You Must Have Flexibility With Your SysSecOps Solution – Chuck Leaver

Written By Chuck Leaver


You will discover that endpoints are everywhere. The device you’re reading this on is an endpoint, whether it’s a desktop, laptop, tablet, or phone. The HVAC controller for your building is an endpoint, assuming it’s connected to a network, and the WiFi access points and the security electronic cameras too. So is the connected vehicle. So are the Web servers, storage servers, and Active Directory servers in the data center. So are your IaaS/PaaS services in the cloud, where you are in control of bare-metal servers, VMware virtual machines, or containers running on Windows and/or Linux.

All of them are end-points, and every one is very important to handle.

They have to be handled from the IT side (from IT administrators, who hopefully have proper IT-level visibility of each linked thing like those security cameras). That management implies ensuring they’re linked to the right network zones or VLANs, that their software and configurations the current version, that they’re not flooding the network with bad packets because of electrical faults etc.

Those endpoints likewise need to be handled from the security point of view by CISO groups. Every endpoint is a possible entryway into the business network, which suggests the devices should be locked down – default passwords never used, all security patches used, no unapproved software installed on the device’s ingrained web server. (Kreb’s outlines how, in 2014, hackers infiltrated Target’s network by means of its HVAC system.).

The Operations of Systems and Security.

Systems Security Operations, or SysSecOps, brings those two worlds together. With the best type of SysSecOps mindset, and tools that support the correct workflows, IT and security employees get the very same data and can collaborate together. Sure, they each have various jobs, and react in a different way to difficulty notifications, however they’re all managing the very same endpoints, whether in the pocket, on the desk, in the energy closet, in the data center, or in the cloud.

Ziften Zenith Test Report.

We were delighted when the recently released Broadband-Testing report applauded Zenith, Ziften’s flagship endpoint security and management platform, as being ideal for this kind of situation. To quote from the current report, “With its Zenith platform, Ziften has a solution that ticks all the SysSecOps boxes and more. Considering that its meaning of ‘endpoints’ extends into the Data Centre (DC) and the world of virtualisation, it holds true blanket coverage.”.

Broadband-Testing is an independent testing center and service based in Andorra. They explain themselves as, “Broadband-Testing communicates with suppliers, media, investment groups and VCs, experts and consultancies alike. Evaluating covers all elements of networking software and hardware, from ease of use and efficiency, through to progressively important components such as device power consumption measurement.”

Back to versatility. With endpoints everywhere (again, on the desk, in the utility closet, in the data center, or in the cloud), a SysSecOps-based endpoint security and management system need to go all over and do anything, at scale. Broadband-Testing wrote:

“The configuration/deployment alternatives and architecture of Ziften Zenith permit a very versatile implementation, on or off-premise, or hybrid. Agent release is simpleness itself with zero user requirements and no endpoint invasion. Agent footprint is also very little, unlike lots of endpoint security services. Scalability likewise seems outstanding – the biggest consumer deployment to date is in excess of 110,000 endpoints.”

We can’t help but be proud of our product Zenith, and what Broadband-Testing concluded:

“The emergence of SysSecOps – combining systems and security operations – is a rare milestone in IT; a hype-free, good sense technique to refocusing on how systems and security are handled inside a company.

Secret to Ziften’s endpoint approach in this classification is total visibility – after all, how can you secure exactly what you can’t see or don’t know exists in the first place? With its Zenith platform, Ziften has a product that ticks all the SysSecOps boxes and more.

Implementation is easy, specifically in a cloud-based circumstance as checked. Scalability likewise seems exceptional – the biggest customer deployment to date is in excess of 110,000 endpoints.

Data analysis options are substantial with a big quantity of information available from the Ziften console – a single view of the whole endpoint infrastructure. Any item can be analysed – e.g. Binaries, applications, systems – and, from a procedure, an action can be defined as an automatic function, such as quarantining a system in case of a possibly destructive binary being found. Numerous reports are predefined covering all areas of analysis. Alerts can be set for any occurrence. Additionally, Ziften provides the idea of extensions for custom data collection, beyond the reach of most suppliers.

And with its External API functionality, Ziften-gathered endpoint data can be shared with the majority of third party applications, thus including additional value to a consumer’s existing security and analytics infrastructure financial investment.

In general, Ziften has an extremely competitive offering in exactly what is a very worthwhile and emerging IT category in the form of SysSecOps that is really worthy of examination.”.

We hope you’ll consider an evaluation of Zenith, and will agree that when it pertains to SysSecOps and endpoint security and management, we do tick all the boxes with the true blanket protection that both your IT and CISO teams have been searching for.

Protect Yourself From Spectre And Meltdown With Ziften’s Help – Chuck Leaver

Written By Josh Harriman And Presented By Chuck Leaver   Ziften understands the current exploits impacting practically everybody who deals with a computer system or digital device. While this is a large statement, we at Ziften are working diligently helping our clients find susceptible assets, fixing those vulnerable systems, and monitoring systems after the repair […] Continue reading →