London, England: Ziften, a player in endpoint protection plus visibility and hardening, today announced its entry into the UK and Irish cybersecurity markets with IT security specialist Threatscape to assist with delivering, supporting, and managing the Ziften Zenith endpoint protection platform. Threatscape becomes the newest partner in Ziften’s Activate Partner Program.
This follows Ziften’s strategic collaboration announcement with Microsoft providing customers with endpoint security to protect, detect, investigate, and respond to advanced cyber-attacks on Windows, macOS, and Linux endpoints.
“Ziften’s number one priority is working with our partners for joint customer success,” said Greg McCreight, SVP Worldwide Channels, Ziften. “With our Fast Start program, we provide expedited on-boarding to Microsoft channel partners, enabling them to solve customer’s endpoint security challenges. Threatscape is our first joint Microsoft partner in the UK andIreland, and together we can achieve quick market success.”
“As a Microsoft security partner, we’re pleased to partner with Ziften offering their Zenith end point protection platform with Windows Defender ATP,” said Spencer Berry, UK Country Manager, Threatscape. “Our customers will immediately benefit from the integration givingthem protection and deep visibility on Windows, macOS, and Linux systems. We expect quick success promoting the distinctive Ziften product with our implementation, support, and management services.”
Together, Ziften, Threatscape and Microsoft help organizations prevent, detect, and respond to cyber-attacks. The integrated solution gives customers the ability to:
-Extend Windows Defender ATP to macOS and Linux Systems: Customers can extend post-breach detection, investigation, and response to any asset – laptops, desktops,servers, and cloud VMs.
-Secure Windows and Linux Cloud Environments: Organizations can readily overcome cloud monitoring and security concerns for all virtual systems deployed across any cloudservice provider.
-Conduct 6 Month, Lookback Forensics: Customers can instantly search 6 months of rich machine timeline unifying security events from Windows, macOS, and Linux systems.