Calling Microsoft Channel Partners Don’t Miss This Security Opportunity – Chuck Leaver

Written By Greg McCreight And Presented By Chuck Leaver

 

Windows Defender Advanced Threat Protection (WDATP) is very good, popular with Microsoft channel partners around the globe. It is probable that you’re already working with Microsoft customers to set up and look after WDATP on their Windows endpoints.

I’m delighted to tell you about a brand-new opportunity: Get a fast start with an industry leading solution that integrates right into WDATP: Ziften Zenith. For a minimal time, Microsoft channel partners can leverage our new “Fast Start” program to collaborate with Ziften.

With “Fast Start,” you enjoy all the benefits of Ziften’s top tier partner status for a full year, and we’ll assist you to get up to speed rapidly with joint market and business advancement resources – and with a waiver of the usual sales volume dedication connected with Gold Status.

If you don’t know Ziften, we supply infrastructure visibility and collaborated risk detection, avoidance, and response across all endpoint devices and cloud environments. Zenith, our flagship security platform, easily deploys to client devices, servers, and virtual machines.

When installed, Zenith continuously collects all the info required to accurately evaluate the present and historical state of all handled devices consisting of system, user habits, network connectivity, application, binary, and procedure data. Zenith provides your customers’ IT and security teams with continuous visibility and control of all managed assets consisting of constant tracking, signaling, and automated or manual actions.

Zenith is cross platform – it works with and protects Windows, Mac, Linux, and other endpoints.

What’s specifically notable – and here’s the chance – is that Ziften has teamed up with Microsoft to incorporate Zenith with Windows Defender ATP. That means your customers can use WDATP on Windows systems and Zenith on their macOS and Linux systems to detect, see, and react to cyberattacks all utilizing only the WDATP Management Console for all the systems. Zenith is concealed in the background.

A single pane of glass, to handle Windows, Mac, Linux endpoints, which can include desktops, notebooks, and servers. That makes Zenith the best service to offer your existing WDATP customers… and to make your bids for brand-new WDATP business more complete for multi-platform enterprise potential customers.

What’s more, providing Zenith can help you speed customer migrations to Windows 10, and offer more Business E5 commercial editions.

” Fast Start” for a Year with Gold Status

Ziften is completely concentrated on the channel: 96% of our sales in 2017 were through the channel. We are delighted to bring the “Fast Start” program to existing Microsoft channel partners, throughout the world.

With “Fast Start,” you can sign up for the Ziften Channel Program with these benefits:

Expedited Approval and On-Boarding – Ziften channel managers and field sales work directly with you to get working providing the Zenith endpoint security solution incorporated with Windows Defender ATP.

Superior Security Worth – You’ll be uniquely positioned to offer clients and potential customers greater security worth across more of their overall environment than ever, increasing the number of supported and secured Windows, Mac, and Linux systems.

Hands-On Collaboration – Ziften dedicates field sales, sales engineers, and marketing to support your day-to-day pre-sales engagements, drive new sales opportunities, and help to close more deals with Microsoft and Ziften endpoint security.

Here’s what one significant Microsoft channel partner, says about this – this is Ronnie Altit, founder and CEO of Insentra, a “partner-obsessed” Australian IT services business that works specifically through the IT channel:

” As a big Microsoft reseller, teaming with Ziften to use their Zenith security platform integrated with Microsoft Windows Defender ATP was a no-brainer. We’re thrilled at the seamless integration between Zenith and Windows Defender ATP offering our customers holistic security and visibility across their Windows and non-Windows systems. Ziften has been a pleasure to deal with, and helpful at every step of the procedure. We expect to be exceptionally successful offering this effective security solution to our customers.”

More Focus On Women In Cybersecurity Highlighted By Girl Scout Badges – Chuck Leaver

Written By Kim Foster And Presented By Chuck Leaver

 

It’s clear that cybersecurity is getting more global attention than before, and enterprises are truly worried if they are training adequate security professionals to fulfill growing security risks. While this issue is felt across the commercial world, lots of people did not anticipate Girl Scouts to hear the call.

Starting this fall, countless Girl Scouts across the country have the chance to receive cybersecurity badges. Girl Scouts of the USA teamed up with Security Company (and Ziften tech partner) Palo Alto Networks to develop a curriculum that informs girls about the essentials of computer system security. According to Sylvia Acevedo, CEO of GSUSA, they produced the program based upon need from the ladies themselves to safeguard themselves, their computers, and their household networks.

The timing is good, since in accordance with a study launched in 2017 by (ISC), 1.8 million cybersecurity positions will be unfilled by 2022. Factor in increased demand for security pros with stagnant growth for ladies – just 11 percent for the past few years – our cybersecurity staffing troubles are poised to intensify without significant effort on behalf of the market for much better inclusion.

Naturally, we cannot count on the Girl Scouts to do all of the heavy lifting. More comprehensive instructional efforts are a given: according to the Computing Technology Industry Association, 69 percent of U.S. ladies who do not have a profession in infotech pointed out not knowing what chances were available to them as the reason they did not pursue one. Among the terrific untapped chances of our market is the recruitment of more diverse specialists. Targeted educational programs and increased awareness must be high priority. Raytheon’s Ladies Cyber Security Scholarship is a good example.

