Attackers love an organization’s endpoints. And why not? Endpoints aren’t patched. User’s disable their security tools. Traditional AV won’t stop them. And when attackers get in, it takes months to find them, and then the incident response nightmare starts. If endpoint protection isn’t done properly, organization’s face unacceptable risks, incur unnecessary costs, and will experience preventable security breaches. Ziften simplifies endpoint protection plus visibility. Ziften’s cloud-delivered endpoint protection platform prevents attacks on enterprise endpoints – laptops, desktops, servers, and cloud – with advanced AV, detection and response, plus visibility and hardening.
Zenith simplifies endpoint protection plus visibility with a cloud-delivered endpoint protection platform that prevents attacks on enterprise endpoints – laptops, desktops, servers, and cloud. The single agent deploys in minutes enabling advanced AV, detection and response, plus visibility and hardening. The result is simple, continuous protection to stop attacks with the people you already have.
Ziften was founded in 2009 by Mark Obrecht who previously founded Whole Security, a behavior-based security and anti-phishing company which was bought by Symantec in 2005. At present, Mike Hamilton is Ziften’s CEO and announced a series of managed security services, called Managed Assess Service, Managed Hunt Service, and Managed Respond Service, all designed to help organizations augment their security teams by getting additional help in monitoring EDR, analytics, and security forensics.
In November 2017, Microsoft announced new partnerships for its Windows Defender Advanced Threat Protection (ATP) service, including integration with Ziften’s Zenith security platform for macOS and Linux operating system support.
The integration provides security events from onboarded macOS and Linux devices and surfaces them all within the Windows Defender ATP console. Ziften was later included as a member in the initial formation of the Microsoft Intelligent Security Association. In August 2018, Ziften enhanced its Zenith endpoint protection platform with advanced anti-virus capabilities. The new capabilities help to block file-based, file-less, and in-memory attacks. Zenith uses artificial intelligence (AI) and the cloud to help protect enterprises.
Ziften has collaborated with Microsoft and integrated the Zenith endpoint protection platform with Microsoft Windows Defender Advanced Threat Protection (ATP). The integration enables customers to detect, view, investigate, and respond to advanced cyber-attacks on Windows, as well as macOS, and Linux-based endpoints directly within the Windows Defender ATP Management Console. Ziften’s product, ZFlow delivers extended NetFlow telemetry from the endpoints (device, server, cloud). Organizations can augment existing NetFlow collection and analysis with ZFlow to see east-west traffic in their network and data centers, see what’s happening in their cloud deployments, and connect the dots; linking every network flow to a specific device, application, process, and user.
Ziften’s services assess and secure organizations by providing unmatched visibility into their physical and virtual IT assets, whether on- or off-network, in the cloud, or in their data center. Ziften’s Assess, Hunt, and Respond services augment any organizational team by working directly with thier staff of executives, IT and security operations personnel.
The company simplifies endpoint protection plus visibility. Ziften’s cloud-delivered endpoint protection platform prevents attacks on all enterprise endpoints – laptops, desktops, servers, and cloud – whether on network or off. The low-profile single agent deploys in minutes enabling advanced AV, endpoint detection and response, plus endpoint visibility and hardening. The result is simple, continuous endpoint protection to stop attacks with the people and budget you already have. Ziften is aiming towards protecting enterprises using artificial intelligence (AI) to prevent and detect cyber-attacks from zero-day and polymorphic malware, to weaponized documents, to fileless attacks through even the most complex obfuscation and mutations.