Top Security Opportunity Only For Microsoft Channel Partners – Charles Leaver

Written By Greg McCreight And Presented By Charles Leaver


Windows Defender Advanced Threat Protection (WDATP) is very good, popular with Microsoft channel partners around the globe. It is probable that you’re currently working with Microsoft clients to set up and look after WDATP on their Windows endpoints.

I’m delighted to inform you about a new chance: Get a quick start with an industry-leading solution that integrates right into WDATP: Ziften Zenith. For a restricted time, Microsoft channel partners can utilize our brand-new “Fast Start” program to onboard with Ziften.

With “Fast Start,” you take pleasure in all the advantages of Ziften’s top tier partner status for a complete year, and we’ll assist you to get up to speed rapidly with joint market and business advancement resources – and with a waiver of the usual sales volume dedication associated with Gold Status.

If you don’t know Ziften, we provide infrastructure visibility and collaborated danger detection, prevention, and response throughout all endpoint devices and cloud environments. Zenith, our flagship security platform, easily deploys to client devices, virtual machines and servers.

When installed, Zenith constantly collects all the info essential to accurately assess the present and historic state of all managed devices consisting of system, user habits, network connectivity, application, binary, and process data. Zenith provides your customers’ IT and security teams with constant visibility and control of all handled assets including continuous monitoring, notifying, and automated or manual actions.

Zenith is cross-platform – it operates with and protects Windows, Mac, Linux, and other end points.

What’s especially noteworthy – and here’s the opportunity – is that Ziften has actually teamed up with Microsoft to incorporate Zenith with Windows Defender ATP. That indicates your customers can utilize WDATP on Windows systems and Zenith on their macOS and Linux systems to discover, view, and respond to cyberattacks all using just the WDATP Management Console for all the systems. Zenith is hidden in the background.

A single pane of glass, to handle Windows, Mac, Linux end points, which can include desktops, laptops, and servers. That makes Zenith the best option to provide to your existing WDATP customers… and to make your bids for new WDATP business more comprehensive for multi platform business potential customers.

Furthermore, offering Zenith can assist you speed customer migrations to Windows 10, and sell more Enterprise E5 commercial editions.

” Fast Start” with Gold Status for a Year

Ziften is totally concentrated on the channel: 96% of our sales in 2017 were through the channel. We are very excited to bring the “Fast Start” program to current Microsoft channel partners, throughout the world.

With “Fast Start,” you can sign up for the Ziften Channel Program with these advantages:

Expedited Acceptance and On-Boarding – Ziften channel managers and field sales work straight with you to get up and running providing the Zenith endpoint security service integrated with Windows Defender ATP.

Superior Security Worth – You’ll be distinctively positioned to provide clients and potential customers higher security worth across more of their overall environment than ever, increasing the variety of supported and secured Windows, Mac, and Linux systems.

Hands-On Partnership – Ziften dedicates field sales, sales engineers, and marketing to support your day-to-day pre-sales engagements, drive new sales opportunities, and assist to close more deals with Microsoft and Ziften endpoint security.

Here’s exactly what one significant Microsoft channel partner, states about this – this is Ronnie Altit, founder and CEO of Insentra, a “partner-obsessed” Australian IT services business that works specifically through the IT channel:

” As a large Microsoft reseller, teaming with Ziften to offer their Zenith security platform incorporated with Microsoft Windows Defender ATP was a no-brainer. We’re thrilled at the smooth integration between Zenith and Windows Defender ATP providing our customers holistic protection and visibility throughout their Windows and non-Windows systems. Ziften has actually been a pleasure to work with, and supportive at every step of the procedure. We anticipate to be incredibly successful offering this powerful security solution to our customers.”

Girl Scouts And Cybersecurity What It Means For Women – Charles Leaver

Written By Kim Foster And Presented By Charles Leaver


It’s obvious that cybersecurity is getting more international attention than ever before, and businesses are truly concerned if they are training sufficient security professionals to satisfy growing security risks. While this concern is felt across the commercial world, numerous people did not anticipate Girl Scouts to hear the call.

Beginning this fall, countless Girl Scouts across the country have the opportunity to receive cybersecurity badges. Girl Scouts of the United States partnered with Security Business (and Ziften tech partner) Palo Alto Networks to develop a curriculum that informs girls about the fundamentals of computer security. In accordance with Sylvia Acevedo, CEO of GSUSA, they developed the program based upon demand from the ladies themselves to protect themselves, their computers, and their family networks.

The timing is good, given that in accordance with a study released in 2017 by (ISC), 1.8 million cybersecurity positions will be unfilled by 2022. Factor in increased need for security pros with stagnant growth for women – only 11 percent for the past several years – our cybersecurity staffing problems are poised to get worse without significant effort on behalf of the market for better addition.

Obviously, we can’t depend on the Girl Scouts to do all of the heavy lifting. Wider instructional efforts are a given: according to the Computing Technology Industry Association, 69 percent of U.S. ladies who do not have a profession in information technology pointed out not knowing what chances were readily available to them as the factor they did not pursue one. One of the excellent untapped opportunities of our market is the recruitment of more diverse experts. Targeted curricula and increased awareness should be high concern. Raytheon’s Women Cyber Security Scholarship is a fine example.

