View
Sorting
From A to Z
Products found: 6
Skybox Change Manager (CM)
Enterprises have to deal with a constant stream of firewall change requests. Despire the pressure that may be felt by the volume of those requests, or any implementation errors, it’s important that availability, security and compliance are not compromised. Skybox® Change Manager fully automates firewall change management workflows, including rule creation, recertification and deprovisioning. And its analytics–driven automation ensures each change is properly handled from request to implementation and verification.
Change Manager delivers automated modeling capabilities to assess potential business impacts, and closed-loop rule life cycle management to verify that every change is executed as intended. With customized, automated workflows, IT security teams can improve change management efficiency by up to 80 percent.*
With Skybox Change Manager, you can:
- Fully automate firewall change management workflows, improving communication and efficiency across security teams
- Validate proposed firewall changes by checking for access and rule policy violations, as well as new vulnerabilities
- Use formalized tickets and closed-loop workflows to ensure changes match the original intent
- Customize and simplify processes to reduce change management time by 80 percent*
- Establish end-to-end rule life cycle management for secure infrastructure and optimized firewalls
- Reduces the chance of human errors and rollbacks of incorrect changes
- Enables customizable change workflow based on type of request
- Ensures accurate change planning and implementation within the context of the network
- Provides option for automated provisioning for select firewall changes
- Automates rule recertification workflow
- Calculates change risk to inform decisions on when next to review rule
- Streamlines review process by maintaining information on stakeholders
- Identifies potential compliance issues and vulnerability exposures to new portions of the network a proposed change could introduce
- Models change impact on network security and compliance before implementation
- Establishes a fully automated approval process from change request through implementation and verification
- Delivers a complete and verifiable audit trail and change reconciliation report
- Provides closed-loop change management capabilities to ensure all changes are implemented as intended
-
-
ROI-
-
11
18
Skybox Firewall Assurance (FA)
Skybox® Firewall Assurance provides comprehensive automation of firewall management tasks across different firewall vendors and complex rulesets. It simplifies compliance management, ensuring the state of your network is always in line with security policy design. And Firewall Assurance supports implementation of DISA STIGs and CIS benchmarks.
Skybox also helps reduce risk on firewalls themselves, so they can better protect your assets. With config data, OS versions and powerful analytics, Firewall Assurance can spot vulnerabilities on firewall devices.
Designed as a complete firewall life cycle management solution, Firewall Assurance empowers you to:
- Analyze virtual and cloud–based firewalls to better control east–west or north–south traffic
- Detect security and compliance problems using out–of–the–box or customized policies
- Track changes for continuous firewall monitoring
- Clean up and optimize firewall rules
- Normalize firewall rulesets for a consistent view across multiple vendors
- Identify security policy violations and platform vulnerabilities on your firewalls
- Get change recommendations to fix overly permissive rules through syslog and ACL data analysis
- Analyze how network traffic could flow through a firewall
- Automate firewall management for traditional, next–gen, virtual and cloud–based firewalls
- Highlights access policy violations and provides root cause analysis
- Identifies rule conflicts and misconfigurations
- Identifies vulnerabilities on firewalls
- Incorporates compliance metrics and configuration analysis
- Supports next-generation firewall access and rule compliance at the user and application level
- Shows the relationship between IPS signatures and vulnerability occurrences on assets, helping admins configure IPS signatures correctly
- Gives fast insight to how firewall risks impact your attack surface
- Shows the relation between firewalls and zones on an interactive map
- Automates reporting for firewall ruleset audits
- Imports, combines and normalizes firewall data automatically from multiple vendors
- Automates rule recertification to streamline rulesets and ensure compliance
- Continuously monitors firewalls to eliminate security gaps
- Targets redundant, hidden and obsolete rules for cleanup and optimization
Skybox Horizon
Skybox® Horizon gives security leaders a simple picture of their organization’s entire attack surface. But behind this picture is a heavily detailed, interactive model giving you fast insight to your biggest cyber risks.
With this insight and systematic prioritization, you can quickly eliminate imminent threats, while continuously monitoring potential threats.
