Prevent A Ransomware Attack By Doing These 4 Things – Charles Leaver

Written By Alan Zeichick And Presented By Charles Leaver


Ransomware is genuine, and is threatening individuals, organisations, schools, medical facilities, local governments – and there’s no indication that ransomware is stopping. In fact, it’s probably increasing. Why? Let’s face it: Ransomware is probably the single most reliable attack that hackers have actually ever developed. Anybody can produce ransomware using readily available tools; any cash received is most likely in untraceable Bitcoin; and if something fails with decrypting somebody’s disk drive, the hacker isn’t really affected.

A business is impacted by ransomware every forty seconds, according to some sources, and sixty percent of malware issues were ransomware. It strikes all sectors. No industry is safe. And with the increase of RaaS (Ransomware-as-a-Service) it’s going to become worse.

The good news: We can fight back. Here’s a four-step battle strategy.

Good Basic Hygiene

It starts with training workers how to manage destructive emails. There are falsified messages from service partners. There’s phishing and target spearphishing. Some will survive email spam/malware filters; staff members need to be taught not to click on links in those messages, or of course, not to permit for plugins or apps to be set up.

Nevertheless, some malware, like ransomware, will get through, frequently exploiting obsolete software or unpatched systems, just like in the Equifax breach. That’s where the next action comes in:

Ensuring that all endpoints are thoroughly patched and totally updated with the current, most safe operating systems, applications, utilities, device drivers, and code libraries. In this way, if there is an attack, the endpoint is healthy, and is able to best eradicate the infection.

Ransomware isn’t really an innovation or security problem. It’s an organization issue. And it’s a lot more than the ransom that is demanded. That’s nothing compared with loss of efficiency due to downtime, bad public relations, disgruntled customers if service is interrupted, and the expense of rebuilding lost data. (Which presumes that valuable intellectual property or protected monetary or client health data isn’t stolen.).

Exactly what else can you do? Backup, backup, backup, and secure those backups. If you don’t have safe, guaranteed backups, you cannot bring back data and core infrastructure in a prompt style. That consists of making everyday snapshots of virtual machines, databases, applications, source code, and configuration files.

Companies need tools to detect, recognize, and avoid malware like ransomware from spreading. This needs constant monitoring and reporting of what’s occurring in the environment – consisting of “zero day” attacks that have not been seen prior to this. Part of that is monitoring end points, from the mobile phone to the PC to the server to the cloud, to ensure that all end points are up-to-date and safe and secure, and that no unanticipated modifications have been made to their underlying setup. That way, if a machine is infected by ransomware or other malware, the breach can be detected rapidly, and the machine isolated and closed down pending forensics and recovery. If an end point is breached, quick containment is vital.

The Four Strategies.

Good user training. Updating systems with patches and repairs. Supporting everything as frequently as possible. And utilizing tracking tools to assist both IT and security teams discover issues, and react rapidly to those issues. When it pertains to ransomware, those are the four battle-tested strategies we have to keep our companies safe.

You can learn more about this in a short 8 minute video, where I talk with several industry experts about this concern:

Fight Zero Day Exploits And Other Attacks With Ziften And Microsoft – Charles Leaver

Written By David Shefter And Presented By Charles Leaver


Recently we announced a partnership with Microsoft that brings together Ziften’s Zenith ® systems and security operations platform, and Windows Defender Advanced Threat Protection (ATP) providing a cloud-based, “single pane of glass” to identify, view, examine, and respond to advanced cyber-attacks and breaches on Windows, macOS, and Linux-based devices (desktops, laptops, servers, cloud, etc).

Windows Defender ATP plus Ziften Zenith is a security service that makes it possible for business customers to spot, investigate, respond and fix innovative hazards on their networks, off-network, and in the data center and cloud.

Think of a single solution throughout all the devices in your business, supplying scalable, state of the art security in a cost-efficient and easy to use platform. Making it possible for enterprises throughout the world to secure and manage devices through this ‘single pane of glass’ delivers the guarantee of lower operational expenses with true improved security delivering real time worldwide danger defense with info collected from billions of devices worldwide.

Microsoft and Ziften Architecture

The image below supplies a summary of the service components and integration between Windows Defender ATP and Ziften Zenith.

Endpoint examination abilities let you drill down into security signals and understand the scope and nature of a possible breach. You can submit files for deep analysis, receive the results and take action without leaving the Windows Defender ATP console.

