Chuck Leaver – Our Endpoint Security Architecture Exposed

Written By Mike Hamilton And Presented By Ziften CEO Chuck Leaver


End Point security is all the rage nowadays. And there are great deals of different suppliers out there touting their wares in this market. But it’s sometimes challenging to comprehend what exactly each supplier provides. What’s much more tough is to comprehend how each supplier option is architected to provide their services.

I think that the back-end architecture of whatever you pick can have a profound impact on the future scalability of your application. And it can produce lots of unanticipated work and costs if you’re not mindful.

So, in the spirit of openness, and because we believe our architecture is different, special and powerful, we invite all endpoint security vendors to “reveal to us your architecture”.

I’ll kick this off in the video below where I show you the Ziften architecture, and a number of exactly what I consider legacy architectures for contrast. Specifically, I’ll talk about:

– Ziften’s architecture developed using next-gen cloud concepts.
– One company’s peer-to-peer “mish-mash” architecture.
– Tradition hub-spoke-hub architectures.

I have actually shown you the power of our really cloud based platform. Now it’s my competitor’s turn. Come on folks – reveal to us your architectures!


No Responses Yet to “Chuck Leaver – Our Endpoint Security Architecture Exposed”

Leave a Reply