TOMORROW’S SECURITY IS HERE · TOMORROW’S SECURITY IS HERE Do more with an integrated security...
Transcript of TOMORROW’S SECURITY IS HERE · TOMORROW’S SECURITY IS HERE Do more with an integrated security...
SOLUTIONS OVERVIEW
Vulnerability and Threat Management Security Policy Management Attack Surface Visualization
TOMORROW’S SECURITY
IS HEREDo more with an integrated security analytics platform,
the Skybox Security Suite
FIREWALLASSURANCE
NETWORKASSURANCE
CHANGEMANAGER
VULNERABILITY CONTROL
THREAT MANAGER HORIZON
3
For years, security leaders have struggled to gain visibility over the attack surface, all the ways in which their organization is vulnerable to attacks. Conventional security solutions create data silos, giving only a partial view into an enterprise’s overall state of security.
Unprecedented Visibility
With Skybox® Security, it’s possible. Our solutions give security leaders unprecedented visibility of the attack surface and the tools they need to systematically reduce exposure to cyberattacks. This includes visualization of hybrid IT environments and a broad range of indicators of exposures (IOEs), such as vulnerability hot spots, unsecure device configurations and risky access rules.
Advanced Security Analytics: One Platform, Many Solutions
The Skybox® Security Suite unifies security and network data from the broadest range of
sources, using advanced analytics to extract contextual intelligence that gives security pros the insight needed to make fast, informed decisions about where to direct resources. Analyze, prioritize and respond to critical security exposures with accuracy — not in days, but in minutes.
Global leaders in every industry use Skybox to protect critical business services and confidential data — financial services, government and defense, energy and utilities, service providers, technology, manufacturing, retail and pharmaceutical.
Skybox solutions are built to perform and scale in large, complex environments. Our modules integrate with more than 100 security and networking technologies and the Suite has been named best–of–breed, rated five stars by SC Magazine.
To Solve a Problem, You Need to See It
SILICON VALLEY HEADQUARTERS
2099 Gateway Place Suite 450 San Jose, CA 95110 United States www.skyboxsecurity.com [email protected]
2
4 5
Skybox Security Suite Integrated Security Analytics
The Skybox® Security Suite is a proven, award–winning security management platform with an attack surface visualization layer and a suite of five security analytics solutions for vulnerability and threat management and security policy management.
With continuous visibility of the attack surface, security teams are able to eliminate attack vectors and respond to security threats and incidents in minutes.
CHANGEMANAGER
VULNERABILITYCONTROL
FIREWALLASSURANCE
THREATMANAGER
NETWORKASSURANCE
Skybox Horizon
Attack Surface Visualizat
ion
Skybox Platform
Vulnerability and Threat Management
Security Policy Management
Think Strategically and Holistically
Now is the time to evolve your security management program. Go from a passive “check–the–box” approach that relies on disconnected products and processes to a powerful, data–driven program that uses network modeling, attack vector analytics, multi–factor vulnerability assessment and real–time threat intelligence from the Skybox® Research Lab.
These powerful capabilities will give you a better understanding of the potential business impact of an attack, so you can focus security action where it matters most.
• Measurably reduce risk
• Improve your security posture across physical, virtual and cloud environments
• Increase cost savings and reduce resource burdens
• Improve operational processes
• Enhance communication and collaboration
Skybox customers are ranked among the FORBES Global 2000, including seven of the top 10 global retail banks and six of the 10 largest NATO member countries.
6 7
Skybox Horizon Attack Surface Visualization
Skybox® Horizon combines security analytics with data integration and visualization technologies to give CISOs unprecedented attack surface visibility and on–demand intelligence to quickly reduce exposure to cyberattacks across the entire enterprise.
• Explore the attack surface with an interactive, visual model linking network topology, network connections, business units and organizational hierarchy
• Show indicators of exposure (IOEs) — new, exposed or concentrations of vulnerabilities, unsecure device configurations and risky access rules — and rank their severity
• Drill down with interactive tools for quick summaries and to pinpoint the systems most vulnerable to threats
• Communicate security issues across teams and up the management chain
• Justify security investments and resource allocation
• Track progress toward security goals, and compare past and present risk levels
London
New York
Paris
DubaiJapan
PrivateCloud
3RD PARTIES
Sweden
Severity Threshold
Indicators of Exposure
VulnerabilityExposure
Vulnerability Density
New Vulnerabilities
Risky Access Rules
UnsecureDeviceConfiguration
ProductsSkybox Horizon | CATHER INC
ProductsSkybox Horizon | New York
FIREWALL
FIREWALL
NETWORKNETWORK
NETWORK
LOAD BALANCER
LOAD BALANCERS
FIREWALL
ROUTERROUTER
IPS DEVICE
IPS DEVICE
FIREWALL
GATEWAYGATEWAY
GATEWAYGATEWAY
CHICAGO
MIAMI
My Neighbors
ACME INC. U.S. NEW YORK
Europe
Moscow
SAU PAULO
SINGAPORE
TOKYO
BACKBONE
AMAZON C...