Discover and Contain Dangers

With the Windows Defender ATP and Ziften Zenith integration, organizations can readily identify and contain hazards on Windows, macOS, and Linux systems from an individual console. Windows Defender ATP and Ziften Zenith offer:

Based on behavior, cloud-powered, advanced attack detection. Discover the attacks that make it past all other defenses (after a breach has been detected).

Rich timeline for forensic examination and mitigation. Easily examine the scope of any breach or presumed habits on any machine through an abundant, 6-month device timeline.

Built in special hazard intelligence knowledge base. Risk intelligence to rapidly identify attacks based upon monitoring and data from millions of devices.

The diagram below shows much of the macOS and Linux hazard detection and response abilities now readily available with Windows Defender ATP.

Bottom line, if you’re looking to protect your end points and infrastructure, you need to take a hard look at Windows Defender ATP and Ziften Zenith.

Stop The KRACK Vulnerability By Following These Steps – Charles Leaver

Written By Dr Al Hartmann And Presented By Charles Leaver


Enough media attention has been created over the Wi-Fi WPA2 defeating Key Reinsertion Attack (KRACK), that we don’t need to re-cover that again. The original discoverer’s website is an excellent location to evaluate the concerns and connect to the detailed research paper. This might be the greatest attention paid to a fundamental communications security failing since the Heartbleed attack. During that earlier attack, a patched variation of the susceptible OpenSSL code was released on the same day as the general disclosure. In this brand-new KRACK attack, comparable accountable disclosure guidelines were followed, and patches were either currently launched or soon to follow. Both wireless endpoints and wireless network devices need to be properly patched. Oh, and good luck getting that Chinese knockoff wireless security webcam bought off eBay patched anytime soon.

Here we will simply make a few points:

Take stock of your wireless devices and follow up to make sure appropriate patching. (Ziften can carry out passive network inventory, including wireless networks. For Ziften-monitored end points, the offered network interfaces along with applied patches are reported.) For business IT staff, it is patch, patch, patch each day anyway, so nothing new here. However any unmanaged wireless devices must be located and verified.

iOS and Windows end points are less vulnerable, while unpatched Android and Linux end points are extremely vulnerable. A lot of Linux end points will be servers without wireless networking, so not as much direct exposure there. But Android is another story, specifically given the balkanized state of Android upgrading throughout device producers. More than likely your enterprise’s greatest direct exposure will be IoT and Android devices, so do your threat analysis.

Avoid wireless access through unencrypted protocols such as HTTP. Stick to HTTPS or other encrypted protocols or use a safe and secure VPN, however know some default HTTPS sites enable jeopardized devices to coerce downgrade to HTTP. (Note that Ziften network monitoring reports ports and IP addresses used, so take a look at any wireless port 80 traffic on endpoints that are unpatched.).

Continue whatever wireless network hygiene practices you have been using to recognize and silence rogue access points, unapproved wireless devices, and so on. Grooming access point positioning and transmission zones to minimize signal spillage outside your physical limits is also a sensible practice, given that KRACK aggressors should exist locally within the wireless network. Don’t give them advantaged placement chances in or near your environment.

For a more wider discussion around the KRACK vulnerability, take a look at our current video on the subject:

Make Your Security Awareness Training Relevant – Charles Leaver

Written By Charles Leaver Ziften CEO


Reliable business cybersecurity assumes that people – your staff members – do the right thing. That they do not hand over their passwords to a caller who declares to be from the IT department doing a “qualifications audit.” That they don’t wire $10 million to an Indonesian bank account after receiving a midnight request from “the CEO”.

That they don’t install an “immediate upgrade” to Flash Player based upon a pop-up on a porn website. That they do not overshare on social media. That they don’t keep business information on file sharing services outside the firewall. That they do not connect to unsecure WiFi networks. And they don’t click links in phishing e-mails.

Our research shows that over 75% of security occurrences are triggered or helped by staff member mistakes.

Sure, you have actually set up endpoint security, e-mail filters, and anti-malware options. Those safety measures will most likely be for nothing, though, if your employees do the incorrect thing time and again when in a dangerous scenario. Our cybersecurity efforts resemble having an elegant car alarm: If you do not teach your teen to lock the automobile when it’s at the shopping mall, the alarm is worthless.

