SecurityBrief Asia logo
Asia's leading source of cybersecurity and cyber-attack news

Ziften stories

Story image
Endpoint Protection
Ziften extends proprietary AI/ML security across all endpoints
February 2019
AI and ML algorithms now work throughout all phases of the Zenith cybersecurity platform.
Story image
Cybersecurity
AI in cybersecurity stamping out menacing fileless attacks
January 2019
Ziften's Logan Gilber believes the difference between traditional and AI-based cybersecurity systems is a matter of “teaching” versus “learning”.
Story image
Endpoint Protection
A clear case for AI in endpoint protection
November 2018
Today, AV has an alternative, and it is Artificial Intelligence (AI).
Story image
Cybersecurity
Ziften marketing SVP talks Europe expansion and future of endpoint security
June 2018
​At InfoSec Europe in London we were able to sit down with a few members of the team from Ziften, including marketing SVP Roark Pollock.
Story image
Cloud
Microsoft welcomes Ziften as its newest 'Windows Defender' for macOS and Linux
June 2018
Ziften is now contributing macOS, Linux, and Windows support to the Windows Defender Advanced Threat Protection (ATP) advanced hunting project.
Story image
Cybersecurity
Ziften enters Germany and Netherlands to disrupt cybersecurity markets
May 2018
Ziften has expanded into European cybersecurity markets after announcing 2 major partnerships to carry its Microsoft Azure-powered endpoint solution.
Story image
Endpoint Protection
Ziften & Microsoft: The partnership bringing threat defence to almost every OS
May 2018
Ziften's partnership with Microsoft is making serious headway into bringing microsoft security technology into the heart of all operating systems.
Story image
Cybersecurity
Ziften moves into A/NZ with new partnership and appointment
March 2018
Ziften will be expanding into the A/NZ cybersecurity market with a new country manager and partnership, and a programme for onboarding new partners.
Story image
Cybercrime
Expert insights: Why visibility and forensics matter in cybersecurity
December 2017
​A Six-Point Checklist for making sure that your security teams have the capacity to track the root causes and progress of noxious malware
.