Great News About Microsoft’s Intelligent Security Association – Charles Leaver

Written By David Shefter And Presented By Charles Leaver


It’s a fantastic plan: Microsoft has actually developed a mechanism for third-party security companies, like Ziften, to cooperate to better secure our customers. Everybody wins with the new Microsoft Intelligent Security Association, revealed very recently – and we delighted to be an establishing member and included in the launch. Congratulations to Microsoft!

Sharing of Security Intelligence

One of the most amazing tasks coming out of Microsoft has actually been the new Microsoft Intelligent Security Graph, a risk intelligence engine developed with machine learning. The Intelligent Security Graph forms the foundation of the brand-new association – and the foundation of a great deal of brand-new chances for development.

As Microsoft states, “At the present time, with the tremendous computing advantages afforded by the cloud, the Machine learning and Artificial Intelligence is discovering new ways to utilize its rich analytics engines and by using a mix of automated and manual processes, machine learning and human professionals, we have the ability to produce an intelligent security graph that develops from itself and develops in real time, reducing our collective time to find and react to brand-new occurrences.”

The requirement for much better, more intelligent, security is huge, which is why we’re thrilled to be a founding member of the brand-new association.

Brad Anderson, Corporate Vice President at Microsoft, Enterprise Mobility + Security, recently composed, “Roughly 96% of all malware is polymorphic – which means that it is only experienced by a single user and device prior to being changed with yet another malware version. This is because in many cases malware is caught almost as quick as it’s developed, so malware developers continuously develop to try and remain ahead. Data like this reinforces how important it is to have security options in place that are as agile and ingenious as the attacks.”

Endpoint Detection and Response that is Advanced

And that brings us to the type of advanced endpoint detection and response (EDR) that Ziften provides to desktops, servers, and cloud assets – providing the organization distinct all-the-time visibility and control for any asset, anywhere. No one provides the functionality you’ll find in Ziften’s Zenith security platform.

That’s where the Microsoft Intelligent Security Association shines. At the end of the day, even the very best defenses may be breached, and security groups should respond faster and more aggressively to make sure the security of their data and systems.

Ziften and Microsoft are providing completely integrated hazard protection that covers customers’ endpoints – meaning customer devices, servers, and the cloud – with a structure of shared intelligence and the power of the cloud to transform monitoring of enterprise systems.

What Microsoft is Saying

“The Intelligent Security Association enhances cooperation from leading sources to protect clients,” said Microsoft. “Having actually currently accomplished strong customer momentum with our integrated Ziften and Microsoft Windows Defender ATP service, customers stand to additionally gain from continued collaboration.”

In addition, “Continued integration and intelligence sharing within the context of the Microsoft Intelligent Security Graph allows joint clients to more quickly and accurately identify, examine and respond to attacks throughout their whole endpoint and cloud base.”

What Ziften is Saying

Chuck Leaver, Ziften CEO, is informing everybody that our founding membership in the Microsoft Intelligent Security Association is a substantial win for our joint clients and prospects – and it brings together everybody in the Microsoft universe and beyond (note that Ziften’s Mac and Linux solutions are likewise part of the Microsoft collaboration). “As security vendors, all of us recognize the requirement to work together and collaborate to protect our customers and their staff members. Kudos to Microsoft for leading this market effort,” Chuck stated.

The result: Better security for our clients, and tighter integration and more development in the industry. It’s a genuine win for everybody. Apart from the hackers, of course. They will lose. No apologies guys.

A Better Channel Program For You – Charles Leaver

Written By Greg McCreight And Presented By Charles Leaver


If you are a reseller, integrator, distributor, managed service provider – the new Ziften Activate Partner Program is here, it’s ready, and it’s going to be excellent for your bottom line (and for lowering your clients’ anxiety about cyber security).

Ziften is 100 percent focused on the channel, and as we grow and progress in the market, we understand that your success is our success – and also our success is your success. And it is already happening: 96% of our sales last year came through the channel! This is the reason that we built the brand-new Activate Partner Program to provide you the resources you require to grow your organization with Ziften security solutions.

We came out of the blocks with a very effective, cross platform Endpoint Detection and Response (EDR) solution, Ziften Zenith. Clients really love it. Innovation Partners love it. Resellers really love it. The market loves it. And analysts love it.

I have to share this from the conclusion of our broadband testing report, which speaks about SysSecOps, or Systems Security Operations – an emerging category where Ziften is leading the market:

Critical to Ziften’s endpoint method in this classification is total visibility – after all, how can you secure if you can’t see or do not know what is there in the first place? With its Zenith platform, Ziften has a product that delivers on all the essential SysSecOps requirements and more …

Overall, Ziften has an extremely competitive offering in what is a very legitimate, emerging IT category through SysSecOps and one that needs to be on the assessment short list.

In addition to this: Microsoft just recently partnered with Ziften to develop an integration of Zenith and Microsoft Windows Defender ATP, to allow Microsoft customers to protect Linux and Mac systems with the very same single pane of glass as they utilize to secure Windows systems.

Enough about us. Let’s talk about you. You and the Activate Partner Program.

