11:15 AM
Dark Reading
Dark Reading
Products and Releases

Ziften Launches Platform to Protect Enterprise Devices, Data Centers, Cloud

New security architecture enables endpoint discovery, protection, and forensics for enterprise networks.

AUSTIN, TX (PRWEB) FEBRUARY 14, 2017 – Ziften, a leading provider of endpoint discovery, protection and forensics, today announced the Zenith security platform and all new architecture for securing enterprise, government, and managed security service provider (MSSP) customers’ devices, data centers and cloud deployments. Zenith is purpose built with an adaptive architecture designed to exceed enterprise network scale requirements and eliminate the all too common silent security failures.

Ziften Zenith Supports Adaptive Security Model

As the endpoint security market matures, Gartner anticipates that “feature improvements will focus on increasing capabilities around the adaptive security architecture to provide more holistic and integrated security capabilities.” 1

Zenith is designed to support an adaptive security model for organizations that need more than the simple detection and response capabilities that fail to eliminate many of today’s silent security failures. Enterprises may take 21 weeks to detect a breach, and up to 75% have no historical data for security investigations, but Zenith delivers integrated, holistic security features that enable:

  • Discovery: Continuous endpoint discovery to eliminate unmanaged and rogue assets.
  • Prevention: Continuous device security state assessments for security state hardening and reducing non-compliant assets on the network.
  • Detection & Response: On-going detection and incident response to protect against known and unknown attacks.
  • Investigation: Data for up to 12-month look-back forensics to support breach investigations, root cause analysis, and corrective actions.

Ziften Zenith is Built on a New Backend Architecture

Designed with a data management and data mining capability to scale and perform up to one million endpoints and beyond for any single customer, Zenith supports both cloud and on-premise delivered configurations.

"Scalability and performance are critical in the deployment of endpoint protection platforms, particularly when it comes to servers and virtual machines being used in data center and cloud deployments," said David Monahan, Research Director- Security and Risk Management, Enterprise Management Associates®. "Ziften’s investment in the Zenith architecture is clearly designed to deliver the scale and performance necessary for the industry’s largest real-time endpoint protection needs."

Ziften Zenith Protects Client Devices, Data Center and Cloud Deployments

Ziften’s non-disruptive agent makes deployments simple for user devices, data center servers, and enterprise cloud deployments, including easy installation for virtual machines and containers. With no driver, no kernel and no reboot requirements, maximum protection across an entire enterprise environment is simple.

Unlike other endpoint security solutions that may be standalone, monolithic and difficult to manage, Zenith supports continuous feature delivery and easily integrates with the rest of the enterprise security infrastructure. This includes malware analysis and sandboxing solutions, security information and event management (SIEM) tools, systems management platforms, IT ticketing systems and orchestration platforms.

"Ziften takes another big step toward building a truly unique security vision for enterprise client devices, data centers and cloud environments," said Chuck Leaver, CEO of Ziften. "Zenith extends the performance, scale and resiliency of the architecture to a level that surpasses our customers’ needs, and provides an adaptive security model that will fuel Ziften's continued, rapid growth."

1. Gartner, “Market Guide for Endpoint Detection and Response Solutions,” by Peter Firstbrook, and Neil MacDonald, November 30, 2016.

About Ziften

Ziften is the leading provider of endpoint discovery, protection, and forensics. Its unique adaptive security approach helps enterprises, governments, and managed security service providers (MSSP) protect client devices, data centers, and cloud deployments. Ziften enables continuous endpoint discovery and posture assessments, threat detection and response, and one year look-back breach investigations. With Ziften you can eliminate unmanaged devices and reduce non-compliant assets, protect endpoints against known and unknown threats, investigate and implement corrective actions for identified breaches, and save real money by reducing hardware, software, and support calls.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.