Horizon isn’t just a topology map. It’s the product of intelligence from the entire Skybox® Security Suite in a single pane of glass. Horizon provides an abstracted view of the deeper Skybox model that includes hybrid network topology — across on–prem, multi–cloud and operational technology (OT) environments — security controls, assets, vulnerabilities and threats. BENEFITS OF SKYBOX HORIZON Unifies Data in a Simple Picture
Horizon isn’t just a topology map. It’s the product of intelligence from the entire Skybox® Security Suite in a single pane of glass. Horizon provides an abstracted view of the deeper Skybox model that includes hybrid network topology — across on–prem, multi–cloud and operational technology (OT) environments — security controls, assets, vulnerabilities and threats. BENEFITS OF SKYBOX HORIZON Unifies Data in a Simple Picture
- Consolidates data silos from endpoint and network security products, including physical IT, multi–cloud and OT networks
- Incorporates data provided by vendors and Skybox® Research Lab intelligence of exploits in the wild and available exploit code
- Creates a map of servers, endpoints, security and networking devices and hybrid network topology and gives insights to security exposures
- Quickly shows exposed vulnerabilities and vulnerability exploit status based on intelligence from the current threat landscape
- Prioritizes IOEs to reflect the risk and likelihood of an attack
- Filters IOEs by types and severity level for dynamic analysis
- Identifies vulnerabilities that pose the most risk across the entire enterprise, based on your attack surface and the threat landscape
- Distinguishes between real exposures and security issues that are effectively mitigated by compensating controls
- Enables security leaders to direct resources to patching or remediating systems and applications most at risk
- Develops a common understanding of risks and remediation priorities across technical and business groups
- Justifies security investments to CEO and CFO
- Tracks and reports on progress toward strategic security or compliance goals with IOE trends or historical comparisons
-
-
ROI-
-
5
20
Skybox Network Assurance (NA)
Skybox® Network Assurance provides seamless visibility across physical IT, multi–cloud and operational technology (OT) environments, giving you the context needed to understand how network devices and security controls work together or leave you exposed. It continually ensures that the existing access in your infrastructure doesn’t exceed the desired access designed in your policies, and uncovers potential attack vectors, including those that could be used in lateral movement. Designed to support large and complex enterprise networks, Network Assurance empowers you to:
- Visualize and interact with a model of your entire network topology, assets and security controls
- Keep security zones and device configurations in continuous compliance and working to reduce your attack surface
- Troubleshoot network connectivity and identify root causes of network outages to ensure business continuity and continuous uptime
- Collects data from 130+ network and security devices (see the full list on our website)
- Displays detailed, normalized configurations of firewalls and routers, as well as virtual assets
- Creates a network topology map that unifies traditional IT, public and private clouds and OT networks that can be exported to Microsoft Visio
- Minimizes downtime by reducing network configuration errors
- Troubleshoots network device configurations and previews changes before implementation
- Identifies root causes of outages quickly and accurately
- Improves visibility and workflow for network security teams
- Correlates all ACLs (including those for cloud assets), security tags, routing rules, NAT, proxies, VPNs and more to find blocked or allowed access
- Incorporates asset vulnerability data for physical or virtual machines in network path analysis
- Analyzes network paths in public and private cloud environments for both north–south and east–west traffic
- Performs continuous compliance analysis for configurations and security zone policies
- Normalizes security tags and other access rules throughout hybrid networks
- Enables security policy customization
Skybox Security Suite
The Skybox® Security Suite is a cyber risk management platform built to conquer security challenges in complex enterprise networks.
By integrating with more than 120 networking and security technologies, the Suite gives exceptional and seamless visibility across physical IT, multi–cloud and OT networks. Our analytics and intelligence provide the context needed to bridge the gaps between point solutions, so security teams can fulfill the goals of vulnerability, threat, firewall and security policy management programs — even in the world’s largest organizations.
