Focus on the most critical risks, every day
To protect business services and data, IT security managers must identify, analyze, and remediate important vulnerabilities to close off attack vectors. Security teams must have network visibility and risk intelligence to pinpoint exploitable vulnerabilities and provide remediation options. Skybox® Risk Control automatically discovers and prioritizes vulnerabilities, using context-aware analytics that take network topology, security controls, business assets, and threat intelligence into account. Risk Control gives those on the front line of security the tools they need to focus attention on the most critical risks first to protect customer data, intellectual property and business services.
When this large electricity and nuclear power producer sought a risk analytics solution to understand and manage the vulnerabilities impacting its IT infrastructure, it turned to Skybox Security. Existing IT complexity and a fast-growing network limited the organization’s ability to keep vulnerabilities in control. The implementation of Skybox Risk Control allowed the customer to automatically analyze and prioritize the top 1% of critical vulnerabilities, out of tens of thousands.
Step 1 – Collect. Using Skybox's patent-pending rule-driven profiling technology, Risk Control with Vulnerability Detector deduces an accurate list of vulnerabilities without actively probing network hosts. Risk Control also automatically collects data from threat feeds, vulnerability scanners and patch management systems as well as network devices such as firewalls, routers, load balancers and more. Risk Control incorporates information about business assets and the relative value of systems and services – necessary to rank potential risks.
Step 2 – Analyze.The Risk Control analytical engine correlates identified vulnerabilities with vulnerability and threat intelligence from the Skybox Vulnerability Dictionary, and the network context. Attack simulation is used to prioritize risks from an attacker's point of view – identifying possible access paths and the vulnerabilities that can be used to reach critical assets.
Step 3 – Report and Act. With Risk Control, network security managers get immediate information on the most critical vulnerabilities and remediation alternatives. Connected to an automated ticketing system, Risk Control offers prioritized remediation options and tracks remediation progress.