Predict and prevent cyber threats
When this large electricity and nuclear power producer sought a solution to manage the risks and vulnerabilities impacting its IT infrastructure, it turned to Skybox. Existing IT complexity and growth initiatives limited the organization’s scalability, but the implementation of Skybox Risk Control addressed the ability to automatically perform IT risk assessment, visualize the security and threat management status, and identify the top 1% of critical vulnerabilities out of thousands.
Step 1 – Collect. Using Skybox's patent-pending rule-driven profiling technology, Risk Control with Vulnerability Detector deduces an accurate list of vulnerabilities without actively probing network hosts. Risk Control can also automatically collect data from threat feeds, vulnerability scanners and patch management systems as well as network device configurations for firewalls, routers, load balancers, and more. Risk Control incorporates information about assets and the relative value of systems and services – necessary to rank potential risks.
Step 2 – Analyze. The Risk Control analytical engine normalizes the information into a CMDB, creates a model of the network, and incorporates Skybox vulnerability content with intelligence about the likelihood and severity of potential attacks. A Skybox IT risk assessment is done from the attacker’s point of view – identifying possible access paths and the security gaps that can be used to reach critical assets.
Step 3 – Report and Act. With Risk Control, network security managers get immediate information on the most critical risks and remediation alternatives. Connected to a ticketing system, Risk Control immediately notifies the IT security team of problems in the system.