To reap the rewards of having females supported forming the future of innovation, it is necessary to dispel the exclusionary understanding of “the boys’ club” and remember the groundbreaking contributions made by females of the past. Lots of people know that the first computer programmer was a lady – Ada Lovelace. Then there is the work of other famous leaders such as Grace Hopper, Hedy Lamarr, or Ida Rhodes, all who might stimulate some vague recollection amongst those in our industry. Female mathematicians developed programs for one of the world’s first totally electronic general-purpose computers: Kay McNulty, Jean Jennings Bartik, Betty Snyder, Marlyn Meltzer, Fran Bilas, and Ruth Lichterman were simply a few of the first programmers of the Electronic Numerical Integrator and Computer (much better referred to as ENIAC), though their important work was not commonly recognized for over half a century. In fact, when historians initially found photos of the ladies in the mid-1980s, they misinterpreted them for “Refrigerator Ladies” – models posing in front of the machines.

It deserves noting that numerous folk believe the very same “boys’ club” mentality that overlooked the accomplishments of women in history has resulted in restricted leadership positions and lower incomes for contemporary females in cybersecurity, along with straight-out exemption of female luminaries from speaking chances at industry conferences. As patterns go, omitting bright individuals with appropriate understanding from influencing the cybersecurity market is an unsustainable one if we intend to keep up with the cybercriminals.

Whether or not we jointly do something to promote more inclusive offices – like educating, hiring, and promoting women in greater numbers – it is heartening to see an organization synonymous with charity event cookies successfully notify a whole market to that girls are genuinely interested in the field. As the Girls Scouts these days are provided the tools to pursue a career in information security, we need to prepare for that they will end up being the very ladies who ultimately reprogram our expectations of what a cybersecurity professional appears like.

Check Your Macs As They Could Be A Security Risk – Chuck Leaver

Written By Roark Pollock And Presented By Chuck Leaver

 

Do you have Mac computers? That’s fine. I have one too. Have you locked your Macs down? If not, your business has a possibly severe security weak point.

It’s a fallacy to think that Macintosh computers are naturally protected and do not need to be secured against malware or hacking. Lots of folk believe Macs are undoubtedly arguably more safe than Windows desktops and laptops, due to the design of the Unix-oriented kernel. Definitely, we see fewer security patches released for macOS from Apple, compared with security patches for Windows from Microsoft.

Less security flaws is not absolutely no defects. And more secure doesn’t imply complete safety.

Examples of Mac Vulnerabilities

Take, for example, the macOS 10.13.3 update, issued on January 23, 2018, for the current variations of the Mac’s operating system. Like a lot of present computers running Intel processors, the Mac was vulnerable to the Meltdown flaw, which meant that malicious applications may be able to read kernel memory.

Apple needed to patch this defect – in addition to numerous others.

For instance, another problem could enable malicious audio files to execute random code, which could break the system’s security integrity. Apple needed to patch it.

A kernel flaw implied that a malicious application might have the ability to execute random code with kernel advantages, giving cyber criminals access to anything on the device. Apple needed to patch the kernel.

A flaw in the WebKit library meant that processing maliciously crafted web material may lead to random code execution. Apple needed to patch WebKit.

Another defect suggested that processing a harmful text message may cause application denial of service, locking up the system. Whoops. Apple had to patch that flaw also.

Do not Make The Exact Same Mistakes as Consumers

Lots of consumers, thinking all the discussions about how terrific macOS is, opt to run without security, relying on the macOS and its integrated application firewall to block all manner of bad code. Problem: There’s no built-in anti virus or anti malware, and the firewall can just do so much. And numerous businesses wish to overlook macOS when it concerns visibility for posture monitoring and hardening, and risk detection/ hazard searching.

Consumers often make these presumptions since they don’t know any better. IT and Security professionals ought to never ever make the same mistakes – we must know much better.

If a Mac user sets up bad software, or includes a destructive web browser extension, or opens a bad e-mail attachment, or clicks on a phishing link or a nasty advertisement, their machine is corrupted – similar to a Windows machine. However within the enterprise, we need to be prepared to handle these concerns, even on Macs.

So What Do You Do?

Exactly what do you have to do?

– Set up anti-virus and anti malware on business Mac computers – or any Mac that has access to your company’s material, servers, or networks.
– Monitor the state of Macs, just like you would with Windows computers.
– Be proactive in applying fixes and patches to Mac computers, once again, just like with Windows.

You need to also eliminate Mac computers from your corporate environment which are too old to run the current variation of macOS. That’s a lot of them, due to the fact that Apple is respectable at keeping hardware that is older. Here is Apple’s list of Mac models that can run macOS 10.13:

– MacBook (Late 2009 or newer).
– MacBook Pro (Mid 2010 or newer).
– MacBook Air (Late 2010 or newer).
– Mac mini (Mid 2010 or newer).
– iMac (Late 2009 or more recent).
– Mac Pro (Mid 2010 or more recent).

When the next version of macOS comes out, a few of your older machines may fall off the list. They should drop off your inventory too.

Ziften’s Viewpoint.

At Ziften, with our Zenith security platform, we strive to preserve visibility and security feature parity in between Windows systems, macOS systems, and Linux-based systems.

In fact, we’ve partnered with Microsoft to incorporate our Zenith security platform with Microsoft Windows Defender Advanced Threat Protection (ATP) for macOS and Linux monitoring and threat detection and response coverage. The integration makes it possible for customers to detect, view, investigate, and respond to sophisticated cyber attacks on macOS machines (and also Windows and Linux-based endpoints) straight within the Microsoft WDATP Management Console.

From our viewpoint, it has constantly been important to give your security groups self-confidence that every desktop/ laptop endpoint is safeguarded – and hence, the enterprise is secured.

It can be hard to believe, 91% of enterprises state they have some Macs. If those computers aren’t safeguarded, as well as appropriately incorporated into your endpoint security systems, the business is not secured. It’s just that basic.