Charles Leaver – Our Partnership With Microsoft Will Help You Defend Your Network

Written By David Shefter And Presented By Charles Leaver

 

This week we revealed a cooperation with Microsoft that brings together Ziften’s Zenith ® systems and security operations platform, and Windows Defender Advanced Threat Protection (ATP) delivering a cloud-based, “single pane of glass” to discover, view, investigate, and react to innovative cyber-attacks and breaches on Windows, macOS, and Linux-based devices (desktops, laptops, servers, cloud, etc).

Windows Defender ATP plus Ziften Zenith is a security service that allows enterprise consumers to identify, examine, respond and remediate advanced threats on their networks, off-network, and in the data center and cloud.

Imagine a single solution throughout all the devices in your enterprise, providing scalable, cutting-edge security in a cost-efficient and easy to use platform. Making it possible for enterprises across the world to protect and handle devices through this ‘single pane of glass’ provides the promise of lower operational expenses with true boosted security providing real time worldwide hazard protection with details collected from billions of devices worldwide.

The Architecture Of Microsoft And Ziften

The diagram listed below provides a summary of the service parts and integration between Windows Defender ATP and Ziften Zenith.

Endpoint examination abilities allow you to drill down into security signals and understand the scope and nature of a prospective breach. You can submit files for deep analysis, receive the outcomes and take action without leaving the Windows Defender ATP console.

Identify and Contain Risks

With the Windows Defender ATP and Ziften Zenith integration, organizations can easily discover and contain threats on Windows, macOS, and Linux systems from a single console. Windows Defender ATP and Ziften Zenith provide:

Based on behavior, powered by the cloud, advanced attack detection. Discover the attacks that get past all other defenses (after a breach has been detected).

Rich timeline for forensic examination and mitigation. Quickly examine the scope of any breach or believed habits on any machine through an abundant, 6-month device timeline.

Built in special threat intelligence knowledge base. Hazard intelligence to quickly identify attacks based on monitoring and data from billions of devices.

The image shown below shows much of the macOS and Linux risk detection and response abilities now offered with Windows Defender ATP.

At the end of the day, if you’re looking to secure your endpoints and infrastructure, you need to take a tough look at Windows Defender ATP and Ziften Zenith.