All posts by chuckleav

Here 4 Steps To Prevent And Tackle Ransomware – Chuck Leaver

Written By Alan Zeichick And Presented By Chuck Leaver

 

Ransomware is real, and is striking people, services, schools, hospitals, governments – and there’s no sign that ransomware is stopping. In fact, it’s probably increasing. Why? Let’s face it: Ransomware is most likely the single most efficient attack that hackers have ever created. Anyone can create ransomware using easily offered tools; any cash gotten is likely in untraceable Bitcoin; and if something goes wrong with decrypting somebody’s hard drive, the cyber criminal isn’t impacted.

A business is hit with ransomware every forty seconds, according to some sources, and 60% of malware problems were ransomware. It hits all sectors. No industry is safe. And with the rise of RaaS (Ransomware-as-a-Service) it’s gon na get worse.

Fortunately: We can fight back. Here’s a 4 step battle plan.

Good Fundamental Hygiene

It begins with training workers how to handle malicious e-mails. There are falsified messages from service partners. There’s phishing and target spearphishing. Some will get through email spam/malware filters; staff members have to be taught not to click links in those messages, or naturally, not to permit for apps or plug-ins to be installed.

Nevertheless, some malware, like ransomware, is going to get through, frequently making use of obsolete software applications or unpatched systems, as in the Equifax breach. That’s where the next step comes in:

Making sure that all end points are thoroughly patched and entirely updated with the current, most safe and secure operating systems, applications, utilities, device drivers, and code libraries. In this way, if there is an attack, the endpoint is healthy, and has the ability to best eradicate the infection.

Ransomware isn’t really an innovation or security issue. It’s an organization problem. And it’s so much more than the ransom that is demanded. That’s peanuts compared with loss of performance due to downtime, bad public relations, disgruntled customers if service is interrupted, and the expense of rebuilding lost data. (Which presumes that important copyright or protected monetary or consumer health data isn’t really taken.).

What else can you do? Backup, backup, backup, and safeguard those backups. If you don’t have safe, protected backups, you can’t bring back data and core infrastructure in a timely fashion. That consists of making daily snapshots of virtual machines, databases, applications, source code, and configuration files.

Companies need tools to detect, identify, and avoid malware like ransomware from dispersing. This needs constant monitoring and reporting of exactly what’s occurring in the environment – consisting of “zero day” attacks that have not been seen before. Part of that is monitoring end points, from the mobile phone to the desktop to the server to the cloud, to guarantee that all end points are up-to-date and protected, which no unforeseen changes have actually been made to their underlying setup. That way, if a device is infected by ransomware or other malware, the breach can be detected quickly, and the device isolated and shut down pending forensics and healing. If an end point is breached, fast containment is vital.

The 4 Tactics.

Good user training. Updating systems with patches and repairs. Backing up whatever as frequently as possible. And utilizing tracking tools to help both IT and security groups discover problems, and react quickly to those issues. When it comes to ransomware, those are the four battle-tested tactics we need to keep our companies safe.

You can find out more about this in a brief 8 minute video, where I talk with several industry experts about this concern:

Protect Yourself With Microsoft And Ziften – Chuck Leaver

Written By David Shefter And Presented By Chuck Leaver

 

This week we revealed a cooperation with Microsoft that unites Ziften’s Zenith ® systems and security operations platform, and Windows Defender Advanced Threat Protection (ATP) providing a cloud-based, “single pane of glass” to find, see, examine, and respond to innovative cyber-attacks and breaches on Windows, macOS, and Linux-based devices (desktops, laptop computers, servers, cloud, etc).

Windows Defender ATP plus Ziften Zenith is a security service that enables business consumers to identify, examine, respond and remediate advanced dangers on their networks, off-network, and in the data center and cloud.

Imagine a single solution throughout all the devices in your business, supplying scalable, cutting-edge security in a cost-efficient and simple to use platform. Making it possible for business throughout the world to secure and manage devices through this ‘single pane of glass’ provides the guarantee of lower operational expenses with true enhanced security providing real time global hazard defense with information collected from billions of devices worldwide.

The Architecture Of Microsoft And Ziften

The image below supplies an introduction of the service elements and integration struck between Windows Defender ATP and Ziften Zenith.

Endpoint investigation abilities allow you to drill down into security signals and understand the scope and nature of a prospective breach. You can send files for deep analysis, receive the results and take action without leaving the Windows Defender ATP console.

