Charles Leaver – The Key To SysSecOps Is Flexibility

Written By Charles Leaver


You will find that endpoints are all over. The device you’re reading this on is an endpoint, whether it’s a desktop, notebook, tablet, or phone. The HVAC controller for your building is an endpoint, assuming it’s linked to a network, and the WiFi access points and the security electronic cameras too. So is the connected automobile. So are the Web servers, storage servers, and Active Directory site servers in the data center. So are your IaaS/PaaS services in the cloud, where you are in control of bare-metal servers, VMware virtual machines, or containers operating on Windows and/or Linux.

They’re all endpoints, and all are necessary to handle.

They have to be managed from the IT side (from IT administrators, who hopefully have appropriate IT-level visibility of each connected thing like those security cams). That management means making certain they’re linked to the ideal network zones or VLANs, that their software applications and configurations the current version, that they’re not creating a flood on the network with bad packets due to electrical faults etc.

Those endpoints likewise need to be managed from the security point of view by CISO groups. Every endpoint is a prospective entrance into the business network, which implies the devices need to be locked down – default passwords never used, all security patches used, no unapproved software set up on the device’s embedded web server. (Kreb’s details how, in 2014, hackers broke into Target’s network through its A/C system.).

The Operations of Systems and Security.

Systems Security Operations, or SysSecOps, brings those 2 worlds together. With the best type of SysSecOps state of mind, and tools that support the proper workflows, IT and security employees get the very same data and can collaborate together. Sure, they each have different jobs, and respond differently to trouble notifications, however they’re all managing the very same endpoints, whether in the pocket, on the desk, in the utility closet, in the data center, or in the cloud.

Test Report from Ziften Zentih.

We were thrilled when the just recently released Broadband-Testing report praised Zenith, Ziften’s flagship endpoint security and management platform, as being perfect for this kind of circumstance. To quote from the current report, “With its Zenith platform, Ziften has a product that ticks all the SysSecOps boxes and more. Considering that its definition of ‘endpoints’ extends into the Data Centre (DC) and the world of virtualisation, it holds true blanket coverage.”.

Broadband-Testing is an independent screening center and service based in Andorra. They describe themselves as, “Broadband-Testing interacts with vendors, media, financial investment groups and VCs, analysts and consultancies alike. Checking covers all elements of networking hardware and software, from ease of use and efficiency, through to increasingly important aspects such as device power consumption measurement.”

Back to versatility. With endpoints everywhere (once again, on the desk, in the utility closet, in the data center, or in the cloud), a SysSecOps-based endpoint security and management system must go everywhere and do anything, at scale. Broadband-Testing composed:

“The configuration/deployment choices and architecture of Ziften Zenith permit a really flexible deployment, on or off-premise, or hybrid. Agent implementation is simplicity itself with absolutely no user requirements and no endpoint invasion. Agent footprint is likewise minimal, unlike lots of endpoint security solutions. Scalability likewise looks to be outstanding – the most significant consumer release to date is in excess of 110,000 endpoints.”

We cannot help but take pride in our product Zenith, and exactly what Broadband-Testing concluded:

“The emergence of SysSecOps – combining systems and security operations – is an uncommon moment in IT; a hype-free, good sense technique to refocusing on how systems and security are handled inside a company.

Key to Ziften’s endpoint technique in this classification is overall visibility – after all, how can you secure what you can’t see or don’t know exists in the first place? With its Zenith platform, Ziften has a product that ticks all the SysSecOps boxes and more.

Deployment is easy, specifically in a cloud-based situation as tested. Scalability likewise looks to be outstanding – the biggest customer implementation to date remains in excess of 110,000 endpoints.

Data analysis choices are comprehensive with a big quantity of details offered from the Ziften console – a single view of the whole endpoint infrastructure. Any object can be evaluated – e.g. Binaries, applications, systems – and, from a process, an action can be specified as an automatic function, such as quarantining a system in the event of a potentially malicious binary being found. Multiple reports are predefined covering all aspects of analysis. Alerts may be set for any event. Additionally, Ziften provides the idea of extensions for custom data collection, beyond the reach of a lot of vendors.

And with its External API functionality, Ziften-gathered endpoint data can be shared with a lot of 3rd party applications, thus adding more value to a customer’s existing security and analytics infrastructure investment.

Overall, Ziften has an extremely competitive offering in exactly what is an extremely worthy and emerging IT classification in the form of SysSecOps that is extremely worthwhile of examination.”.

We hope you’ll think about an assessment of Zenith, and will agree that when it pertains to SysSecOps and endpoint security and management, we do tick all the boxes with the true blanket coverage that both your IT and CISO groups have actually been searching for.