View

Sorting

Products found: 6

logo
Offer a reference bonus
0.00

Skybox Change Manager (CM)

Enterprises have to deal with a constant stream of firewall change requests. Despire the pressure that may be felt by the volume of those requests, or any implementation errors, it’s important that availability, security and compliance are not compromised. Skybox® Change Manager fully automates firewall change management workflows, including rule creation, recertification and deprovisioning. And its analytics–driven automation ensures each change is properly handled from request to implementation and verification. Change Manager delivers automated modeling capabilities to assess potential business impacts, and closed-loop rule life cycle management to verify that every change is executed as intended. With customized, automated workflows, IT security teams can improve change management efficiency by up to 80 percent.* With Skybox Change Manager, you can:
  • Fully automate firewall change management workflows, improving communication and efficiency across security teams
  • Validate proposed firewall changes by checking for access and rule policy violations, as well as new vulnerabilities
  • Use formalized tickets and closed-loop workflows to ensure changes match the original intent
  • Customize and simplify processes to reduce change management time by 80 percent*
  • Establish end-to-end rule life cycle management for secure infrastructure and optimized firewalls
Change Manager Benefits Fully Automates Firewall Change Workflows
  • Reduces the chance of human errors and rollbacks of incorrect changes
  • Enables customizable change workflow based on type of request
  • Ensures accurate change planning and implementation within the context of the network
  • Provides option for automated provisioning for select firewall changes
Simplifies and Formalizes Rule Recertification
  • Automates rule recertification workflow
  • Calculates change risk to inform decisions on when next to review rule
  • Streamlines review process by maintaining information on stakeholders
Assesses Risk and Compliance Issues of Proposed Changes
  • Identifies potential compliance issues and vulnerability exposures to new portions of the network a proposed change could introduce
  • Models change impact on network security and compliance before implementation
Ensures Change Compliance
  • Establishes a fully automated approval process from change request through implementation and verification
  • Delivers a complete and verifiable audit trail and change reconciliation report
  • Provides closed-loop change management capabilities to ensure all changes are implemented as intended
... Learn more
-
-
ROI-
-
11
18
logo
Offer a reference bonus
1.00

Skybox Firewall Assurance (FA)

Skybox® Firewall Assurance provides comprehensive automation of firewall management tasks across different firewall vendors and complex rulesets. It simplifies compliance management, ensuring the state of your network is always in line with security policy design. And Firewall Assurance supports implementation of DISA STIGs and CIS benchmarks. Skybox also helps reduce risk on firewalls themselves, so they can better protect your assets. With config data, OS versions and powerful analytics, Firewall Assurance can spot vulnerabilities on firewall devices. Designed as a complete firewall life cycle management solution, Firewall Assurance empowers you to:
  • Analyze virtual and cloud–based firewalls to better control east–west or north–south traffic
  • Detect security and compliance problems using out–of–the–box or customized policies
  • Track changes for continuous firewall monitoring
  • Clean up and optimize firewall rules
  • Normalize firewall rulesets for a consistent view across multiple vendors
FIREWALL ASSURANCE BENEFITS
  • Identify security policy violations and platform vulnerabilities on your firewalls
  • Get change recommendations to fix overly permissive rules through syslog and ACL data analysis
  • Analyze how network traffic could flow through a firewall
  • Automate firewall management for traditional, next–gen, virtual and cloud–based firewalls
When you’re responsible for keeping your network secure and firewalls compliant and optimized, you need to see how firewall rules and configurations impact your attack surface. Powerful analytics deliver accurate insights on–demand, and automated end–to–end rule life cycle management ensures continuous control of your firewalls. Delivers Continuous Detection of Security Threats and Compliance Risks
  • Highlights access policy violations and provides root cause analysis
  • Identifies rule conflicts and misconfigurations
  • Identifies vulnerabilities on firewalls
  • Incorporates compliance metrics and configuration analysis
Supports Next-Generation Firewalls
  • Supports next-generation firewall access and rule compliance at the user and application level
  • Shows the relationship between IPS signatures and vulnerability occurrences on assets, helping admins configure IPS signatures correctly
Provides Comprehensive Visibility and Reporting
  • Gives fast insight to how firewall risks impact your attack surface
  • Shows the relation between firewalls and zones on an interactive map
  • Automates reporting for firewall ruleset audits
Keeps Firewalls Continuously Optimized
  • Imports, combines and normalizes firewall data automatically from multiple vendors
  • Automates rule recertification to streamline rulesets and ensure compliance
  • Continuously monitors firewalls to eliminate security gaps
  • Targets redundant, hidden and obsolete rules for cleanup and optimization
... Learn more
-
ROI-
-
13
6
logo
Offer a reference bonus
1.00

