Chuck Leaver – Collaboration With Microsoft To Defend You Against Attacks

Written By David Shefter And Presented By Chuck Leaver

 

Recently we announced a partnership with Microsoft that combines Ziften’s Zenith ® systems and security operations platform, and Windows Defender Advanced Threat Protection (ATP) delivering a cloud-based, “single pane of glass” to find, see, examine, and respond to innovative cyber attacks and breaches on Windows, macOS, and Linux-based devices (desktops, laptop computers, servers, cloud, etc).

Windows Defender ATP plus Ziften Zenith is a security service that enables business clients to spot, investigate, respond and remediate sophisticated hazards on their networks, off-network, and in the data center and cloud.

Imagine a single solution throughout all the devices in your business, offering scalable, cutting-edge security in a cost-effective and simple to use platform. Making it possible for enterprises across the globe to protect and handle devices through this ‘single pane of glass’ provides the pledge of lower operational expenses with real improved security providing real time worldwide threat security with information collected from billions of devices worldwide.

The Architecture Of Microsoft And Ziften

The diagram listed below provides an introduction of the service parts and integration between Windows Defender ATP and Ziften Zenith.

Endpoint investigation capabilities let you drill down into security notifications and understand the scope and nature of a potential breach. You can submit files for deep analysis, get the results and take remediation without leaving the Windows Defender ATP console.

Discover and Contain Hazards

With the Windows Defender ATP and Ziften Zenith integration, companies can readily detect and contain dangers on Windows, macOS, and Linux systems from an individual console. Windows Defender ATP and Ziften Zenith offer:

Behavior-based, cloud-powered, sophisticated attack detection. Discover the attacks that make it past all other defenses (after a breach has been detected).

Abundant timeline for forensic investigation and mitigation. Quickly examine the scope of any breach or believed behaviors on any device through a rich, 6-month machine timeline.

Built in unique danger intelligence knowledge base. Hazard intelligence to quickly identify attacks based upon tracking and data from millions of devices.

The image below shows many of the macOS and Linux threat detection and response capabilities now available with Windows Defender ATP.

At the end of the day, if you’re seeking to secure your endpoints and infrastructure, you have to take a tough look at Windows Defender ATP and Ziften Zenith.

~leaverchuck1


No Responses Yet to “Chuck Leaver – Collaboration With Microsoft To Defend You Against Attacks”

Leave a Reply