Skybox Horizon

Cutting-edge attack surface visualization solution powered by indicators of exposure


Horizon provides unprecedented visibility of the attack surface, including indicators of exposure, giving the insight needed to build a security management program effective against advanced cyberthreats.

Advanced Attack Surface Visualization

Integrating with the Skybox Security Suite, Horizon uses contextual intelligence gained from consolidating and analyzing data from various sources to create a visual, interactive model that links network topology, network connections, business units and organizational hierarchy.

Winner of Cyber Security Awards’ Innovative Product of the Year, Horizon shows indicators of exposure (IOEs), such as vulnerability hot spots, unsecure device configurations and risky access rules, giving CISOs deep insight into the state of their security from the widest possible range of sources.

Highlighted Features

Visualize Your Attack Surface

Unify data from multiple vendors and view risk from different perspectives.

Focus on Indicators of Exposure

See critical issues at a glance and filter based on exposure types or security level.

Communicate More Effectively

Visually present summaries and details of site and network status to the board and executives. 

Terminology

Attack Surface Visualization Solution - Skybox Security Horizon - Terminology

What’s an Attack Surface?

Everyone’s got one, but few know what it looks like. The attack surface is the sum total of all the ways in which an IT infrastructure is vulnerable to cyberthreats. Horizon brings your unique attack surface into a single, comprehensive view and provides insight into IOEs.

Attack Surface Visualization Solution - Skybox Security Horizon - Terminology 2

What are Indicators of Exposure?

A complement to indicators of compromise (IOCs) used to detect attacks that may have occurred, indicators of exposure (IOEs) give insight into potentially exploitable attack vectors before an incident actually takes place. They include issues such as new, exposed or concentrations of vulnerabilities, unsecure device configurations and risky access rules.

Advanced Attack Surface Visualization

Integrating with the Skybox® Security Suite, Horizon uses contextual intelligence gained from consolidating and analyzing data from various sources to create a visual, interactive model that links hybrid network topology, network connections, business units and organizational hierarchy. It shows IOEs such as new, exposed or concentrations of vulnerabilities, unsecure device configurations and risky access rules, and gives CISOs deep insight into the state of their security from the widest possible range of sources.

Attack Surface Visibility

Comprehensive and Detailed Views

Using the interactive attack surface model, drill down to specific sites or networks for quick summaries or zoom out for panoramic visualization across an entire enterprise.

Focus on specific IOEs and security levels for customized, layered attack surface views.

Attack Surface Modeling and Simualation

Security Status Reporting

Visually and quanitfiably report on security status to the board and executives, focusing on specific geographies or business units or giving an overview of your entire attack surface. Quickly show hot spots of vulnerabilities or network weaknesses, ensuring security is front and center across the organization and enabling informed, strategic security decision making.

Easily track progress toward internal security goals or compliance requiremenst with quick comparisons of current and past IOE levels, and view IOE trends on specific sites over time. Horizon also helps identify effective security teams whose practices should be emulated, and find those that may require additional training or resources.

Risk-Reduction History and Trends

Learn More

 

Infographic: Indicators of Compromise vs. Indicators of Exopsure

Familiar with indicators of compromise (IOCs)? See how the new approach from Skybox uses indicators of exposure (IOEs) for proactive response to cyberthreats and security weaknesses.

2016 Trends Report: Analyzing the Attack Surface

Download the global survey report to learn how enterprises are fairing in terms of data collection, risk prioritization, cloud security, automation and more.