Security awareness isn’t really enough, naturally. Staff members will make mistakes, and there are some attacks that do not require a worker error. That’s why you need endpoint security, email filters, anti-malware, and so on. But let’s discuss reliable security awareness training.

Why Training Often Fails to Have an Effect

Initially – in my experience, a lot of employee training, well, is poor. That’s specifically true of online training, which is normally dreadful. However for the most parts, whether live or canned, the training does not have trustworthiness, in part since numerous IT experts are poor and unconvincing communicators. The training frequently focuses on interacting and enforcing guidelines – not changing risky habits and habits. And it’s like getting mandatory copy machine training: There’s nothing in it for the employees, so they don’t buy into it.

It’s not about implementing guidelines. While security awareness training might be “owned” by different departments, such as IT, CISO, or HR, there’s typically a lack of understanding about what a safe and secure awareness program is. To start with, it’s not a checkbox; it needs to be ongoing. The training must be given in various methods and times, with a mix of live training, newsletters, small-group conversations, lunch-and-learns, and yes, even resources online.

Safeguarding yourself is not complicated!

But a huge problem is the absence of objectives. If you do not know exactly what you’re aiming to do, you cannot see if you have actually done an excellent task in the training – and if risky behaviors actually alter.

Here are some sample objectives that can lead to reliable security awareness training:

Offer workers with the tools to recognize and manage ongoing everyday security dangers they might get online and through email.

Let staff members understand they belong to the group, and they cannot just rely on the IT/CISO teams to manage security.

Stop the cycle of “unintended lack of knowledge” about safe computing practices.

Change frame of minds toward more protected practices: “If you observe something, state something”.

Review of business rules and treatments, which are explained in actionable ways that are relevant to them.

Make it Appropriate

No matter who “owns” the program, it’s essential that there is visible executive support and management buy-in. If the execs don’t care, the workers won’t either. Effective training won’t speak about tech buzzwords; rather, it will concentrate on changing behaviors. Relate cybersecurity awareness to your workers’ personal life. (And while you’re at it, teach them the best ways to keep themselves, their household, and their house safe. Odds are they do not know and hesitate to ask).

To make security awareness training really pertinent, obtain staff member concepts and encourage feedback. Step success – such as, did the variety of external links clicked by employees decrease? How about calls to tech support stemming from security offenses? Make the training prompt and real-world by consisting of current scams in the news; unfortunately, there are numerous to choose from.

Simply put: Security awareness training isn’t enjoyable, and it’s not a silver bullet. Nevertheless, it is essential for ensuring that dangerous employee behaviors do not undermine your IT/CISO efforts to secure your network, devices, applications, and data. Make sure that you continually train your staff members, and that the training works.

So Much Passion At Splunk .conf About Ziften And Splunk – Charles Leaver

Written By Josh Applebaum And Presented By Charles Leaver

Like so many of you, we’re still recovering from Splunk.conf recently. As usual,. conf had fantastic energy and the individuals who remained in participation were enthusiastic about Splunk and the many use cases that it provides through the large app ecosystem.

One essential statement throughout the week worth mentioning was a new security offering called “Content Updates,” which essentially is pre-built Splunk searches for helping to spot security events.

Essentially, it takes a look at the most recent attacks, and the Splunk security group produces new searches for how they would look through Splunk ES data to find these kinds of attacks, and then ships those brand-new searches to consumer’s Splunk ES environments for automatic notifications when seen.

The very best part? Because these updates are using mostly CIM (Common Information Model) data, and Ziften occupies a lot of the CIM models, Ziften’s data is already being matched versus the new Content Updates Splunk has actually developed.

A fast demo revealed which suppliers are adding to each type of “detection” and Ziften was discussed in a great deal of them.

For instance, we have a current article that shares how Ziften’s data in Splunk is utilized to spot and react to WannaCry.

Overall, with the approximately 500 individuals who came by the cubicle over the course of.conf I have to say it was among the best occasions we have actually done in terms of quality discussions and interest. We had nothing but positive reviews from our in-depth discussions with all walks of business life – from extremely technical experts in the public sector to CISOs in the financial sector.

The most common conversation usually began with, “We are just beginning to implement Splunk and are new to the platform.” I like those, because individuals can get our Apps totally free and we can get them an agent to try out and it gets them something to utilize right out of the box to demonstrate value right away. Other folks were extremely experienced and actually liked our technique and architecture.