Skybox Horizon

Skybox® Horizon gives security leaders a simple picture of their organization’s entire attack surface. But behind this picture is a heavily detailed, interactive model giving you fast insight to your biggest cyber risks. With this insight and systematic prioritization, you can quickly eliminate imminent threats, while continuously monitoring potential threats.
Horizon isn’t just a topology map. It’s the product of intelligence from the entire Skybox® Security Suite in a single pane of glass. Horizon provides an abstracted view of the deeper Skybox model that includes hybrid network topology — across on–prem, multi–cloud and operational technology (OT) environments — security controls, assets, vulnerabilities and threats.  BENEFITS OF SKYBOX HORIZON Unifies Data in a Simple Picture
  • Consolidates data silos from endpoint and network security products, including physical IT, multi–cloud and OT networks
  • Incorporates data provided by vendors and Skybox® Research Lab intelligence of exploits in the wild and available exploit code
  • Creates a map of servers, endpoints, security and networking devices and hybrid network topology and gives insights to security exposures
Pinpoints Indicators of Exposure
  • Quickly shows exposed vulnerabilities and vulnerability exploit status based on intelligence from the current threat landscape
  • Prioritizes IOEs to reflect the risk and likelihood of an attack
  • Filters IOEs by types and severity level for dynamic analysis
Minimizes Response Times to Contain Attacks Quickly
  • Identifies vulnerabilities that pose the most risk across the entire enterprise, based on your attack surface and the threat landscape
  • Distinguishes between real exposures and security issues that are effectively mitigated by compensating controls
  • Enables security leaders to direct resources to patching or remediating systems and applications most at risk
Delivers Security Status Information Useful to All Stakeholders
  • Develops a common understanding of risks and remediation priorities across technical and business groups
  • Justifies security investments to CEO and CFO
  • Tracks and reports on progress toward strategic security or compliance goals with IOE trends or historical comparisons
... Learn more
-
-
ROI-
-
5
20
logo
Offer a reference bonus
0.00

Skybox Network Assurance (NA)

Skybox® Network Assurance provides seamless visibility across physical IT, multi–cloud and operational technology (OT) environments, giving you the context needed to understand how network devices and security controls work together or leave you exposed. It continually ensures that the existing access in your infrastructure doesn’t exceed the desired access designed in your policies, and uncovers potential attack vectors, including those that could be used in lateral movement. Designed to support large and complex enterprise networks, Network Assurance empowers you to:
  • Visualize and interact with a model of your entire network topology, assets and security controls
  • Keep security zones and device configurations in continuous compliance and working to reduce your attack surface
  • Troubleshoot network connectivity and identify root causes of network outages to ensure business continuity and continuous uptime
When managing a complex network environment — whether on–prem or in the cloud — you need to understand what the human eye can’t see. Network Assurance creates a model of your network so you can easily visualize complex security zones, network paths, compliance violations and configuration issues. And Network Assurance helps you focus on high–impact issues requiring immediate action to ensure continuous availability, security and compliance. BENEFITS Delivers Continuous Detection of Security Threats and Compliance Risks
  • Collects data from 130+ network and security devices (see the full list on our website)
  • Displays detailed, normalized configurations of firewalls and routers, as well as virtual assets
  • Creates a network topology map that unifies traditional IT, public and private clouds and OT networks that can be exported to Microsoft Visio
Speeds Network Troubleshooting to Keep Business Services Running 24/7
  • Minimizes downtime by reducing network configuration errors
  • Troubleshoots network device configurations and previews changes before implementation
  • Identifies root causes of outages quickly and accurately
  • Improves visibility and workflow for network security teams
Uncovers Access Issues and Attack Vectors
  • Correlates all ACLs (including those for cloud assets), security tags, routing rules, NAT, proxies, VPNs and more to find blocked or allowed access
  • Incorporates asset vulnerability data for physical or virtual machines in network path analysis
  • Analyzes network paths in public and private cloud environments for both north–south and east–west traffic
Maintains Continuous Compliance
  • Performs continuous compliance analysis for configurations and security zone policies
  • Normalizes security tags and other access rules throughout hybrid networks
  • Enables security policy customization
... Learn more
-
ROI-
-
13
12
logo
Offer a reference bonus
0.00

