“There is huge demand for endpoint systems and security operations solutions that deliver holistic risk management, and threat detection and response. But we find many organizations’ lack of resources, or security expertise limits their ability to implement these meaningful technologies.”
AUSTIN, TEXAS (PRWEB)
September 28, 2017
It is no longer a matter of debate – organizations that use the Internet are experiencing cyber-attacks. And without the right tools and expertise, the duration and impact of any breach can be dramatically increased. Organizations need to improve threat detection and incident response capabilities; but, many lack the necessary people, processes, and technologies. To address this challenge, Ziften, the leading provider of all-the-time visibility and control for client devices, servers, and cloud VMs, today announced the introduction of turnkey managed detection and response (MDR) services to augment customer IT and security operations teams.
“According to our recent “Trends in Endpoint Security Study”, sponsored by Ziften and other technology vendors, 51% of respondents report they are looking to deploy endpoint detection and response (EDR) solutions in the next 12-24 months, or they are starting to use EDR on a limited basis,” said Doug Cahill, Senior Analyst at Enterprise Strategy Group (ESG). “Further, 35% of organizations who are using or plan to use a managed security service for any aspect of endpoint security are using, or plan to use managed services for their implementation of EDR.”
“So, while EDR technologies are critical in today’s cyber security tool suite, many organizations simply lack the scale or expertise to implement these tools, but Ziften’s new services portfolio promises to address these EDR challenges for companies with capability or resource constraints,” said Mr. Cahill.
Managed Assess Service
Ziften today announced its new Managed Assess Service for periodically assessing and improving IT and security operations outcomes. Ziften provides “tried and true” assessment processes and actionable reporting and outcomes looking at asset management, asset performance, licensing, vulnerability state, policy compliance, anomalous behaviors, and other security concerns. These short-term assessments…