Bottom line: Individuals are genuinely excited about Splunk and real solutions are available to help individuals with real problems!

Curious? The Ziften ZFlow App and Technology Add-on helps users of Splunk and Splunk ES use Ziften-generated prolonged NetFlow from endpoints, servers, and cloud VMs to see exactly what they are missing at the edge of their network, their data centers, and in their cloud implementations.

Charles Leaver – Why Ziften Services Will Make The Difference For You

Written By Josh Harriman And Presented By Charles Leaver

Having the correct tools to hand is a given in our industry. But having the right tools and services is one thing. Getting the best worth out of them can be a challenge. Even with all the best objectives and effectively qualified workers, there can be gaps. Ziften Services can assist to fill those spaces and keep you on track for success.

Ziften Services can enhance, and even straight-out lead your IT Operations and Security groups to better equip your organization with 3 great offerings. Each one is tailored for a specific requirement and in light of the statistics from a current report by ESG (Enterprise Strategy Group) entitled “Trends in Endpoint Security Study”, which mentioned 51% of responders in the study stated they will be deploying and utilizing an EDR (endpoint detection and response) solution now and 35% of them plan to use managed services for the application, proves the requirement is out there for appropriate services around these products and services. Therefore, Ziften is providing our services understanding that many organizations lack the scale or proficiency to implement and completely use required tools such as EDR.

Ziften services are as follows:

Ziften Assess Service
Ziften Hunt Service
Ziften Respond Service

While each of the 3 services cover a distinct function, the latter two are more complementary to each other. Let’s look at each in a little bit more detail to better understand the advantages.

Assess Service

This service covers both IT functional and security teams. To determine your success in correct documents and adherence of processes and policies, you have to begin with an excellent strong baseline. The Assess services start by conducting in-depth interviews with key decision makers to truly comprehend what is in place. From there, a Ziften Zenith deployment provides tracking and data collection of essential metrics within customer device networks, data centers and cloud releases. The reporting covers asset management and efficiency, licensing, vulnerabilities, compliance as well as anomalous behaviors. The outcome can cover a series of concerns such as M&An evaluations, pre cloud migration planning and routine compliance checks.

Hunt Service

This service is a true 24 × 7 managed endpoint detection and response (MDR) offering. Organizations battle to completely cover this key aspect to security operations. That could be because of limited staff or critical proficiency in danger hunting strategies. Again, making use of the Ziften Zenith platform, this service utilizes continuous tracking throughout customer devices, servers, cloud VMs supporting Windows, Mac OSX and Linux os. Among the primary outcomes of this service is drastically cutting down on hazard dwell times within the environment. This has been talked about frequently in the past few years and the numbers are incredible, generally in the order of 100s of days that threats stay hidden within organizations. You require someone that can actively look for these adversaries as well as can historically look back to past occasions to find behaviors you were not knowledgeable about. This service does use some hours of dedicated Incident Response also, so you have all your bases covered.

Respond Service

When you up against it and have a true emergency situation, this service is exactly what you need. This is a proven and real IR group ready for battle 24 × 7 with a broad variety of response tool sets at hand. You will receive immediate event assessment and triage. Advised actions line up with the intensity of the risk and exactly what response actions have to occur. The teams are really versatile and will work remotely or if needed, can be on site where conditions necessitate. This could be your whole IR team, or will augment and mix right in with your existing group.

At the end of the day, you need services to assist optimize your opportunities of success in today’s world. Ziften has three great offerings and wants all our customers to feel secured and aligned with the very best operational and security posture available. Please reach out to us so we can assist you. It’s what we love to do!

Implement Vulnerability Lifecycle Management Now Or Face The Consequences – Charles Leaver

Written By Dr Al Hartmann And Presented By Charles Leaver


The following heading hit the news recently on September 7, 2017:

Equifax Inc. today announced a cyber security incident potentially impacting around 143 million U.S. customers. Wrongdoers exploited a U.S. site application vulnerability to gain access to certain files. Based upon the business’s examination, the unauthorized access happened from the middle of May through July 2017.

Lessons from Past Debacles

If you like your job, appreciate your role, and desire to retain it, then don’t leave the door open to enemies. A major data breach frequently begins with an un-patched vulnerability that is readily exploitable. And after that the inescapable happens, the cyber criminals are inside your defenses, the crown jewels have left the building, the press releases fly, costly consultants and outside legal counsel rack up billable hours, regulators come down, claims are flung, and you have “some severe ‘splainin’ to do”!

