Charles Leaver – Gives Us Customized Security Solutions Say RSA 2017 Delegates

Written By Michael Vaughan And Presented By Charles Leaver Ziften CEO

 

More tailored options are needed by security, network and functional groups in 2017

Many of us have actually attended security conventions over the years, but none bring the very same high level of enjoyment as RSA – where security is talked about by the world. Of all the conventions I have actually gone to and worked, absolutely nothing comes close the passion for new technology individuals showed this past week in downtown San Francisco.

After taking a few days to digest the dozens of discussions about the needs and limitations with existing security tech, I’ve had the ability to synthesize a particular theme amongstparticipants: Individuals desire customized solutions that match their environment and will work throughout multiple internal teams.

When I describe the term “people,” I indicate everyone in attendance regardless of technological segment. Operational professionals, security professionals, network veterans, as well as user habits analysts often visited the Ziften cubicle and shared their experiences.

Everyone appeared more prepared than ever to discuss their wants and needs for their environment. These attendees had their own set of objectives they wanted to obtain within their department and they were desperate for responses. Since the Ziften Zenith solution offers such broad visibility on enterprise devices, it’s not surprising that our cubicle stayed crowded with individuals eager to learn more about a brand-new, refreshingly easy endpoint security innovation.

Guests came with grievances about myriad enterprise-centric security problems and looked for deeper insight into what’s actually taking place on their network and on devices traveling in and out of the workplace.

End users of old-school security products are on the hunt for a newer, more essential software applications.

If I could choose simply one of the regular questions I received at RSA to share, it’s this one:

” Exactly what is endpoint discovery?”

1) Endpoint discovery: Ziften reveals a historical view of unmanaged devices which have actually been connected to other business endpoints at some stage. Ziften permits users to discover known
and unidentified entities which are active or have actually been interactive with recognized endpoints.

a. Unmanaged Asset Discovery: Ziften uses our extension platform to expose these unidentified entities operating on the network.

b. Extensions: These are custom fit solutions tailored to the user’s particular wants and
requirements. The Ziften Zenith agent can execute the appointed extension on a single occasion, on a schedule or on a continuous basis.

Generally after the above description came the genuine reason they were attending:

People are searching for a vast array of services for numerous departments, including executives. This is where working at Ziften makes answering this concern a treat.

Just a part of the RSA participants are security professionals. I spoke to lots of network, operation, endpoint management, vice presidents, general supervisors and channel partners.

They plainly all utilize and comprehend the requirement for quality security software applications however relatively find the translation to service value missing among security vendors.

NetworkWorld’s Charles Araujo phrased the problem rather well in an article a short article recently:

Businesses should also rationalize security data in a business context and manage it holistically as part of the overall IT and organization operating model. A group of suppliers is also trying to tackle this obstacle …

Ziften was among only 3 companies mentioned.

After listening to those wants and needs of individuals from different business critical backgrounds and describing to them the abilities of Ziften’s Extension platform, I typically described how Ziften would modulate an extension to solve their need, or I provided a quick demo of an extension that would permit them to overcome a difficulty.

2) Extension Platform: Tailored, actionable solutions.

a. SKO Silos: Extensions based upon fit and requirement (operations, network, endpoint, etc).

b. Custom Requests: Require something you do not see? We can repair that for you.

3) Enhanced Forensics:

a. Security: Danger management, Risk Assessment, Vulnerabilities, Metadata that is suspicious.

b. Operations: Compliance, License Rationalization, Unmanaged Assets.

c. Network: Ingress/Egress IP movement, Domains, Volume metadata.

4) Visibility within the network– Not simply exactly what enters and goes out.

a. ZFlow: Lastly see the network traffic inside your enterprise.

Needless to say, everybody I spoke to in our booth rapidly understood the crucial significance of having a product such as Ziften Zenith running in and across their enterprise.

Forbes author, Jason Bloomberg, said it best when he just recently described the future of business security software and how all indications point toward Ziften blazing a trail:

Perhaps the broadest disruption: vendors are improving their ability to understand how bad actors behave, and can thus take steps to prevent, detect or reduce their malicious activities. In particular, today’s vendors comprehend the ‘Cyber Kill Chain’ – the actions a competent, patient hacker (known in the biz as an advanced persistent threat, or APT) will require to attain his or her wicked goals.

The product of U.S. Defense specialist Lockheed Martin, The Cyber Kill Chain consists of 7 links: reconnaissance, weaponization, shipment, exploitation, setup, establishing command and control, and actions on goals.

Today’s more innovative suppliers target one or more of these links, with the goal of avoiding, discovering or reducing the attack. Five vendors at RSA emerged in this category.

Ziften offers an agent based  technique to tracking the habits of users, devices, applications, and
network components, both in real-time along with throughout historic data.

In real time, analysts utilize Ziften for threat identification and prevention, while they utilize the historic data to uncover steps in the kill chain for mitigation and forensic functions.