Discover and Contain Dangers

With the Windows Defender ATP and Ziften Zenith integration, companies can easily find and contain dangers on Windows, macOS, and Linux systems from an individual console. Windows Defender ATP and Ziften Zenith supply:

Behavior-based, cloud-powered, innovative attack detection. Discover the attacks that make it past all other defenses (after a breach has been detected).

Abundant timeline for forensic investigation and mitigation. Easily examine the scope of any breach or suspected behaviors on any device through an abundant, 6-month machine timeline.

Integrated in unique danger intelligence knowledge base. Risk intelligence to quickly identify attacks based on tracking and data from millions of devices.

The diagram shown below illustrates much of the macOS and Linux danger detection and response abilities now available with Windows Defender ATP.

In conclusion, if you’re seeking to secure your endpoints and infrastructure, you have to take a tough look at Windows Defender ATP and Ziften Zenith.

This Is What You Do For Protection Against The KRACK Vulnerability – Chuck Leaver

Written By Dr Al Hartmann And Presented By Chuck Leaver

 

Enough media attention has actually been generated over the Wi-Fi WPA2 defeating Key Reinsertion Attack (KRACK), that we don’t have to re-cover that again. The initial finder’s site is a good location to evaluate the issues and connect to the detailed research findings. This might be the most attention paid to a fundamental communications security failure since the Heartbleed attack. During that earlier attack, a patched variation of the susceptible OpenSSL code was launched on the exact same day as the general disclosure. In this brand-new KRACK attack, similar responsible disclosure guidelines were followed, and patches were either currently released or quickly to follow. Both wireless endpoints and wireless network devices must be properly patched. Oh, and good luck getting that Chinese knockoff wireless security camera bought off eBay patched quickly.

Here we will just make a couple of points:

Take inventory of your wireless devices and take action to make sure appropriate patching. (Ziften can carry out passive network stock, including wireless networks. For Ziften-monitored end points, the readily available network interfaces along with used patches are reported.) For business IT personnel, it is patch, patch, patch every day anyhow, so absolutely nothing new here. But any unmanaged wireless devices need to be identified and verified.

Windows and iOS endpoints are less susceptible, while unpatched Linux and Android endpoints are extremely vulnerable. Many Linux end points will be servers without wireless networking, so not as much exposure there. But Android is another story, particularly given the balkanized state of Android updating across device makers. Most likely your business’s biggest direct exposure will be Android and IoT devices, so do your danger analysis.

Avoid wireless access through unencrypted protocols such as HTTP. Stick to HTTPS or other encrypted protocols or utilize a safe VPN, but know some default HTTPS sites permit compromised devices to coerce downgrade to HTTP. (Note that Ziften network monitoring reports IP addresses and ports used, so take a look at any wireless port 80 traffic on unpatched endpoints.).

Continue whatever wireless network health practices you have been utilizing to recognize and silence rogue access points, unapproved wireless devices, etc. Grooming access point placement and transmission zones to reduce signal spillage outside your physical boundaries is also a smart practice, given that KRACK hackers should be present locally within the wireless network. Do not provide advantaged placement chances inside or close by to your environment.

For a more broad discussion around the KRACK vulnerability, take a look at our current video on the subject:

The Best Ways To Deliver Security Awareness Training – Chuck Leaver

Written By Chuck Leaver Ziften CEO

 

Efficient business cybersecurity presumes that individuals – your workers – do the ideal thing. That they don’t turn over their passwords to a caller who declares to be from the IT department doing a “credentials audit.” That they don’t wire $10 million to an Indonesian checking account after getting a midnight demand from “the CEO”.

That they don’t install an “urgent upgrade” to Flash Player based on a pop-up on a pornography website. That they do not overshare on social networks. That they don’t keep business information on file sharing services outside the firewall. That they do not link to unsecure WiFi networks. And they do not click links in phishing emails.

Our research shows that 75+% of security events are caused or aided by staff member mistakes.

Sure, you’ve set up endpoint security, email filters, and anti-malware services. Those preventative measures will most likely be for nothing, though, if your employees do the incorrect thing time and again when in a harmful scenario. Our cybersecurity efforts are like having an elegant vehicle alarm: If you don’t teach your teen to lock the car when it’s at the mall, the alarm is worthless.

