Chuck Leaver – Recap Of RSA 2017 Customized Security Solutions Required

Written By Michael Vaughan And Presented By Chuck Leaver Ziften CEO

 

More customized solutions are required by security, network and functional groups in 2017

A number of us have actually participated in security conventions for many years, however none bring the exact same high level of enjoyment as RSA – where the world talks security. Of all the conventions I have actually gone to and worked, nothing comes close the passion for brand-new innovation people exhibited this previous week in good old San Francisco.

After taking a few days to absorb the lots of discussions about the requirements and constraints with existing security solutions, I have actually been able to synthesize a singular theme amongst participants:

People desire personalized solutions that fit their environment and work well across numerous internal groups.

When I describe the term “people,” I imply everyone in attendance regardless of technological section. Operational experts, security professionals, network veterans, and even user habits experts often
visited the Ziften cubicle and shared their stories with us.

Everybody appeared more ready than ever to discuss their wants and needs for their environment. These attendees had their own set of goals they wanted to achieve within their department and they were hungry for answers. Because the Ziften Zenith solution offers such broad visibility on business devices, it’s not unexpected that our cubicle remained crowded with individuals eager to read more about a new, refreshingly basic endpoint security technology.

Guests included grievances about myriad enterprise-centric security issues and sought much deeper insight into exactly what’s really occurring on their network and on devices traveling in and out of the workplace.

End users of old-school security solutions are on the look out for a more recent, more pivotal software applications.

If I might select simply one of the frequent questions I got at RSA to share, it’s this one:

” What exactly is endpoint discovery?”

1) Endpoint discovery: Ziften exposes a historic view of unmanaged devices which have been linked to other business endpoints at some point in time. Ziften permits users to discover recognized
and unknown entities which are active or have been interactive with recognized endpoints.

a. Unmanaged Asset Discovery: Ziften uses our extension platform to reveal these unknown entities working on the network.

b. Extensions: These are custom fit options customized to the user’s particular wants and
needs. The Ziften Zenith agent can execute the assigned extension one time, on a schedule or constantly.

Almost always after the above explanation came the genuine factor they were attending:

Individuals are looking for a large range of solutions for different departments, which includes executives. This is where working at Ziften makes addressing this concern a treat.

Only a part of the RSA participants are security specialists. I consulted with lots of network, operation, endpoint management, vice presidents, basic supervisors and channel partners.

They clearly all use and understand the requirement for quality security software but
apparently discover the translation to company worth missing amongst security vendors.

NetworkWorld’s Charles Araujo phrased the concern rather well in a post last week:

Organizations needs to also rationalize security data in a company context and manage it holistically as part of the general IT and business operating model. A group of vendors is likewise attempting to tackle this obstacle …

Ziften was amongst only three businesses mentioned.

After listening to those wants and needs of individuals from numerous business-critical backgrounds and describing to them the capabilities of Ziften’s Extension platform, I typically described how Ziften would modulate an extension to solve their requirement, or I gave them a brief demonstration of an extension that would allow them to overcome an obstacle.

2) Extension Platform: Tailored, actionable options.

a. SKO Silos: Extensions based on fit and need (operations, network, endpoint, etc).

b. Custom Requests: Need something you do not see? We can fix that for you.

3) Enhanced Forensics:

a. Security: Danger management, Danger Assessment, Vulnerabilities, Suspicious metadata.

b. Operations: Compliance, License Justification, Unmanaged Assets.

c. Network: Ingress/Egress IP motion, Domains, Volume metadata.

4) Visibility within the network– Not just exactly what goes in and leaves.

a. ZFlow: Lastly see the network traffic inside your business.

Needless to say, everybody I spoke with in our cubicle rapidly understood the vital benefit of having a tool such as Ziften Zenith running in and throughout their business.

Forbes writer, Jason Bloomberg, stated it very well when he recently explained the future of business security software and how all indications point toward Ziften leading the way:

Possibly the broadest interruption: vendors are improving their ability to comprehend how bad actors behave, and can therefore take steps to prevent, identify or alleviate their malicious activities. In particular, today’s suppliers comprehend the ‘Cyber Kill Chain’ – the actions an experienced, patient hacker (known in the biz as an advanced consistent threat, or APT) will take to attain his/her wicked goals.

The product of U.S. Defense professional Lockheed Martin, The Cyber Kill Chain consists of 7 links: reconnaissance, weaponization, delivery, exploitation, setup, developing command and control, and actions on goals.

Today’s more innovative suppliers target one or more of these links, with the goal of avoiding, finding or alleviating the attack. 5 suppliers at RSA emerged in this classification.

Ziften offers an agent-based  technique to tracking the habits of users, devices, applications, and
network aspects, both in real-time as well as throughout historical data.

In real time, experts utilize Ziften for threat identification and avoidance, while they utilize the historic data to discover steps in the kill chain for mitigation and forensic purposes.

~leaverchuck1


No Responses Yet to “Chuck Leaver – Recap Of RSA 2017 Customized Security Solutions Required”

Leave a Reply