Blog

Track, Measure and Report Cybersecurity Risk Reduction

Shannon Ragan Nov 21, 2016

Skybox® Horizon, the attack surface visualization solution for the Skybox Security Suite, features new capabilities that give security leaders insight to how their organization’s security posture is improving or diminishing over time. Users can focus on specific sites within their attack surface (geographic locations, business units, etc.) and compare current risk levels with levels in the past. Full trend graphs are also available to show progress on mitigating indicators of exposure (IOEs) over time, including new, exposed or concentrations of vulnerabilities, unsecure device configurations and risky access rules.

“With its visual representations, Horizon has the unprecedented capability of showing at a glance what impact security efforts are having on an organization’s security state,” said VP of Products Ravid Circus. “Whether you’re tracking against strategic security goals or needing to meet strict compliance regulations, IOE history and trend data is a way to bring diverse, complicated metrics into a quickly digestible format.”

Circus predicts this feature will be particularly helpful to organizations preparing for new and upcoming regulations, such as the E.U. General Data Protection Regulation (GDPR), which goes into effect May 2018.

To read the full press release on new Skybox features including provisioning for Check Point firewalls, click here.

Shannon Ragan is the Senior Communications Manager at Skybox Security. Prior to joining Skybox, Ragan was a writer and editor in the legal and STEM fields. She has a passion for the changing world of cyber security and is a self-confessed news junkie. Ragan earned her BA in English at Webster University in St. Louis.

Recent Posts

See the bigger picture to secure the distributed workforce
Read More
Transformation on a budget: supercharge your existing cyber defense tech stack
Read More
When lives are at stake, enhanced cybersecurity is paramount
Read More
See Around Corners to #BeCyberSmart
Read More
How to Protect Your IT Environment from Supply Chain Cybersecurity Risks
Read More
Know Your Asset Vulnerability Risk
Read More