We are unsure if the head splainer in the current Equifax debacle will endure, as he is still in ‘splainin’ mode, asserting the breach started with the exploitation of an application vulnerability.

In such cases the typical rhumba line of resignations is – CISO initially, followed by CIO, followed by CEO, followed by the board of directors shakeup (particularly the audit and business responsibility committees). Do not let this occur to your career!

Steps to Take Immediately

There are some common sense steps to take to prevent the inescapable breach catastrophe arising from unpatched vulnerabilities:

Take inventory – Inventory all data and system assets and map your network topology and attached devices and open ports. Know your network, it’s segmentation, what devices are connected, what those devices are running, what vulnerabilities those systems and apps expose, what data assets they access, the level of sensitivity of those assets, what defenses are layered around those assets, and exactly what checks remain in place along all potential access points.

Simplify and toughen up – Implement best practices suggestions for identity and access management, network division, firewall and IDS setups, operating system and application setups, database access controls, and data encryption and tokenization, while simplifying and trimming the number and complexity of subsystems across your business. Anything too intricate to handle is too intricate to protect. Choose setup hardening heaven over breach response hell.

Constantly monitor and scrutinize – Routine audits are necessary but not enough. Constantly monitor, track, and assess all appropriate security events and exposed vulnerabilities – have visibility, occasion capture, analysis, and archiving of every system and session login, every application launch, every active binary and vulnerability exposure, every script execution, every command provided, every networking contact, every database transaction, and every delicate data access. Any gaps in your security event visibility produce an opponent free-fire zone. Establish crucial efficiency metrics, track them ruthlessly, and drive for unrelenting enhancement.

Do not accept functional reasons for insufficient security – There are always safe and effective operational policies, however they may not be pain-free. Not suffering a disastrous data breach is long down the organizational discomfort scale from the alternative. Operational expedience or operating legacy or misaligned top priorities are not valid excuses for extenuation of bad cyber practices in an intensifying danger environment. Lay down the law.

Take Action Now After The Security Incident At Equifax – Charles Leaver

Written By Michael Levin And Presented By Charles Leaver


Equifax, among the 3 major U.S. based credit reporting services simply revealed a major data breach where cyber criminals have actually taken sensitive info from 143 million American consumers.

Ways that the Equifax security breach WILL impact you:

– Personal – Your personal and family’s identity info is now known to hackers and will be targeted!

– Business – Your companies could be affected and targeted.

– Nationally – Terrorist, Nation States and organized crime groups could be included or utilize this data to commit cybercrime to acquire funds.

Protecting yourself is not complicated!

Five suggestions to secure yourself right away:

– Sign up for a credit tracking service and/or lock your credit. The quickest method to be notified that your credit is jeopardized is through a credit monitoring service. Equifax has already begun the process of establishing free credit monitoring for those involved. Other credit tracking services are offered and must be thought about.

– Track all your monetary accounts including credit cards and all bank accounts. Guarantee that notifications are turned on. Ensure you are receiving instant text and e-mail alerts for any modifications in your account or enhanced balances or transactions.

– Safeguard your bank and monetary accounts, guarantee that two level authentication is turned on for all accounts. Learn more about two level authentication and turn it on for all financial accounts.

– Phishing e-mail messages can be your biggest day-to-day risk! Take your time when dealing with email messages. Stop automatically clicking on every email link and attachment you recieve. Instead of clicking links and attachments in email messages, go separately to the sites beyond the e-mail message. When you get an email, you were not expecting from a name you recognize think about calling the sender independently before you click links or attachments.

– Strong passwords – consider altering all your passwords. Establish strong passwords and secure them. Use various passwords for your accounts.

Other Security Thoughts:

– Backup all computer systems and upgrade operating systems and software applications routinely.

– Social media security – Sharing too much details on social media increases the risk that you will be preyed on. For example, informing the world, you are on a getaway with images opens the risk your home will be robbed.

– Protect your devices – Don’t leave your laptop, phone or tablet unattended even for a moment. Don’t leave anything in your automobile you do not desire taken since it’s just a matter of time.

– Internet of things and device management – Understand how all your devices link to the Internet and exactly what information you are sharing. Check security settings for all devices including smart watches and physical fitness bands.

