Solutions

Skybox simplifies complexity and unifies visibility across the entire attack surface, building a single model of your entire environment, on–prem and in the cloud.

The network model starts with a map of assets, security controls, security groups and network topology including virtual private network connections and subnets. Skybox then adds in vulnerability data to better understand risks and how attacks could play out in your organization.

In addition to the model, Skybox™ Horizon provides a simplified attack surface visualization. Horizon can be configured to show your network from any logical perspective, whether by geographic locations, business units or asset type. Horizon also shows network topology and connections and highlights indicators of exposure (IOEs) that serve as early indicators of security issues most likely to be exploited in an attack.

Related Resources
Skybox Horizon Product Info
Skybox for the Cloud Product Info

Skybox helps you consistently apply security policies across your entire network and translate physical network policies to cloud security groups and tags. Security tags from different providers are normalized for easy analysis and can be viewed according to the security group, asset (virtual machine) or application on which they’re applied.  Skybox also combines this information with security policy data from on–prem networks, enabling fast and complete assessments of adherence to internal policies.

Compliance with external regulatory policies is also easily analyzed for standards such as PCI DSS, NERC, CIP, SOX and GDPR, among others.

Related Resources

Skybox shows network and application connectivity across on-premises and multi-cloud environments with end-to-end accesses analysis and detailed information — from any source to destination. This enables organizations to monitor and troubleshoot connectivity issues throughout the network.

  • Show connectivity across and within physical, virtual and multi-cloud networks
  • Gather information on the access route, including details on security groups accessed
  • Perform ad hoc queries showing connectivity for applications between any source and destination, including detailed path analysis on the devices, rules, etc. along the path
Related Resources

While cloud service providers are responsible for managing vulnerabilities on cloud infrastructure, customers are responsible for managing those on workloads in the cloud, including cloud applications, operating systems and networking and security controls.

Skybox extends its scanless vulnerability detection capabilities to multi–cloud environments, using various data repositories to deduce vulnerabilities without a scan. This way, even if assets are offline during during scheduled scans, you can still have comprehensive vulnerability assessments throughout your entire environment.

Skybox then prioritizes vulnerability remediation based on our threat–centric vulnerability management (TCVM) approach, using complete context of your network, vulnerabilities and the current threat landscape to accurately identify immediate threats.