Chuck Leaver – Ziften Do Extensibility While Others Can’t

Written By Chuck Leaver Ziften CEO


Whether you call them extensions, or call them customizations – no matter what they are called, the very best innovation platforms can be customized to fit a company’s particular service requirements. Generic operations tools are great at carrying out generic operations jobs. Generic security tools are great at addressing generic security difficulties. Generic can just take you so far, though, and that’s where extensibility takes over.

Extensibility shows up typically when I’m speaking to clients and potential customers, and I’m proud that a Global 10 business chose Ziften over everybody else in the market primarily on that basis. For that customer, and numerous others, the capability to deeply tailor platforms is a requirement.

This isn’t really about merely creating customized reports or customized signals. Let’s be honest – the ability to create reports are baseline ability of lots of IT operations and security management tools. True extensibility goes deep into the service to offer it capabilities that resolve genuine issues for the organization.

One customer used great deals of mobile IoT devices, and had to have our Zenith real-time visibility and control system have the ability to gain access to (and monitor) the memory of those devices. That’s not a basic function offered by Zenith, because our low-footprint agent does not hook into the operating system kernel or operate through standard device drivers. Nevertheless, we worked with the client to customize Zenith with that ability – and it ended up being simpler than anyone imagined.

Another client took a look at the basic set of end point data that the agent gathers, and wanted to include extra data fields. They also wished to setup the administrative console with custom actions utilizing those data fields, and push those actions back out to those end points. No other endpoint monitoring and security service could supply the facilities for including that functionality besides Ziften.

What’s more, the customer developed those extensions themselves … and owns the code and IP. It belongs to their own secret sauce, their own organization differentiator, and unique to their business. They could not be any more happy. And neither are we.

With many other IT operations and security systems, if clients desire additional features or capabilities, the only alternative is to submit that as a future feature demand, and hope that it appears in an approaching release of the solution. Till then, regrettable.

That’s not how we created our flagship products, Zenith and ZFlow. Due to the fact that our end point agent isn’t really based upon kernel hooks or device drivers, we can allow for incredible extensibility, and open that extensibility for customers to gain access to directly.

Likewise, with our administrative consoles and back end tracking systems; everything is customizable. And that was built in right from the start.

Another aspect of personalization is that our real time and historic visibility database can integrate into your other IT operations and security platforms, such as SIEM tools, danger intelligence, IT ticketing system, task orchestration systems, and data analytics. With Zenith and ZFlow, there are no silos. Ever.

When it comes to endpoint monitoring and management, extensions are progressively where it’s at. IT operations and business security teams require the capability to customize their tools platforms to fit their specific requirements for tracking and handling IoT, traditional endpoints, the data center, and the cloud. In lots of client conversations, our integrated extensibility has triggered eyes to illuminate, and won us trials and implementations. Tell us about your custom-made needs, and let’s see exactly what we can do.