Archive for April, 2018

Chuck Leaver – New Intelligent Security Association From Microsoft Is Great

Written By David Shefter And Presented By Chuck Leaver

 

It’s an excellent strategy: Microsoft has actually developed a mechanism for third-party security businesses, like Ziften, to work together to much better protect our clients. Everybody wins with the brand-new Microsoft Intelligent Security Association, revealed very recently – and we overjoyed to be a founding member and included in the launch. Kudos to Microsoft!

Sharing of Security Intelligence

Among the most interesting tasks coming out of Microsoft has actually been the new Microsoft Intelligent Security Graph, a danger intelligence engine built on artificial intelligence. The Intelligent Security Graph forms the structure of the new association – and the structure of a great deal of brand-new opportunities for development.

As Microsoft says, “At the present time, with the immense computing benefits offered by the cloud, the Machine learning and Artificial Intelligence is finding new ways to use its rich analytics engines and by applying a mix of automated and manual processes, artificial intelligence and human experts, we are able to develop a smart security graph that develops from itself and develops in real time, minimizing our cumulative time to discover and respond to brand-new incidents.”

The need for much better, more intelligent, security is significant, which is why we’re thrilled to be an establishing member of the new association.

Brad Anderson, Microsoft Corporate Vice President, Enterprise Mobility + Security, recently wrote, “Approximately 96 percent of all malware is polymorphic – meaning that it is only experienced by a single user and device prior to being changed with yet another malware variant. This is because for the most part malware is captured nearly as quick as it’s developed, so malware developers constantly develop to try and stay ahead. Data such as this hammers home how crucial it is to have security solutions in place that are as nimble and ingenious as the attacks.”

Endpoint Detection and Response that is Advanced

Which brings us to the kind of advanced endpoint detection and response (EDR) that Ziften provides to desktops, servers, and cloud assets – providing the organization special 24/7 visibility and control for any asset, anywhere. Nobody provides the functionality you’ll find in Ziften’s Zenith security platform.

That’s where the Microsoft Intelligent Security Association comes in. At the end of the day, even the very best defenses may be breached, and security groups should react faster and more strongly to ensure the security of their data and systems.

Ziften and Microsoft are delivering totally integrated hazard protection that covers customers’ endpoints – indicating customer devices, servers, and the cloud – with a structure of shared intelligence and the power of the cloud to transform tracking of organizational systems.

What Microsoft is Stating

“The Intelligent Security Association improves cooperation from leading sources to protect customers,” said Microsoft. “Having actually already attained strong client momentum with our integrated Ziften and Microsoft Windows Defender ATP option, clients stand to further gain from continued partnership.”

Additionally, “Continued integration and intelligence sharing within the context of the Microsoft Intelligent Security Graph enables joint customers to more quickly and properly discover, examine and react to attacks throughout their whole endpoint and cloud base.”

What Ziften is Saying

Ziften’s CEO, Chuck Leaver, is telling everybody that our founding subscription in the Microsoft Intelligent Security Association is a significant win for our joint customers and prospects – and it unites everybody in the Microsoft universe and beyond (note that Ziften’s Mac and Linux products are also part of the Microsoft partnership). “As security vendors, we all recognize the need to work together and team up to protect our clients and their workers. Congratulations to Microsoft for pioneering this industry effort,” Chuck said.

The outcome: Improved security for our clients, and tighter integration and more innovation in the industry. It’s a genuine win for everybody. Apart from the hackers, naturally. They lose. No apologies people.

Chuck Leaver – The Improved Ziften Channel Program

Written By Greg McCreight And Presented By Chuck Leaver

 

If you are a reseller, integrator, distributor, managed service provider – the brand-new Ziften Activate Partner Program is here, it’s ready to go, and will be terrific for your profitability (and for reducing your customers’ stress and anxiety about cybersecurity).

Ziften is 100 percent dedicated to the channel, and as we grow and progress in the market, we understand that your success is our success – and also our success is your success. And it shows: 96 percent of our sales in 2017 were through the channel! That’s why we built the new Activate Partner Program to provide you the resources you need to grow your organization with Ziften security services.

We kicked it all off with a very effective, cross-platform Endpoint Detection and Response (EDR) solution, Ziften Zenith. Customers really love it. Innovation Partners really love it. Resellers really love it. The market loves it. And analysts love it.

I have to share this from the conclusion of our broadband testing report, which discusses SysSecOps, or Systems Security Operations – an emerging classification where Ziften is a market leader:

Critical to Ziften’s endpoint technique in this category is total visibility – let’s face it, how can you secure if you cannot see or have no idea what is there in the first place? With its Zenith platform, Ziften has a solution that ticks all the SysSecOps boxes and more …

Overall, Ziften has a really competitive offering in the extremely legitimate, emerging IT category in the form of SysSecOps and one that should be on the examination short-list.

By the way: Microsoft recently partnered with Ziften to produce an integration of Zenith and Microsoft Windows Defender ATP, to permit Microsoft customers to secure Linux and Mac systems with the exact same single pane of glass as they use to secure Windows systems.

Enough about Ziften. Let’s concentrate on you. How you will benefit with the Activate Partner Program.

