Ziften adds AV to the Zenith endpoint protection platform to stop attacks
Ziften announced its Zenith endpoint protection platform now includes AV protecting all enterprise endpoints from known and unknown targeted attacks.
Ziften helps enterprises simplify endpoint protection plus visibility. Zenith is the cyber security platform that provides one agent for all endpoints – laptops, desktops, servers, and cloud – preventing multi-vector attacks with advanced AV, detection and response, plus visibility and hardening.
Attackers have created a criminal industry by attacking vulnerable enterprise endpoints. And traditional AV only prevents known malware, accounting for only 30% of enterprise breaches.
The Zenith endpoint protection platform with AV stops a range of known and unknown cyber-attacks from ransomware, to weaponized documents, and in-memory attacks before system infection and damage can occur.
The new Zenith AV element:
- Blocks file-based, fileless, and in-memory attacks eliminating the need for time-consuming system rollbacks and reimaging. Blocking file-based attacks is not sufficient. Fileless attacks now account for 77% of compromises.
- Prevents zero-day and permutated malware attacks minimizing the need for detection and response activities. Signature-based AV just doesn’t get the job done in preventing zero-day attacks and altered malware.
- Effective through multiple attack masking techniques such as packing, obfuscation, mutation, dead-code insertion, and encrypted malware.
- Powered by the cloud and AI, leveraging proprietary algorithms to detect attack vectors used to breach corporate, government, and industrial endpoints.
“There are huge leaps coming in the field of endpoint protection, and the incorporation of our new AI-based AV capability is the first of many that Ziften has planned,” said Mike Hamilton, CEO, Ziften.
“I believe Ziften is the only endpoint security vendor to provide full-featured endpoint protection plus continuous endpoint monitoring and posture hardening. This new AV capability and our endpoint hardening will dramatically simplify the complex work of those tired teams who actually have to respond to endpoint attacks at 3:30am in the morning!”