Chuck Leaver – Winning A Red Herring Award Means So Much To Us At Ziften

Written By Rachel Munsch And Presented By Chuck Leaver CEO Ziften

 

There is some exciting news to share: For 2015 Ziften has been selected as a Top 100 North America award winner. There were around 1200 businesses from the U.S. and Canada evaluated in the annual competition and our Endpoint Detection and Response service was able to lift us into the top 100.

It is well known that the Red Herring 100 Awards are extensively known to be one of the sector’s more prominent acknowledgments. Those that reach the finals need to go through a comprehensive selection process which is based on over 20 criteria that includes technological development, addressable market, business model, customer footprint and level of specialty. Alex Vieux, CEO and Red Herring Publisher, felt that the competition was truly strong this year and the process of choice was challenging:

“But after much thought, rigorous reflection and discussion, we narrowed our list down from large numbers of candidates from across The United States and Canada to the North America winners. We believe Ziften embodies the vision, drive and innovation that define a successful entrepreneurial venture. Ziften ought to take pride in its accomplishment, as the competition was really strong.”

Here at Ziften we are really proud to be selected as a Red Herring award winner. It’s always gratifying to have our work verified and be acknowledged, specifically when you think about the renowned list of finalists. Our dedication to helping organizations protect themselves from the sophisticated risks that exist today stays strong, and this award will serve as an inspiration moving forward as we continue to aim to be the leader in endpoint security and defense.

Get Your Gartner SOC Nuclear Triad By Putting Your Trust In Ziften – Chuck Leaver

Written By Dr Al Hartmann And Presented By Chuck Leaver Ziften CEO   Anton Chuvakin, VP and security analyst at Gartner Research posted about the 3 essential Security Operations Center (SOC) tools needed to supply efficient cyber attack visibility. Chuvakin compared them to the cold war’s “nuclear triad” principle of siloed, air-borne, and nuclear submarine […] Continue reading →