3RD PARTIES
MPLS
Skybox Horizon | CATHER INC
CATHER INC.
IOE History: 6 Months ago | 3 Months ago | 4 Weeks ago | 7 Days ago
US
Seattle
SFO
Omaha
Dallas
Chicago
Los Angeles
New York
Miami
ProductsSkybox Horizon | CATHER INC
New York
542 Hosts
More Info
Risky Access Rules
UnsecureDevice
Configuration
NewVulnerabilities
VulnerabilityDensity
VulnerabilityExposure
ID SBV-296CVE-2002-0392Direct Exposure
ID SBV-37740CVE-2012-5955Direct Exposure
ID SBV-33883CVE-2011-4130Direct Exposure
ID SBV-492CVE-2001-0012Direct Exposure
ID SBV-897CVE-2002-0661Direct Exposure
Apache Chunked-Encoding Memory Corruption Vulnerability
IBM WebSphere 5.3 HTTP Server for z/OS Unspecified Remote Code Execution
ProFTPD<1.3.3g Response Pool Allocation Lists Use-After-Free Error
ISC BIND Internal Memory Disclosure Vulnerability
Apache 2.0 Encoded Backslash Directory Traversal Vulnerability
Vulnerability ExposureDirect Vulnerabilities: 5. Second Step Vulnerabilities: 0
London
New York
Paris
DubaiIsrael
Paris
Brazil
Russia
Sweden
US
312 Assets6 Firewalls
Site Details
Risky Access Rules
UnsecureDevice
Configuration
NewVulnerabilities
VulnerabilityDensity
VulnerabilityExposure
ID SBV-36114
CVE-2012-3136
ID SBV-55396
CVE-2015-8664
ID SBV-46432
CVE-2014-4073
ID SBV-47012
CVE-2014-4149
ID SBV-36637
CVE-2012-3137
Reported date: 8/30/2012
# Asset 80
Reported date: 12/23/20...
# Asset 112
Reported date: 10/14/20...
# Asset 33
Reported date: 11/11/20...
# Asset 33
Reported date: 09/20/2012
# Asset 25
Oracle Java SE 7 Update 6 and Earlier JRE Unspecified Remote
Vulnerability R...
Google Chrome <47.0.2526.106 Remote DoS or Unspecified Other Impact-
C...
[MS14-057] Microsoft .NET Framework Remote Privilege Escalation via
ClickO...
[MS14-072] Microsoft .NET Framwork Remote Code Execution via Crafter
Da...
[cpuoct2012-1515893, cpuoct2012-1515893] Oracle Database Server 10g2,...
Vulnerability Density
Last 6 Months
(Contributing Vulnerabilities: 1554, Vulnerable Assets: 303)
Mar 2016 May 2016Apr 2016 Jun 2016 Aug 2016Jul 2016 Current
Skybox Horizon | US
8 9
Vulnerability and Threat ManagementSkybox Vulnerability Control and Threat Manager
Enterprise networks are under continuous threat from cybercriminals and advanced attackers, and they can have thousands of vulnerabilities at any given time. Skybox solutions for vulnerability control and threat management enable security professionals to respond effectively to new threat advisories and prioritize and mitigate critical attack vectors before they’re exploited.
[With Skybox] we can drive operations to mitigate only the most critical vulnerabilities, the ones that require immediate attention.
— Program Manager, USAID ISSO Team
Skybox Vulnerability Control Context–Aware Vulnerability Management
Skybox® Vulnerability Control goes beyond scanners, using analytics and the context of the attack surface to identify exposures, prioritize risks, fill in blind spots and quickly focus remediation efforts.
• View all vulnerabilities and pinpoint critical risk to eliminate exploitable attack vectors
• Assess the impact of a new vulnerability advisory in minutes, without waiting for a scan
• Add business, network and security control context to vulnerability analysis for more accurate prioritization
• Receive remediation guidance tailored to your environment
• Leverage vulnerability and attack vector intelligence, updated daily by the Skybox® Research Lab
Skybox Threat ManagerThreat Intelligence Analysis and Response
Skybox® Threat Manager keeps security leaders abreast of the latest threat intelligence, alerting to new advisories that could affect critical assets and highlighting focused response alternatives.
