sb-nz logo
Story image

Ziften extends proprietary AI/ML security across all endpoints

07 Feb 2019

Ziften, a cybersecurity firm that provides cloud-based endpoint protection and visibility for enterprise endpoints, is harnessing the power of proprietary machine learning that will support all phases of its endpoint security continuum.

While machine learning is often limited to solving siloed problems such as Windows endpoint threat prevention, Ziften took a different approach.

Its proprietary artificial intelligence (AI) and machine learning (ML) algorithms now work throughout all phases of Ziften Zenith, the company’s cybersecurity platform that provides one agent for all endpoints.

Zenith was built entirely on a foundation of AI technology and it uses proprietary machine learning algorithms to detect multiple attack vectors.

According to Ziften, the Zenith platform is able to: 

  • Prevent a full range of attacks on macOS and Linux systems, as well as Windows, simplifying endpoint security for all enterprise endpoints and eliminating the need for time-consuming system rollbacks and reimaging on all endpoints.
  • Detect advanced cyber-attacks on Linux and Windows based servers and VMs, alleviating business continuity concerns caused by AV and other threat prevention technologies. 
  • Use ML to simplify threat analysis and response. Rich machine learning data provides unparalleled visibility simplifying and speeding the human element of forensic investigations and incident response.

Attackers often use those vectors to breach corporate, government and industrial endpoints in a number of ways, including fireless malware and zero-day attacks. 

According to the Ponemon Institute’s 2017 State of Endpoint Security Risk Report, fileless and zero-day attacks account for 77% of security compromises.

“Expanding the use of our machine learning algorithms thoughout our Zenith endpoint protection platform, is another significant endpoint security step for our customers,” explains Ziften VP of product management, Logan Gilbert.

“Zenith’s endpoint hardening and advanced anti-virus capabilities maximize prevention of a full-range of threats on our customers’ endpoints.

Ziften Zenith provides one-agent protection for all endpoints including servers, cloud, desktops, and laptops. It provides advanced AV, detection and response, visibility, and hardening.

“Zenith’s endpoint detection and response functionality with continuous threat monitoring goes beyond helping customers stop cyber-breaches before damage or data loss can occur,” concludes Gilbert.

Story image
Check Point acquires Odo Security to bolster remote security offering
The deal will integrate Odo’s remote access software with Check Point’s Inifinity architecture, bolstering the latter company’s remote security capabilities in a time where working and learning from home has become the norm, and looks to largely remain that way in the near future.More
Story image
Ripple20 threat has potential for 'vast exploitation', ExtraHop researchers find
One in three IT environments are vulnerable to a cyber threat known as Ripple20. This is according to a new report from ExtraHop, a cloud-native network detection and response solutions provider. More
Story image
InternetNZ tackles increased cyberattacks with new partnership
"We want to arm our customers with the best possible defence against known threats on the Internet."More
Story image
NortonLifeLock introduces dark web monitoring to its security suite
Dark Web Monitoring Powered by LifeLock will be capable of monitoring the dark web, searching for over 120 personal identifiable information including email, physical address, phone number, driver licence number, credit card or bank account numbers and gamer tags.More
Story image
Evolving threat landscape top priority for security and risk leaders
"COVID-19 has proved how rapidly and how drastically such risks can change."More
Story image
CrowdStrike integrates with ServiceNow program to bolster incident response
As part of the move, users can now integrate device data from the CrowdStrike Falcon platform into their incident response process, allowing for the improvement of both the security and IT operation outcomes.More