TOTAL VISIBILITY
See everything in your hybrid network in one view
Skybox analyzes information from your organization’s assets and networks to provide a contextual understanding of your risk of cyberattack so you can proactively address that risk. Collecting data from a variety of sources,
Skybox builds a model encompassing your:
- Network topology (routers, load balancers, switches)
- Security controls (firewalls, IPS, VPN)
- Assets (servers, workstations, networks including traditional IT, multi–cloud and OT)
- Vulnerabilities and threats
- Vulnerability severity
- Compliance
- Age
- Location
- Exploitability
- Prevalence (density)
- Asset role
- Asset value
- Threats
- Network topology
- Security controls
- Create analytics–driven, automated processes that scale and adapt to a growing network
- Ensure firewall rules and security policies enable reliable connectivity and continuous compliance — without exposing the organization to risky attack vectors
- Streamline the creation of new firewall rules and efficiently manage rule recertification
- Perform same–day audits and simplify reporting
- Skybox® Vulnerability Control
- Skybox® Change Manager
- Skybox® Firewall Assurance
- Skybox® Network Assurance
- Skybox® Horizon
- Skybox® Research Lab
-
-
ROI-
-
7
11
Skybox Vulnerability Control (VC)
Skybox® Vulnerability Control supports a systematic approach to vulnerability management unlike any other vendor. Our solution is rooted in simplifying vulnerability management, using context to analyze, prioritize and remediate your riskiest vulnerabilities quickly.
It starts with fresh vulnerability data. Skybox uses a wide range of sources, including asset and patch management systems and network devices, to assess vulnerabilities without requiring a scan. We can also collect, centralize and merge data from multiple scanners to give you the most accurate vulnerability assessments on demand — for on–premises, multi–cloud and operational technology (OT) networks. We add context to vulnerability data via our threat intelligence feed, delivering information from the Skybox® Research Lab on vulnerability details, threat intelligence and remediation options. Data is further contextualized by correlating it to a model of your hybrid network topology, security controls and assets. With this model and our attack simulation capabilities, Skybox identifies vulnerable assets exposed to threat origins anywhere in your network. Our remediation guidance enables you to focus on these exposed vulnerabilities as well as those actively exploited in the wild. And because of our network insight, remediation options aren’t limited to just patching; Skybox informs you of IPS signatures and helps plan network–based changes that cut off vulnerable assets from attack paths. Exposure Analysis and Threat Intelligence
- Centralize and enhance vulnerability management processes from discovery to prioritization and remediation
- Harness the power of your data — from vulnerabilities and asset data, to your network topology and security controls
- Use network modeling and attack simulation to find exposed vulnerabilities
- Contextualize vulnerability data with up–to–date intelligence of the current threat landscape
- Know your best available remediation options, including patching, IPS signatures and network–based changes
It starts with fresh vulnerability data. Skybox uses a wide range of sources, including asset and patch management systems and network devices, to assess vulnerabilities without requiring a scan. We can also collect, centralize and merge data from multiple scanners to give you the most accurate vulnerability assessments on demand — for on–premises, multi–cloud and operational technology (OT) networks. We add context to vulnerability data via our threat intelligence feed, delivering information from the Skybox® Research Lab on vulnerability details, threat intelligence and remediation options. Data is further contextualized by correlating it to a model of your hybrid network topology, security controls and assets. With this model and our attack simulation capabilities, Skybox identifies vulnerable assets exposed to threat origins anywhere in your network. Our remediation guidance enables you to focus on these exposed vulnerabilities as well as those actively exploited in the wild. And because of our network insight, remediation options aren’t limited to just patching; Skybox informs you of IPS signatures and helps plan network–based changes that cut off vulnerable assets from attack paths. Exposure Analysis and Threat Intelligence
- Identifies exposed vulnerabilities using the network model and multi–step attack simulations
- Highlights vulnerabilities with exploits available, active exploits or packaged in distributed crimeware such as ransomware, exploit kits, etc.
- Cross references exposed and exploitable vulnerabilities to focus action on the most critical risks
- Assigns critical risk scores to exposed and exploited vulnerabilities and the assets and groups that host them
- Informs you of available patches and prioritizes patches based on their effectiveness of risk reduction
- Mitigates vulnerability risk by alerting you to IPS signatures and helping to plan configuration and ACL changes
- Recommends the best remediation actions to eliminate imminent threats in hours, instead of days
- Optimizes gradual risk reduction to systematically ensure potential threats don’t escalate
- Measures remediation effectiveness with customized risk metrics
- Assigns risk scores to vulnerabilities, assets and groups that can be tracked over time
- Provides fully customizable reporting — use any data or widget and export as CSV, PDF or HTML
The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks and problems. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.