We have actually put together a multi tier partner program that has better discount rates, more resources, and strong market advancement assistance. We understand a one-size-fits-all program doesn’t work, not in the market today.

With Activate, we take a hands on stance to bringing on board new partners; making it easy for those for whom security is a relatively small element of your services; and rewarding top-tier partners who have actually devoted themselves to us.

Here’s exactly what you will receive with the Activate Partner Program – and we’ll work alongside with you to ensure that Activate fulfills your needs completely:

Security for more of your customer’s environment – end points, servers, and cloud

Visibility and security for your consumer’s complex, multi-cloud implementations

Easy security tool integrations to deliver really tailored, differentiated services

Hands-on, tailored support and life-cycle knowledge

Rich monetary incentives that motivate your long term investment and benefit on-going success

Market advancement support to drive incremental demand and list building

World-class, hands-on assistance from our field sales, sales engineers, technical support, and marketing experts

The Activate program combines our successful security services, monetary investments, and hands on support to assist you create more opportunity and close more deals.

Take These Steps For Successful Cloud Asset Migration – Charles Leaver

Written By Logan Gilbert And Presented By Charles Leaver


It bears reiterating – the Web has permanently altered the world for individuals and companies alike. In the case of the latter, every element of contemporary IT is going through digital change. IT departments everywhere are under pressure to make info extremely accessible and at lower expense – all while securing crucial data from corruption, loss, or cyber theft.

Central to this technique is the migration of data centers to the cloud. In fact, nineteen percent of company workloads are anticipated to be in the public cloud by the end of 2019, and fifty percent over the next ten years.

What is Cloud Asset Migration?

Cloud migration is the procedure of moving data, applications or other company elements from an organization’s on-premise infrastructure to the cloud or moving them from one cloud service to another.

The diagram shown below illustrates this migration of file-server(s), data, and application(s) from an on premise server infrastructure to a cloud environment.

Cloud companies enable companies to move some or all IT infrastructure to the cloud for scale, speed, service versatility, ease of management, and decreased expenses. The advantages are nothing except engaging.

Utilizing Cloud Computing is changing the business landscape. With the technological improvements, individuals are leaning more to a virtual workplace meaning that you can work from anywhere and anytime making use of cloud computing.

Cloud Asset Migration Considerations

But, just like any significant IT infrastructure modification, a transfer to the cloud requires thoughtful preparation and execution for the process to take place within the budget plan and on-time. Moving a server, database, application, or all the above to the cloud is not without danger. System interruptions, efficiency destruction, data loss and more are likely to occur as a result of misconfigurations, system failures, and security exploits.

Case in point: 43% of those who have actually gone through a cloud asset migration have actually experienced a failed or delayed application. Why is this? Due to the fact that each asset migration is a ‘snowflake’ with its own level of complexity.

Let’s look at 3 areas to think about for effective cloud asset migration.

1. Have a Strategy

First, there has to be a strategic migration strategy. That plan must help address concerns like the following:

Which IT assets should be moved in the first place?
If you are moving some, or all, of your infrastructure to the cloud, how will you develop and maintain asset control?
How will you identify what you have – prior to and after the relocation?
Do you even have to move all of it?
What is the first thing to move?

2. Clean Up What remains in Place Now

To address these strategic questions successfully, you’ll need conclusive visibility into each asset under roof now, as well as pertinent attributes of each asset. Whether your assets today are operating on physical or virtual server infrastructure, you need to understand:

What assets exist today? Discover all the linked assets and understand whether they are currently handled and unmanaged.
Identify low usage and/or unused systems. Should these systems be gotten rid of or repurposed prior to migration?
Recognize low use and/or unused applications. Are these applications needed at all? Should they be eliminated prior to migration?
Identify and tidy up areas of duplication, be it systems and/or applications.
Now identify those business-critical systems and applications that will now be moved as part of your strategy. With this detailed asset data in hand, you can hone your migration method by segmenting what must – and must not be migrated – or at least crisply focus on based on service value.

3. Plan for Cloud Visibility Post Migration

Now that you’re equipped with extensive, accurate existing and historic asset data, how will you preserve this level of visibility after your effective cloud asset migration?

While the expense benefits of moving to the cloud are often exceptionally compelling, unchecked asset/ virtual machine proliferation can rapidly deteriorate those cost benefits. So, prior to executing your cloud asset migration, make certain you have a cloud visibility service in place that:

Finds/ monitors all connected assets across your single or multi-cloud environment
Records, fingerprints, and categorizes discovered assets
Informs on brand-new or unexpected asset discovery and/or behavior within the cloud environment
Integrates with existing ticketing, workflow, and/or CMDB systems

Cloud Visibility and Security with Ziften

Continuous cloud visibility into each device, user, and application implies you can administer all elements of your infrastructure more effectively. You’ll avoid wasting resources by avoiding VM expansion, plus you’ll have a detailed body of data to comply with audit requirements for NIST 800-53, HIPAA, and other compliance policies.

Follow the above when you move to the cloud, and you’ll avoid weak security, incomplete compliance, or operational problems. Ziften’s technique to cloud visibility and security offers you the intelligence you require for cloud asset migration without the headaches.