Security awareness isn’t enough, naturally. Staff members will make mistakes, and there are some attacks that don’t need an employee error. That’s why you need endpoint security, email filters, anti-malware, etc. But let’s speak about reliable security awareness training.

Why Training Typically Fails to Have an Impact

Initially – in my experience, a great deal of staff member training, well, is poor. That’s particularly true of online training, which is usually horrible. But in many cases, whether live or canned, the training does not have credibility, in part since lots of IT experts are poor and unconvincing communicators. The training frequently concentrates on interacting and implementing rules – not altering risky habits and routines. And it resembles getting mandatory copy machine training: There’s absolutely nothing in it for the employees, so they don’t accept it.

It’s not about implementing guidelines. While security awareness training msy be “owned” by various departments, such as IT, CISO, or HR, there’s typically a lack of understanding about exactly what a safe and secure awareness program is. To start with, it’s not a checkbox; it has to be continuous. The training must be delivered in various methods and times, with a combination of live training, newsletters, small-group conversations, lunch-and-learns, and yes, even resources online.

Securing yourself is not complicated!

But a huge issue is the absence of objectives. If you do not know what you’re trying to do, you cannot see if you’ve done a good task in the training – and if dangerous behaviors in fact alter.

Here are some sample objectives that can cause reliable security awareness training:

Supply staff members with the tools to recognize and deal with ongoing daily security dangers they may receive online and through e-mail.

Let workers understand they are part of the team, and they can’t just count on the IT/CISO groups to handle security.

Halt the cycle of “unexpected ignorance” about safe computing practices.

Modify state of minds toward more safe practices: “If you see something, say something”.

Review of company rules and procedures, which are described in actionable terms which relate to them.

Make it Pertinent

No matter who “owns” the program, it’s vital that there is visible executive support and management buy-in. If the execs don’t care, the employees will not either. Reliable training will not speak about tech buzzwords; instead, it will focus on changing habits. Relate cybersecurity awareness to your employees’ personal life. (And while you’re at it, teach them ways to keep themselves, their household, and their house safe. Odds are they do not know and are reluctant to ask).

To make security awareness training really relevant, get employee concepts and motivate feedback. Measure success – such as, did the number of external links clicked by workers decrease? How about calls to tech support originating from security infractions? Make the training timely and real-world by including current scams in the news; sadly, there are numerous to select from.

In short: Security awareness training isn’t enjoyable, and it’s not a silver bullet. However, it is necessary for guaranteeing that risky employee behaviors don’t weaken your IT/CISO efforts to secure your network, devices, applications, and data. Ensure that you continuously train your staff members, and that the training works.

Ziften Creates Energy At Splunk .conf – Chuck Leaver

Written By Josh Applebaum And Presented By Chuck Leaver

 

Like many of you, we’re still recovering from Splunk.conf recently. As usual,. conf had great energy and the individuals who were in attendance were enthusiastic about Splunk and the many use cases that it offers through the large app ecosystem.

One important announcement during the week worth mentioning was a brand-new security offering referred to as “Content Updates,” which basically is pre-built Splunk searches for helping to find security occurrences.

Basically, it takes a look at the most recent attacks, and the Splunk security group develops new searches for how they would look through Splunk ES data to discover these types of attacks, then ships those new searches to consumer’s Splunk ES environments for automated signals when seen.

The best part? Because these updates are using mainly CIM (Common Info Model) data, and Ziften populates a great deal of the CIM models, Ziften’s data is currently being matched versus the new Content Updates Splunk has created.

A fast demonstration revealed which vendors are adding to each kind of “detection” and Ziften was pointed out in a great deal of them.

For instance, we have a recent blog post that shares how Ziften’s data in Splunk is utilized to find and respond to WannaCry.

Overall, with the approximately 500 individuals who visited the booth over the course of.conf I have to say it was one of the very best occasions we have actually performed in regards to quality discussions and interest. We had nothing but favorable reviews from our extensive discussions with all walks of business life – from highly technical experts in the public sector to CISOs in the monetary sector.

The most common conversation normally started with, “We are simply beginning to implement Splunk and are new to the platform.” I like those, given that individuals can get our Apps free of charge and we can get them an agent to experiment with and it gets them something to make use of right out of the box to demonstrate worth immediately. Other folks were extremely skilled and actually liked our approach and architecture.

Bottom line: People are really thrilled about Splunk and genuine options are available to assist individuals with real problems!

