Ziften, with our Zenith security platform, we strive to preserve visibility and security feature parity between Windows systems, macOS systems, and Linux-based systems.

In fact, we have actually partnered with Microsoft to incorporate our Zenith security platform with Microsoft Windows Defender Advanced Threat Protection (ATP) for macOS and Linux tracking and threat detection and response coverage. The integration makes it possible for customers to detect, see, investigate, and respond to advanced cyber-attacks on macOS computers (as well as Windows and Linux-based endpoints) straight within the Microsoft WDATP Management Console.

From our perspective, it has actually always been very important to offer your security teams confidence that every desktop/ laptop endpoint is safeguarded – and therefore, the enterprise is protected.

It can be hard to believe, 91% of businesses state they have some Mac computers. If those computers aren’t safeguarded, and also appropriately incorporated into your endpoint security systems, the enterprise is not secured. It’s just that basic.