Best Women Inspiring Leaders of the Year 2022
CIO Bulletin
Prevent breaches before they happen. Get the intelligence and context you need to reduce cyber exposure at speed and scale. Skybox Security is the only platform that collectively visualizes and analyzes hybrid and multi-cloud networks, providing full context and understanding of the attack surface. Global enterprises and governments rely on us to maintain compliance, reduce cyber exposure, minimize business risk, and prevent breaches.
Skybox Security Posture Management Platform
The Skybox platform aggregates essential data from a wide range of security, cloud, and network technologies to create a network model that visualizes all security controls and network configurations. With the model, Skybox conducts exposure analysis to determine which attack vectors or network paths could be used to gain access to vulnerable systems. Next, they uniquely calculate risk scores by factoring in CVSS severity, exploitability, asset importance, and asset exposure. Then, they offer the best remediation options based on risk and business impact assessments.
Skybox platform features and benefits
Attack surface visibility and context: Skybox’s platform provides security and IT teams with the ability to visualize and analyze hybrid, multi-cloud, and OT networks, providing full context and understanding of the entire attack surface.
Network model: Skybox’s multidimensional model visualizes all security controls and network configurations across your environment, providing the intelligence and context you need to prevent security breaches. Network maps only show physical connections of devices, while network modeling simulates all possible interactions, analyzes security efficacy, and identifies exposure and compliance risk.
Path analysis: Skybox’s network model aggregates data from physical, public cloud, private cloud, and OT networks to provide accurate path analysis across the most complex environments. They map how packets move across devices from the source destination and document any policies, security controls, ports, protocols, or applications that allow packet movement.
Attack simulation: Scanners won’t help you anticipate what a threat actor might do. But Skybox can. Their attack simulations attempt to exploit all vulnerabilities on all assets (even unscannable). Administrators can view simulation results from multiple perspectives, such as threat origin, network segment, business unit, or asset, to determine the best remediation approach.
Risk scoring: Most risk scoring is incomplete and therefore inaccurate. Skybox calculates risk scores by factoring four critical variables, including CVSS severity, asset exploitability, asset importance, and asset exposure that is based on the security controls and configurations in place across the network.
Exposure-based vulnerability prioritization: Skybox’s exposure-based prioritization surpasses traditional vulnerability assessments because they calculate the exposure risk. This allows security teams to identify where they are most prone to a cyberattacks and focus remediation efforts accordingly.
Vulnerability and Threat Management: Discover vulnerabilities, prioritize based on exposure-based risk scores, and close with prescriptive remediation options. Increase vulnerability assessment accuracy, prioritize, and identify optimal remediation options, and reduce overall business risk with Skybox. They aggregate a wide range of data from scanners, security and network infrastructure, various configuration databases, non-scannable assets and more. By viewing vulnerabilities simultaneously through multiple lenses — CVSS severity, asset importance, exploitability, and exposure — they give you the power to target action where it matters most, proactively reducing your risk of attack.
83% of organizations with OT assets suffered at least one security breach in the past 36 months
Find the unfindable
Discover vulnerabilities that scanners can’t reach. Analyze paths that an attacker could take to any destination across hybrid networks. Identify exposed vulnerabilities anywhere in your OT infrastructure.
Foresee the unseeable
Assess and prioritize where to focus limited resources on the areas where an attack could cause the greatest damage. See beyond basic CVSS scores. Accurately assess your risk by factoring actual exposure, exploitability, and asset importance.
Fix the unfixable
Patching not an option? Get alternative vulnerability remediation options, including applying IPS signatures, modifying access rules, optimizing policies, updating device configurations, and more.
Leave no stone unturned
Complex environments with multiple technologies make it difficult to discover all vulnerabilities. Don’t overlook high-risk vulnerabilities. Skybox combines their threat intelligence with vulnerability data collected from multiple sources including active scanners, security, cloud, network technologies, CMDBs, and endpoints.
Vulnerability assessment and prioritization
Assess and prioritize remediation efforts based on the industry’s most precise risk scores. Skybox calculates risk based on CVSS severity, exploitability, asset importance, and exposure.
Threat Intelligence Service (Product features and benefits)
Detect firewall vulnerabilities: Gain visibility into vulnerabilities, including a list of vulnerabilities per firewall device along with severity and mitigation options. Act quickly to remediate firewall vulnerabilities and mitigate potential breaches.
Detect network device vulnerabilities: Gain visibility into network device vulnerabilities in traditional, hybrid, and cloud networks. See a list of vulnerabilities per queried access path along with severity. Mitigate attacks that use lateral movement by analyzing the path from the point of egress to the organization network or from a network within the environment.
Assess the risk of network changes: Attain visibility and understanding of how network changes impact security. With aggregated vulnerability data at your fingertips, you can proactively identify potentially exposed vulnerabilities based on proposed network changes.
Access threat intelligence sources
Get automatically aggregated threat data from the National Vulnerability Database, published vulnerability repositories, vulnerability scanners, threat intelligence feeds and platforms, vendor IPS signatures, and more.
Identify and integrate
Identify vulnerabilities in standard operating systems, software versions, product configurations, and databases. Integrate intelligence data with vulnerability analysis to find exploitable and exposed assets.
Correlate and model
Correlate vulnerabilities in the environment with those being actively exploited in the wild. Model your network topology and determine where assets are exposed.
Firewall Assurance
Product features and benefits
Connect and centralize: Centrally manage traditional, next–gen, virtual, and cloud–based firewalls and secure access service edge (SASE) solutions from multiple vendors. Manage east–west and north–south traffic easily and effectively
Automate and optimize: Automate and improve cyber hygiene tasks, including logging, configuration, and change tracking. Find and eliminate redundant, shadowed, or overly permissive firewall rules. Conduct rule usage analysis, optimize rules, and complete faster rule set audits. Automate and customize firewall reporting.
Improve security and reduce compliance risk: Detect access policy violations, rule conflicts, and misconfigurations. Ensure compliance for configurations, rules, and firewall access. Identify vulnerabilities within your firewalls and mitigate potential exploits leveraging Skybox Threat Intelligence.
Firewall vulnerability detection and risk mitigation: By analyzing configuration data and OS versions against the Skybox intelligence service, Firewall Assurance can spot platform vulnerabilities on firewall devices.
Rule base optimization: Firewall Assurance has all you need to ensure clean, optimized, and compliant security controls and network devices. Automate firewall audits to find unused, shadowed, and redundant rules to improve analysis and firewall performance.
Firewall rule usage optimization: With Firewall Assurance you can identify unused rules and redundancies, along with rules that can be simplified, to improve firewall security and speed up troubleshooting. Comprehensive rule life cycle management means that firewall rule sets stay clean.
Gidi Cohen, Chief Executive Officer and Founder
Gidi Cohen co-founded Skybox in 2002 and has guided the company’s vision and development as the leader in cybersecurity analytics. A respected innovator in the security analytics space, he is a popular speaker at industry conferences worldwide, demonstrating how sophisticated analytics, modeling and simulation, as well as unprecedented network visibility, are used to reduce an enterprise’s attack surface. For more than 10 years he has been committed to empowering security leaders to quickly and accurately prioritize and address vulnerabilities and threats with cutting-edge Skybox solutions.
Banking-and-finance
Artificial-intelligence
Travel-and-hospitality
Management-consulting
Banking-and-finance
Banking-and-finance
Food-and-beverage
Travel-and-hospitality
Food-and-beverage