sb-as logo
Story image

Ziften extends proprietary AI/ML security across all endpoints

07 Feb 2019

Ziften, a cybersecurity firm that provides cloud-based endpoint protection and visibility for enterprise endpoints, is harnessing the power of proprietary machine learning that will support all phases of its endpoint security continuum.

While machine learning is often limited to solving siloed problems such as Windows endpoint threat prevention, Ziften took a different approach.

Its proprietary artificial intelligence (AI) and machine learning (ML) algorithms now work throughout all phases of Ziften Zenith, the company’s cybersecurity platform that provides one agent for all endpoints.

Zenith was built entirely on a foundation of AI technology and it uses proprietary machine learning algorithms to detect multiple attack vectors.

According to Ziften, the Zenith platform is able to: 

  • Prevent a full range of attacks on macOS and Linux systems, as well as Windows, simplifying endpoint security for all enterprise endpoints and eliminating the need for time-consuming system rollbacks and reimaging on all endpoints.
  • Detect advanced cyber-attacks on Linux and Windows based servers and VMs, alleviating business continuity concerns caused by AV and other threat prevention technologies. 
  • Use ML to simplify threat analysis and response. Rich machine learning data provides unparalleled visibility simplifying and speeding the human element of forensic investigations and incident response.

Attackers often use those vectors to breach corporate, government and industrial endpoints in a number of ways, including fireless malware and zero-day attacks. 

According to the Ponemon Institute’s 2017 State of Endpoint Security Risk Report, fileless and zero-day attacks account for 77% of security compromises.

“Expanding the use of our machine learning algorithms thoughout our Zenith endpoint protection platform, is another significant endpoint security step for our customers,” explains Ziften VP of product management, Logan Gilbert.

“Zenith’s endpoint hardening and advanced anti-virus capabilities maximize prevention of a full-range of threats on our customers’ endpoints.

Ziften Zenith provides one-agent protection for all endpoints including servers, cloud, desktops, and laptops. It provides advanced AV, detection and response, visibility, and hardening.

“Zenith’s endpoint detection and response functionality with continuous threat monitoring goes beyond helping customers stop cyber-breaches before damage or data loss can occur,” concludes Gilbert.

Story image
Over half of ransomware victims pay up - but does it work?
"Handing over money doesn’t guarantee the return of data, and only encourages cybercriminals to continue the practice."More
Story image
New wormable Android malware discovered through auto-replies in WhatsApp
Check Point Research has discovered new malware on Google’s Play Store that could spread through WhatsApp messages. More
Link image
Virtual demo: Diagnose network cabling problems with the LinkIQ Cable+Network Tester
If you’re finding it difficult to install access points and cabling, or if you can’t pinpoint an issue with a video camera or end user, the LinkIQ Cable+Network Tester could be exactly what you need. Try a free, fully interactive demo now.More
Story image
Exploits on organisations doubling every two to three hours after news of Microsoft Exchange’s four zero-day vulnerabilities
The race has started between hackers and security professionals following the disclosure of vulnerabilities on Microsoft Exchange Servers, according to Check Point Research.More
Story image
Attivo Networks expands Active Directory suite for greater protection
"We see Active Directory exploitation used in the majority of ransomware, insider and advanced attacks. We are pleased to now offer our customers early and efficient solutions for preventing the misuse of Active Directory.”More
Story image
ESET reveals APT groups exploiting Microsoft Exchange vulnerabilities
A number of advanced persistent threat (APT) groups are exploiting the latest Microsoft Exchange vulnerabilities, according to new ESET research.More