We have actually assembled a multi-tier partner program that has improved discount rates, more resources, and strong market advancement support. We understand a one-size-fits-all program does not work, not in the market today.

With Activate, we take a hands-on stance to onboarding brand-new partners; making it simple for those for whom security is a relatively small part of your services; and rewarding top-tier partners who have actually committed to Ziften.

Here’s what you get with the Activate Partner Program – and we’ll work with you to make sure that Activate fits your requirements perfectly:

Security for more of your consumer’s environment – endpoints, servers, and the cloud

Visibility and security for your client’s complex, multi-cloud deployments

Simple security tool integrations to provide genuinely custom, differentiated solutions

Hands-on, personalized assistance and life-cycle know-how

Rich financial rewards that encourage your long-term financial investment and reward on-going success

Market advancement support to drive incremental need and list building

First-rate, hands on assistance from our field sales, sales engineers, technical support, and marketing experts

The Activate program combines our effective security services, financial investments, and hands on assistance to help you develop more opportunity and close more deals.

Chuck Leaver – Be Prepared For Migrating Assets To The Cloud

Written By Logan Gilbert And Presented By Chuck Leaver

 

It bears reiterating – the Internet has actually permanently altered the world for individuals and companies alike. When it comes to the latter, every element of modern IT is undergoing digital change. IT departments everywhere are under pressure to make information extremely available and at lower expense – all while protecting critical data from corruption, leakage, or cyber theft.

Central to this strategy is the migration of data centers to the cloud. In fact, nineteen percent of company workloads are anticipated to be in the general public cloud by the end of 2019, and 50% over the next ten years.

Exactly What is Cloud Asset Migration?

Cloud migration is the process of moving data, applications or other service components from a company’s on-premise infrastructure to the cloud or moving them from one cloud service to another.

The diagram shown below illustrates this migration of file-server(s), data, and application(s) from an on premise server infrastructure to a cloud environment.

Cloud service providers make it possible for companies to move some or all IT infrastructure to the cloud for scale, speed, service flexibility, ease of management, and lowered costs. The advantages are absolutely nothing except compelling.

Utilizing Cloud Computing is changing the corporate landscape. With the technological developments, individuals are leaning more towards a virtual workplace meaning that you can work from anywhere and anytime making use of cloud computing.

Cloud Asset Migration Considerations

But, similar to any considerable IT infrastructure change, a relocate to the cloud requires thoughtful planning and execution for the procedure to occur within the budget plan and on time. Moving a server, database, application, or all of the above to the cloud is not without threat. System outages, performance degradation, data loss and more are likely to happen as a result of misconfigurations, system failures, and security exploits.

Case in point: 43% of those who have actually gone through a cloud asset migration have actually experienced a failed or delayed application. Why? Due to the fact that each asset migration is a ‘snowflake’ with its own level of complexity.

Let’s look at three aspects to think about for effective cloud asset migration.

1. Have a Plan

First, there has to be a strategic migration strategy. That plan needs to assist respond to concerns like the following:

Which IT assets should be migrated in the first place?
If you are moving some, or all, of your infrastructure to the cloud, how will you develop and preserve asset control?
How will you inventory what you have – before and after the move?
Do you even have to move all of it?
What comes first?

2. Clean Up Exactly What remains in Place Today

To answer these strategic questions successfully, you’ll require definitive visibility into each asset under roof now, along with appropriate characteristics of each asset. Whether your assets today are running on physical or virtual server infrastructure, you need to understand:

What assets are there now? Discover all the connected assets and comprehend whether they are currently handled and unmanaged.
Recognize low usage and/or unused systems. Should these systems be eliminated or repurposed prior to migration?
Recognize low usage and/or unused applications. Are these applications needed at all? Should they be gotten rid of prior to migration?
Determine and tidy up aspects of duplication, be it systems and/or applications.
Now identify those business-critical systems and applications that will now be migrated as part of your plan. With this detailed asset data in hand, you can sharpen your migration method by segmenting exactly what should – and ought to not be migrated – or at least clearly prioritize based upon business significance.

3. Prepare For Cloud Visibility Post Migration

Now that you’re equipped with thorough, precise existing and historical asset data, how will you preserve this level of visibility after your successful cloud asset migration?

While the expense benefits of moving to the cloud are often incredibly compelling, uncontrolled asset/ virtual machine proliferation can quickly wear down those cost benefits. So, before performing your cloud asset migration, ensure you have a cloud visibility service in place that:

Discovers/ monitors all connected assets throughout your single or multi-cloud environment
Inventories, fingerprints, and categorizes found assets
Alerts on new or unanticipated asset discovery and/or habits within the cloud environment
Incorporates with existing ticketing, workflow, and/or CMDB systems

Cloud Visibility and Security with Ziften

Continuous cloud visibility into each device, user, and application means you can administer all parts of your infrastructure more effectively. You’ll avoid squandering resources by preventing VM expansion, plus you’ll have an in-depth body of data to satisfy audit requirements for NIST 800-53, HIPAA, and other compliance regulations.

Follow the above when you migrate to the cloud, and you’ll stay away from weak security, incomplete compliance, or functional SNAFUs. Ziften’s method to cloud visibility and security offers you the intelligence you need for cloud asset migration without the difficulties.