Skybox Security Suite

The Skybox® Security Suite is a cyber risk management platform built to conquer security challenges in complex enterprise networks. By integrating with more than 120 networking and security technologies, the Suite gives exceptional and seamless visibility across physical IT, multi–cloud and OT networks. Our analytics and intelligence provide the context needed to bridge the gaps between point solutions, so security teams can fulfill the goals of vulnerability, threat, firewall and security policy management programs — even in the world’s largest organizations. TOTAL VISIBILITY See everything in your hybrid network in one view Skybox analyzes information from your organization’s assets and networks to provide a contextual understanding of your risk of cyberattack so you can proactively address that risk. Collecting data from a variety of sources, Skybox builds a model encompassing your:
  • Network topology (routers, load balancers, switches)
  • Security controls (firewalls, IPS, VPN)
  • Assets (servers, workstations, networks including traditional IT, multi–cloud and OT)
  • Vulnerabilities and threats
The model is regularly and automatically updated to reflect the actual state of your network. THREAT–CENTRIC VULNERABILITY MANAGEMENT Stop chasing the wrong vulnerabilities Skybox takes a fundamentally different approach to vulnerability management. Using asset, network and threat context, we focus remediation on vulnerabilities most likely to be attacked: those with active exploits in the wild and exposed in your environment. Skybox analyzes multiple factors to prioritize remediation, including:
  • Vulnerability severity
  • Compliance
  • Age
  • Location
  • Exploitability
  • Prevalence (density)
  • Asset role
  • Asset value
  • Threats
  • Network topology
  • Security controls
SECURITY POLICY MANAGEMENT Automate and orchestrate across your entire network Skybox delivers automated tasks and workflows to simplify and centralize security policy management across traditional IT, multi–cloud and OT networks.
  • Create analytics–driven, automated processes that scale and adapt to a growing network
  • Ensure firewall rules and security policies enable reliable connectivity and continuous compliance — without exposing the organization to risky attack vectors
  • Streamline the creation of new firewall rules and efficiently manage rule recertification
  • Perform same–day audits and simplify reporting
The Suite includes 5 modules and Research Lab’s intelligence feed on a common platform. Modules can be licensed individually or together:
  • Skybox® Vulnerability Control
  • Skybox® Change Manager
  • Skybox® Firewall Assurance
  • Skybox® Network Assurance
  • Skybox® Horizon
  • Skybox® Research Lab
... Learn more
-
-
ROI-
-
7
11
logo
Offer a reference bonus
0.00

Skybox Vulnerability Control (VC)

Skybox® Vulnerability Control supports a systematic approach to vulnerability management unlike any other vendor. Our solution is rooted in simplifying vulnerability management, using context to analyze, prioritize and remediate your riskiest vulnerabilities quickly.
  • Centralize and enhance vulnerability management processes from discovery to prioritization and remediation
  • Harness the power of your data — from vulnerabilities and asset data, to your network topology and security controls
  • Use network modeling and attack simulation to find exposed vulnerabilities
  • Contextualize vulnerability data with up–to–date intelligence of the current threat landscape
  • Know your best available remediation options, including patching, IPS signatures and network–based changes
New vulnerabilities are surfacing on your network daily, and the threat landscape is in a constant state of change. You need to be sure that your resources are focused on responding to the riskiest vulnerabilities before attackers find them. Vulnerability Control gives visibility to your network infrastructure and assets, adding intelligence of current threat landscape to help pinpoint exposed vulnerabilities with active exploits in the wild. Skybox puts intelligence at your fingertips: automated data collection, modeling, simulation and analysis help you make the best proactive response — in a fraction of the time of manual approaches. Risk-Based Vulnerability Management Vulnerability Control is at the heart of Skybox’s unique approach to riskbased vulnerability management.
It starts with fresh vulnerability data. Skybox uses a wide range of sources, including asset and patch management systems and network devices, to assess vulnerabilities without requiring a scan. We can also collect, centralize and merge data from multiple scanners to give you the most accurate vulnerability assessments on demand — for on–premises, multi–cloud and operational technology (OT) networks. We add context to vulnerability data via our threat intelligence feed, delivering information from the Skybox® Research Lab on vulnerability details, threat intelligence and remediation options. Data is further contextualized by correlating it to a model of your hybrid network topology, security controls and assets. With this model and our attack simulation capabilities, Skybox identifies vulnerable assets exposed to threat origins anywhere in your network. Our remediation guidance enables you to focus on these exposed vulnerabilities as well as those actively exploited in the wild. And because of our network insight, remediation options aren’t limited to just patching; Skybox informs you of IPS signatures and helps plan network–based changes that cut off vulnerable assets from attack paths. Exposure Analysis and Threat Intelligence
  • Identifies exposed vulnerabilities using the network model and multi–step attack simulations
  • Highlights vulnerabilities with exploits available, active exploits or packaged in distributed crimeware such as ransomware, exploit kits, etc.
  • Cross references exposed and exploitable vulnerabilities to focus action on the most critical risks
  • Assigns critical risk scores to exposed and exploited vulnerabilities and the assets and groups that host them
Intelligent Remediation and Fast Threat Response
  • Informs you of available patches and prioritizes patches based on their effectiveness of risk reduction
  • Mitigates vulnerability risk by alerting you to IPS signatures and helping to plan configuration and ACL changes
  • Recommends the best remediation actions to eliminate imminent threats in hours, instead of days
  • Optimizes gradual risk reduction to systematically ensure potential threats don’t escalate
Quantifiable Risk Reduction
  • Measures remediation effectiveness with customized risk metrics
  • Assigns risk scores to vulnerabilities, assets and groups that can be tracked over time
  • Provides fully customizable reporting — use any data or widget and export as CSV, PDF or HTML
... Learn more
-
ROI-
-
14
13