The value of security awareness training:

– This is another crime, where security awareness training can help to minimize danger. Understanding brand-new crimes and scams in the news is a fundamental part of security awareness training. Making sure that workers, friends and family are aware of this rip-off will considerably decrease the probability that you will be preyed on.

– Sharing new frauds and crimes you find out about in the news with others, is necessary to guarantee that the people you care about do not come down with these kinds of criminal activities.

Generic Is Limited Extensible Is Limitless – Charles Leaver

Written By Charles Leaver Ziften CEO


Whether you call them extensions, or call them modifications – no matter what they are called, the very best technology platforms can be customized to fit a company’s specific business needs. Generic operations tools are fine at carrying out generic operations jobs. Generic security tools are fine at attending to generic security challenges. Generic can just take you so far, though, and that’s where extensibility steps in.

Extensibility shows up typically when I’m talking to customers and potential customers, and I’m proud that a Global 10 business chose Ziften over everybody else in the market mostly on that basis. For that client, and lots of others, the capability to deeply tailor platforms is a requirement.

This isn’t about simply developing custom reports or custom alerts. Let’s be sincere – the capability to create reports are baseline capability of numerous IT operations and security management tools. True extensibility goes deep into the solution to provide it abilities that solve real issues for the company.

One client used lots of mobile IoT devices, and had to have our Zenith real time visibility and control system be able to gain access to (and monitor) the memory of those devices. That’s not a basic feature provided by Zenith, because our low footprint agent doesn’t hook into the os kernel or work through standard device drivers. However, we dealt with the client to customize Zenith with that ability – and it turned out to be simpler than anyone imagined.

Another customer took a look at the standard set of end point data that the agent collects, and wished to include extra data fields. They also wished to setup the administrative console with custom-made actions using those data fields, and press those actions back out to those endpoints. No other endpoint tracking and security option could supply the function for adding that functionality other than Ziften.

What’s more, the client developed those extensions themselves … and owns the code and intellectual property. It becomes part of their own secret sauce, their own organization differentiator, and distinct to their organization. They could not be happier. And neither could we.

With lots of other IT operations and security systems, if clients desire extra features or capabilities, the only choice is to submit that as a future feature demand, and hope that it appears in an approaching version of the product. Till then, regrettable.

That’s not how we designed our flagship solutions, Zenith and ZFlow. Due to the fact that our end point agent isn’t really based upon kernel hooks or device drivers, we can enable significant extensibility, and open up that extensibility for customers to access directly.

Similarly, with our administrative consoles and back-end monitoring systems; everything is customizable. And that was built in right from the beginning.

Another area of customization is that our real-time and historic visibility database can integrate into your other IT operations and security platforms, including SIEM tools, risk intelligence, IT ticketing system, job orchestration systems, and data analytics. With Zenith and ZFlow, there are no more silos. Ever.

In the world of endpoint tracking and management, extensions are significantly where it’s at. IT operations and business security teams need the capability to customize their tools platforms to fit their specific requirements for monitoring and handling IoT, standard endpoints, the data center, and the cloud. In numerous customer conversations, our integrated extensibility has actually caused eyes to illuminate, and won us trials and implementations. Tell us about your customized requirements, and let’s see exactly what we can do.

You Can See Our Endpoint Security Architecture In This Video – Charles Leaver

Written By Mike Hamilton And Presented By Ziften CEO Charles Leaver


End Point security is all the rage these days. And there are lots of various suppliers out there touting their services in this market. But it’s in some cases challenging to comprehend exactly what each vendor offers. What’s much more tough is to comprehend how each supplier solution is architected to supply their services.

I believe that the back-end architecture of whatever you choose can have an extensive impact on the future scalability of your execution. And it can create lots of unpredicted work and costs if you’re not cautious.

So, in the spirit of openness, and since we believe our architecture is not the same, unique and powerful, we invite all endpoint security suppliers to “reveal to us your architecture”.

I’ll get the ball rolling in the following video where I show you the Ziften architecture, and a number of exactly what I think about legacy architectures for comparison. Particularly, I’ll discuss:

– Ziften’s architecture developed using next-gen cloud concepts.
– One business peer-to-peer “mish-mash” architecture.
– Tradition hub-spoke-hub architectures.

I have actually revealed you the power of our really cloud-based platform. Now it’s my rival’s turn. What are you waiting for folks – show us your architectures!