Want to know more? The Ziften ZFlow App and Technology Add-on helps users of Splunk and Splunk ES usage Ziften-generated extended NetFlow from end points, servers, and cloud VMs to see exactly what they are missing out on at the edge of their network, their data centers, and in their cloud deployments.

You Will Be Secure With Ziften Services – Chuck Leaver

Written By Josh Harriman And Presented By Chuck Leaver

 

Having the correct tools to hand is a given in our industry. However having the correct tools and services is one thing. Getting the best value out of them can be an obstacle. Even with all the ideal objectives and sufficiently experienced workers, there can be gaps. Ziften Services can assist to fill those spaces and keep you on track for success.

Ziften Services can enhance, or perhaps outright lead your IT Operations and Security groups to much better equip your organization with three great offerings. Every one is customized for a specific need and in light of the statistics from a current report by ESG (Enterprise Strategy Group) entitled “Patterns in Endpoint Security Study”, which mentioned 51% of responders in the research study stated they will be releasing and utilizing an EDR (endpoint detection and response) solution now and 35% of them plan to utilize managed services for the application, shows the need is out there for appropriate services around these products and solutions. Therefore, Ziften is offering our services knowing that numerous companies do not have the scale or know-how to implement and completely use needed tools such as EDR.

Ziften services are as follows:

Ziften Assess Service
Ziften Hunt Service
Ziften Respond Service

While each of the 3 services cover a special function, the latter 2 are more complementary to each other. Let’s take a look at each in a bit more information to better understand the advantages.

Assess Service

This service covers both IT functional and security groups. To determine your success in appropriate documentation and adherence of processes and policies, you have to start with an excellent strong baseline. The Assess services start by performing in-depth interviews with crucial decision makers to truly understand what is in place. From there, a Ziften Zenith implementation provides monitoring and data collection of key metrics within customer device networks, data centers and cloud implementations. The reporting covers asset management and efficiency, licensing, vulnerabilities, compliance and even anomalous habits. The outcome can cover a series of concerns such as M&An assessments, pre-cloud migration preparation and regular compliance checks.

Hunt Service

This service is a true 24 × 7 managed endpoint detection and response (MDR) offering. Organizations struggle to completely cover this essential element to security operations. That could be because of restricted personnel or important proficiency in threat searching strategies. Again, making use of the Ziften Zenith platform, this service uses constant tracking across client devices, servers, cloud VMs supporting Windows, Mac OSX and Linux os. One of the primary outcomes of this service is considerably minimizing threat dwell times within the environment. This has actually been spoken about quite often in the past couple of years and the numbers are shocking, usually in the order of 100s of days that hazards stay concealed within companies. You need somebody that can actively search for these enemies as well as can historically look back to previous occasions to discover habits you were not knowledgeable about. This service does use some hours of devoted Incident Response too, so you have all your bases covered.

Respond Service

When you up against it and have a real emergency, this service is exactly what you need. This is a tried and true IR team prepared for war 24 × 7 with a broad series of response tool sets at their disposal. You will get instant event evaluation and triage. Recommended actions line up with the intensity of the danger and what response actions have to happen. The teams are really versatile and will work from another location or if needed, can be on site where conditions necessitate. This could be your whole IR team, or will enhance and mix right in with your current team.

At the end of the day, you need services to assist optimize your possibilities of success in today’s world. Ziften has three excellent offerings and wants all our clients to feel secured and lined up with the very best functional and security posture available. Please connect to us so we can assist you. It’s what we are here to do!

Why Vulnerability Lifecycle Management Is Vital For Your Career Prospects – Chuck Leaver

Written By Dr Al Hartmann And Presented By Chuck Leaver

 

The following headline struck the news last week on September 7, 2017:

Equifax Inc. today announced a cyber security occurrence possibly impacting around 143 million U.S. consumers. Criminals exploited a U.S. site application vulnerability to access to certain files. Based on the business’s examination, the unapproved gain access to occurred from mid-May through July 2017.

Lessons from Past Data Breaches

If you like your job, appreciate your function, and wish to retain it, then do not leave the door ajar for opponents. A significant data breach often begins with an unpatched vulnerability that is easily exploitable. Then the inevitable takes place, the cyber criminals are inside your defenses, the crown jewels have actually left the building, the press releases fly, costly specialists and outside legal counsel rack up billable hours, regulators come down, lawsuits are flung, and you have “some serious ‘splainin’ to do”!

