Written By Chuck Leaver Ziften CEO
Whether you call them extensions, or call them personalizations – no matter what you call it, the best technology platforms can be customized to fit a company’s specific service needs. Generic operations tools are great at performing generic operations tasks. Generic security tools are fine at addressing generic security challenges. Generic can only take you up to a point, though, which’s where extensibility takes over.
Extensibility shows up frequently when I’m speaking with customers and prospective clients, and I’m proud that a Global 10 business selected Ziften over everybody else in the marketplace mainly on that basis. For that customer, and numerous others, the capability to deeply tailor platforms is a requirement.
This isn’t about merely developing custom-made reports or custom-made notifications. Let’s be sincere – the ability to produce reports are baseline capability of numerous IT operations and security management tools. True extensibility goes deep into the solution to provide it capabilities that fix genuine issues for the organization.
One client used great deals of mobile IoT devices, and had to have our Zenith real-time visibility and control system have the ability to access (and monitor) the memory of those devices. That’s not a standard function offered by Zenith, since our low footprint agent does not hook into the os kernel or operate through basic device drivers. Nevertheless, we dealt with the customer to personalize Zenith with that ability – and it turned out to be much easier than anybody imagined.
Another customer took a look at the basic set of end point data that the agent gathers, and wished to add extra data fields. They likewise wanted to configure the administrative console with custom actions using those data fields, and press those actions back out to those end points. No other endpoint monitoring and security service was able to offer the function for adding that functionality aside from Ziften.
In addition, the customer developed those extensions themselves … and owns the code and intellectual property. It belongs to their own secret sauce, their own company differentiator, and unique to their business. They could not be happier. And neither are we.
With many other IT operations and security systems, if clients desire additional functions or abilities, the only choice is to submit that as a future function demand, and hope that it appears in an approaching release of the product. Until then, regrettable.
That’s not how we created our flagship products, Zenith and ZFlow. Due to the fact that our end point agent isn’t really based upon device drivers or kernel hooks, we can enable remarkable extensibility, and open up that extensibility for clients to gain access to directly.
Similarly, with our administrative consoles and back-end tracking systems; everything is adjustable. This was built in right from the beginning.
Another area of modification is that our real-time and historic visibility database can incorporate into your other IT operations and security platforms, including SIEM tools, threat intelligence, IT ticketing system, job orchestration systems, and data analytics. With Zenith and ZFlow, there are no silos. Ever.
In the world of endpoint monitoring and management, extensions are progressively where it’s at. IT operations and enterprise security groups need the ability to tailor their tools platforms to fit their precise requirements for tracking and managing IoT, standard endpoints, the data center, and the cloud. In numerous client conversations, our integrated extensibility has triggered eyes to light up, and won us trials and implementations. Inform us about your custom requirements, and let’s see exactly what we can do.