To gain the benefits of having females invested in shaping the future of technology, it’s important to dispel the exclusionary understanding of “the boys’ club” and remember the groundbreaking contributions made by ladies of the past. Lots of people understand that the first computer programmer was a woman – Ada Lovelace. Then there is the work of other famous leaders such as Grace Hopper, Hedy Lamarr, or Ida Rhodes, all who may evoke some vague recollection among those in our industry. Female mathematicians created programs for one of the world’s very first completely electronic general-purpose computers: Kay McNulty, Jean Jennings Bartik, Betty Snyder, Marlyn Meltzer, Fran Bilas, and Ruth Lichterman were just a few of the very first programmers of the Electronic Numerical Integrator and Computer (better called ENIAC), though their crucial work was not extensively recognized for over half a century. In fact, when historians first found photos of the females in the mid-1980s, they mistook them for “Fridge Ladies” – models posing in front of the machines.

It’s worth keeping in mind that many believe the very same “boys’ club” mindset that neglected the accomplishments of ladies in history has actually resulted in restricted leadership positions and lower incomes for modern-day ladies in cybersecurity, in addition to outright exclusion of female luminaries from speaking chances at market conferences. As patterns go, omitting bright people with relevant understanding from influencing the cybersecurity market is an unsustainable one if we want to keep up with the cybercriminals.

Whether or not we jointly act to promote more inclusive work environments – like informing, recruiting, and promoting ladies in larger numbers – it is heartening to see a company associated with fundraising event cookies successfully notify an entire market to the fact that women are really interested in the field. As the Girls Scouts of today are given the tools to pursue a career in information security, we should anticipate that they will become the very females who eventually reprogram our expectations of exactly what a cybersecurity professional looks like.

Prevent A Security Risk To Your Enterprise By Checking Macs – Charles Leaver

Written By Roark Pollock And Presented By Charles Leaver


Got Macs? Great. I also own one. Have you locked your Macs down? If not, your business has a possibly serious security weakness.

It’s a fallacy to believe that Macintosh computer systems are naturally protected and don’t have to be safeguarded against hacking or malware. People think Macs are certainly arguably more safe and secure than Windows desktops and notebooks, due to the style of the Unix-oriented kernel. Certainly, we see fewer security patches issued for macOS from Apple, compared to security patches for Windows from Microsoft.

Less security problems is not zero defects. And safer doesn’t imply complete safety.

Examples of Mac Vulnerabilities

Take, for example, the macOS 10.13.3 update, issued on January 23, 2018, for the present versions of the Mac’s os. Like a lot of current computer systems running Intel processors, the Mac was vulnerable to the Meltdown flaw, which implied that harmful applications may be able to read kernel memory.

Apple had to patch this defect – as well as numerous others.

For example, another defect might permit destructive audio files to execute arbitrary code, which could violate the system’s security integrity. Apple needed to patch it.

A kernel defect indicated that a harmful application may be able to execute arbitrary code with kernel privileges, offering hackers access to anything on the device. Apple had to patch the kernel.

A defect in the WebKit library implied that processing maliciously crafted web material might cause random code execution. Apple had to patch WebKit.

Another defect implied that processing a harmful text message may lead to application denial of service, locking up the system. Whoops. Apple had to patch that flaw as well.

Don’t Make The Exact Same Mistakes as Consumers

Many customers, believing all the discussions about how terrific macOS is, decide to run without protection, relying on the macOS and its integrated application firewall software to obstruct all manner of bad code. Problem: There’s no built-in anti virus or anti malware, and the firewall software can just do so much. And many enterprises wish to ignore macOS when it concerns visibility for posture tracking and hardening, and risk detection/ danger hunting.

Customers often make these assumptions due to the fact that they have no idea any better. IT and Security specialists ought to never ever make the very same errors – we should know much better.

If a Mac user installs bad software applications, or includes a malicious browser extension, or opens a bad email attachment, or clicks on a phishing link or a nasty advertisement, their device is corrupted – just like a Windows computer. However within the enterprise, we need to be prepared to handle these concerns, even with Mac computers.

So What Do You Do?

What do you need to do?

– Install anti-virus and anti malware on corporate Mac computers – or any Mac that has access to your company’s material, servers, or networks.
– Track the state of Mac computers, much like you do with Windows computers.
– Be proactive in applying fixes and patches to Macs, once again, similar to with Windows.

You ought to also get rid of Mac computers from your corporate environment which are too old to run the current variation of macOS. That’s a great deal of them, since Apple is respectable at keeping hardware that is older. Here is Apple’s list of Mac designs that can run macOS 10.13:

– MacBook (Late 2009 or more recent).
– MacBook Pro (Mid 2010 or newer).
– MacBook Air (Late 2010 or more recent).
– Mac mini (Mid 2010 or more recent).
– iMac (Late 2009 or newer).
– Mac Pro (Mid 2010 or newer).

When the next variation of macOS comes out, a few of your older computers may drop off the list. They need to fall off your inventory as well.

Ziften’s Perspective.

At Ziften, with our Zenith security platform, we work hard to preserve visibility and security function parity in between Windows systems, macOS systems, and Linux-based systems.

In fact, we’ve partnered with Microsoft to integrate our Zenith security platform with Microsoft Windows Defender Advanced Threat Protection (ATP) for macOS and Linux monitoring and threat detection and response coverage. The integration allows consumers to identify, see, examine, and react to innovative cyber attacks on macOS computers (as well as Windows and Linux-based endpoints) straight within the Microsoft WDATP Management Console.

From our viewpoint, it has actually constantly been important to offer your security groups confidence that every desktop/ notebook endpoint is secured – and therefore, the enterprise is protected.

It can be hard to believe, 91% of businesses say they have a number of Macs. If those Macs aren’t protected, and also properly integrated into your endpoint security systems, the enterprise is not protected. It’s just that basic.