We don’t know yet if the head splainer in the existing Equifax breach will make it through, as he is still in ‘splainin’ mode, asserting the infiltration began with the exploitation of an application vulnerability.

In such cases the usual rhumba line of resignations is – CISO initially, followed by CIO, followed by CEO, followed by the board of directors shakeup (especially the audit and corporate responsibility committees). Do not let this take place to your professional life!

Actions to Take Immediately

There are some commonsense steps to take to avoid the unavoidable breach catastrophe resulting from unpatched vulnerabilities:

Take stock – Inventory all data and system assets and map your network topology and attached devices and open ports. Know your network, it’s division, what devices are attached, what those devices are running, what vulnerabilities those systems and apps expose, what data assets they gain access to, the sensitivity of those assets, what defenses are layered around those assets, and what checks remain in place along all potential access points.

Streamline and toughen up – Carry out best practices suggestions for identity and access management, network segmentation, firewall and IDS setups, os and application setups, database access controls, and data file encryption and tokenization, while simplifying and cutting the number and intricacy of subsystems throughout your business. Anything too complex to manage is too intricate to secure. Select setup hardening heaven over breach response hell.

Continually monitor and scrutinize – Periodic audits are essential but not enough. Continually monitor, track, and examine all pertinent security events and exposed vulnerabilities – create visibility, occasion capture, analysis, and archiving of every system and session login, every application launch, every active binary and vulnerability direct exposure, every script execution, every command issued, every networking contact, every database transaction, and every delicate data access. Any holes in your security occasion visibility produce an attacker free-fire zone. Develop essential performance metrics, track them ruthlessly, and drive for relentless improvement.

Don’t accept operational excuses for insufficient security – There are constantly safe and secure and reliable functional policies, but they may not be painless. Not suffering a catastrophic data breach is long down the organizational pain scale from the alternative. Functional expedience or running legacy or misaligned concerns are not legitimate excuses for extenuation of poor cyber practices in an escalating risk environment. Make your voice heard.

What You Need To Learn From The Equifax Incident – Chuck Leaver

Written By Michael Levin And Presented By Chuck Leaver

 

Equifax, among the 3 major U.S. based credit reporting services just revealed a major data breach where hackers have stolen sensitive details from 143 million American customers.

Ways that the Equifax security breach WILL impact you:

– Personally – Your individual and household’s identity information is now known to hackers and will be targeted!

– Business – Your organizations might be impacted and targeted.

– Nationally – Terrorist, Nation States and organized crime groups may be involved or use this data to commit cybercrime to obtain financial gain.

Securing yourself is not complicated!

5 suggestions to safeguard yourself right away:

– Register for a credit tracking service and/or lock your credit. The quickest way to be informed that your credit is jeopardized is through a credit tracking service. Equifax has currently started the procedure of setting up totally free credit monitoring for those impacted. Other credit monitoring services are available and need to be thought about.

– Monitor all your financial accounts consisting of charge cards and all checking accounts. Ensure that all notifications are switched on. Make certain you are getting immediate text and email alerts for any modifications in your account or increased balances or transactions.

– Secure your bank and financial accounts, guarantee that two-factor authentication is switched on for all accounts. Learn about 2 factor authentication and turn it on for all monetary accounts.

– Phishing e-mail messages can be your most significant daily danger! Slow down when dealing with e-mail messages. Stop automatically clicking on every email link and attachment you get. Instead of clicking on links and attachments in email messages, go separately to the sites outside of the e-mail message. When you get an email, you were not anticipating from a name you recognize think about getting in touch with the sender independently before you click on links or attachments.

– Strong passwords – consider changing all your passwords. Develop strong passwords and secure them. Utilize different passwords for your accounts.

Other Security Considerations:

– Backup all computers and update operating systems and software applications routinely.

– Social network security – Sharing too much info on social networks increases the danger that you will be taken advantage of. For example, telling the world, you are on holiday with photos opens the danger your house will be robbed.

– Protect your devices – Don’t leave your laptop, phone or tablet unattended even for a moment. Do not leave anything in your car you don’t desire taken due to the fact that it’s simply a matter of time.

– Internet of things and device management – Understand how all your devices link to the Internet and exactly what details you are sharing. Check security settings for all devices including smart watches and physical fitness bands.

