Written by Dr Al Hartmann and presented by Ziften CEO Chuck Leaver
It would be fantastic if your IT client endpoints could inform you that they are sick instead of receiving undesirable calls from unhappy IT users wouldn’t it? But the reality is that IT clients can not tell you when there is something amiss. Many IT people may disagree with the requirement for situational awareness, but you really require this with your endpoints. The Ziften solution makes this OK by:
With Ziften there is a minimalist driverless agent. This differs from traditional systems management or security agents and the Ziften package is extremely lightweight (around 1-2MB MSI package). But do not let the small size fool you, it will supply performance management headroom and effectiveness to accomplish more on IT endpoints, which will keep the users delighted and working. The Ziften agent can be compared with light beer, “Excellent taste, less filling.”
Likewise the Ziften agent monitors and reports on other agents that are implemented if there is extreme interference with foreground tasks.
With the Ziften agent you will get other benefits that an agentless method can not compare with. It can:
Provide real time response to dynamic events on the endpoint. If an agent is not present then periodic polling is needed, which suggests that endpoint events are reported in a cadence after they have taken place and not in real time.
The Ziften agent can adaptively throttle interfering procedures. As an example, if a backup program is triggering extreme interference with user efficiency, the backup program can be slowed down in favor of user efficiency.
It will alert on the failures of critical services such as antivirus, backup, firewall software and systems management. It holds true that an agentless technique might likewise do this, but it would not alert in real time so it is not as efficient.
The Ziften Agent will alert on severe security events that are found at the client endpoint in real time.
It will recognize activity and user existence. With the Ziften agent, user existence can be identified by watching keyboard and last mouse use. It will likewise utilize the window proxy to figure out which window is foreground and which remain in the background. With this information, the Ziften agent can identify application licenses really being used throughout the organization.
If no agent exists then it is not possible to monitor and control when the endpoint is off the network. The Ziften agent can monitor off network endpoints and report cached observations when the endpoint reconnects. This eliminates off network blind spots in monitoring coverage. Likewise, the Ziften agent has the ability to enforce policy even while detached.
Reduction of network traffic load between client endpoints and the management server is possible with the Ziften agent. It accomplishes this by abstracting, filtering, and summing up and encoding time series observations.
So with the Ziften agent your endpoint clients can “inform you where it hurts”.