Chuck Leaver – Zero Day Exploits And Attack Prevention Through Our Collaboration With Microsoft

Written By David Shefter And Presented By Chuck Leaver


This week we announced a collaboration with Microsoft that combines Ziften’s Zenith ® systems and security operations platform, and Windows Defender Advanced Threat Protection (ATP) delivering a cloud based, “single pane of glass” to spot, see, examine, and respond to innovative cyber attacks and breaches on Windows, macOS, and Linux-based devices (desktops, laptop computers, servers, cloud, etc).

Windows Defender ATP plus Ziften Zenith is a security service that enables enterprise consumers to find, examine, respond and remediate advanced threats on their networks, off-network, and in the data center and cloud.

Imagine a single option across all the devices in your business, offering scalable, state of the art security in a cost-efficient and easy to use platform. Making it possible for business throughout the world to secure and manage devices through this ‘single pane of glass’ provides the pledge of lower functional costs with real boosted security delivering real time global danger protection with details collected from billions of devices worldwide.

Microsoft and Ziften Architecture

The image listed below offers an introduction of the service parts and integration struck between Windows Defender ATP and Ziften Zenith.

Endpoint examination abilities let you drill down into security signals and comprehend the scope and nature of a prospective breach. You can submit files for deep analysis, get the results and take action without leaving the Windows Defender ATP console.

Identify and Contain Dangers

With the Windows Defender ATP and Ziften Zenith integration, organizations can easily spot and contain hazards on Windows, macOS, and Linux systems from a single console. Windows Defender ATP and Ziften Zenith provide:

Behavior-based, cloud-powered, innovative attack detection. Find the attacks that make it past all other defenses (post breach detection).

Abundant timeline for forensic investigation and mitigation. Quickly examine the scope of any breach or believed behaviors on any machine through an abundant, 6-month device timeline.

Built in special risk intelligence knowledge base. Risk intelligence to quickly find attacks based on monitoring and data from billions of devices.

The diagram shown below shows many of the macOS and Linux threat detection and response abilities now available with Windows Defender ATP.

At the end of the day, if you’re planning to protect your end points and infrastructure, you need to take a tough look at Windows Defender ATP and Ziften Zenith.