The worth of training on security awareness:

– This is another cyber crime, where security awareness training can help to minimize danger. Being aware of new crimes and frauds in the news is a basic part of security awareness training. Ensuring that employees, family and friends are aware of this scam will significantly minimize the possibility that you will be preyed on.

– Sharing new scams and cyber crimes you hear about in the news with others, is necessary to guarantee that the people you appreciate do not succumb to these kinds of cyber crimes.

Extensibility Is Best For Your Security – Chuck Leaver

Written By Chuck Leaver Ziften CEO

 

Whether you call them extensions, or call them modifications – no matter what they are called, the very best innovation platforms can be customized to fit an organization’s specific service needs. Generic operations tools are fine at performing generic operations tasks. Generic security tools are great at resolving generic security obstacles. Generic can just take you so far, unfortunately, and that’s where extensibility takes over.

Extensibility comes up typically when I’m speaking to clients and possible clients, and I’m proud that a Global 10 business selected Ziften over everyone else in the market mostly on that basis. For that client, and many others, the capability to deeply tailor platforms is a need.

This isn’t about merely producing customized reports or custom signals. Let’s be honest – the capability to develop reports are baseline ability of numerous IT operations and security management tools. True extensibility goes deep into the service to provide it abilities that fix real problems for the company.

One client used great deals of mobile IoT devices, and had to have our Zenith real-time visibility and control system be able to gain access to (and monitor) the memory of those devices. That’s not a standard feature used by Zenith, because our low-footprint agent does not hook into the os kernel or operate through standard device drivers. Nevertheless, we dealt with the customer to tailor Zenith with that ability – and it turned out to be much easier than anyone imagined.

Another client looked at the standard set of endpoint data that the agent collects, and wanted to include extra data fields. They likewise wished to setup the administrative console with customized actions using those data fields, and push those actions back out to those end points. No other endpoint tracking and security service was able to supply the facilities for including that performance other than Ziften.

What’s more, the client established those extensions themselves … and owns the code and intellectual property. It’s part of their own secret sauce, their own organization differentiator, and distinct to their business. They could not be happier. And neither are we.

With lots of other IT operations and security systems, if customers desire additional functions or abilities, the only option is to send that as a future feature request, and hope that it appears in an approaching release of the product. Up until then, regrettable.

That’s not how we designed our flagship solutions, Zenith and ZFlow. Because our endpoint agent isn’t really based on device drivers or kernel hooks, we can permit incredible extensibility, and open up that extensibility for clients to access directly.

Likewise, with our administrative consoles and back-end monitoring systems; everything is adjustable. And that was built in right from the start.

Another aspect of modification is that our real-time and historic visibility database can incorporate into your other IT operations and security platforms, such as SIEM tools, risk intelligence, IT ticketing system, job orchestration systems, and data analytics. With Zenith and ZFlow, there are no silos. Ever.

When it comes to endpoint monitoring and management, extensions are significantly where it’s at. IT operations and enterprise security teams need the ability to tailor their tools platforms to fit their exact requirements for monitoring and handling IoT, conventional endpoints, the data center, and the cloud. In numerous client discussions, our integrated extensibility has actually caused eyes to illuminate, and won us trials and deployments. Tell us about your custom-made needs, and let’s see exactly what we can do.

We Show You Our Endpoint Security Architecture Now Show Us Yours – Chuck Leaver

Written By Mike Hamilton And Presented By Ziften CEO Chuck Leaver

 

Endpoint security is really in vogue nowadays. And there are lots of different vendors out there promoting their wares in this market. However it’s sometimes difficult to comprehend exactly what each supplier offers. What’s much more difficult is to comprehend how each supplier service is architected to offer their services.

I believe that the back-end architecture of whatever you select can have an extensive effect on the future scalability of your execution. And it can produce great deals of unexpected work and costs if you’re not mindful.

So, in the spirit of openness, and because we think our architecture is different, unique and effective, we invite all endpoint security vendors to “show us your architecture”.

I’ll kick this off in the video below where I reveal to you the Ziften architecture, and a couple of exactly what I consider legacy architectures for contrast. Particularly, I’ll talk about:

– Ziften’s architecture designed utilizing next-gen cloud concepts.
– One company’s peer-to-peer “mish-mash” architecture.
– Tradition hub-spoke-hub architectures.

I have actually shown you the power of our genuinely cloud based platform. Now it’s my rival’s turn. What are you waiting for folks – reveal to us your architectures!