• Automate the collection and normalization of threat intelligence
• Enable fast correlation between threats and your IT infrastructure
• Get recommendations for remediation options
• Integrate ticketing workflow for remediation tracking
CHANGEMANAGER
VULNERABILITYCONTROL
FIREWALLASSURANCE
THREATMANAGER
NETWORKASSURANCE
Skybox Horizon
Attack Surface Visualizat
ion
Skybox Platform
Vulnerability and Threat Management
Security Policy Management
10 11
Security Policy ManagementSkybox Firewall Assurance, Network Assurance and Change Manager
Maintaining continuous compliance is not easy. Security teams constantly deploy new applications, maintain existing ones and juggle multiple tiers of data architecture and next–generation network security technologies — all without room for error. Skybox solutions ensure that firewall rules and security policies enable connectivity without exposing the organization to risky attack vectors or violating compliance requirements.
Skybox Firewall AssuranceComprehensive Multi–Vendor Firewall Management
Skybox® Firewall Assurance brings all firewalls into a single view and continuously monitors policy compliance, optimizes firewall rulesets and finds attack vectors that others miss.
• Identify security policy violations and critical vulnerabilities to reduce your attack surface
• Visualize how network traffic may flow through firewalls to troubleshoot access issues
• Clean and optimize firewall rules to maintain firewall performance
CHANGEMANAGER
VULNERABILITYCONTROL
FIREWALLASSURANCE
THREATMANAGER
NETWORKASSURANCE
Skybox Horizon
Attack Surface Visualizat
ion
Skybox Platform
Vulnerability and Threat Management
Security Policy Management
Skybox Network AssuranceTotal Network Visibility and Control
Skybox® Network Assurance illuminates physical, virtual and cloud environments, complex network security zones and policy compliance violations, giving the insight needed to reduce attack vectors and network disruptions.
• Visualize and understand hybrid environments and the interactions of network devices and controls
• Analyze network paths between any source and destination — including virtualized networks — to uncover access issues and attack vectors
• Check security zones, routers and switches for configuration violations and vulnerabilities to ensure compliance
• Troubleshoot connectivity and network zoning in a virtual model to avoid disruption
12
Skybox provides a fully fledged workflow that we can roll out to all of the key teams in IT. When they have a firewall change request, we will know it followed the appropriate steps and was validated and approved by the appropriate people.
— David Robinson, Security Consultant, Capita Customer Management
Skybox Change Manager Secure, Automated Firewall Change Workflow
Skybox® Change Manager ends risky firewall changes with network–aware planning and risk assessment. Speed up firewall change processes with customizable workflows and automation.
• Evaluate proposed firewall changes for compliance violations and exposed vulnerabilities
• Accurately identify firewalls in need of change using complete network context
• Translate change requests into a detailed plan for quick, error–free implementation and opt to push select changes live
• Automate and optimize rule life cycle management
• Customize workflows to match organizational needs
• Verify changes were completed as intended
14
VULNERABILITY CONTROL
THREAT MANAGER
FIREWALLASSURANCE
NETWORKASSURANCE
CHANGEMANAGER HORIZON
Pantone Warm Red CPantone Warm Red U
Pantone 716 CPantone 716 U
Pantone 319 C Pantone 319 U
Pantone 361 CPantone 361 U
Pantone 527 CPantone 527 U
Pantone 7684 CPantone 662 U
Probably the most versatile and flexible product of its types that we have seen. There is nowhere near enough room on our page to cover all of its capabilities.
— SC Magazine,Risk and Policy ManagementGroup Test
5 STARS FOR GROUP TEST: VULNERABILITY AND THREATMANAGEMENT— SC Magazine
5 STARS FOR GROUP TEST: RISK AND POLICY MANAGEMENT— SC Magazine
NAMED AMONG WORLD’SHOTTEST SECURITY COMPANIES— Cybersecurity Ventures
1 OF THE 25 COOLESTNETWORK SECURITY VENDORS— CRN Magazine
SKYBOX® HORIZON NAMED THE MOSTINNOVATIVE PRODUCT OF THE YEAR — Cyber Security Awards
SKYBOX® HORIZON NAMED 1 OF 30 COOL NEW SECURITY PRODUCTS LAUNCHED AT RSA 2016— CRN Magazine
SKYBOX® HORIZON NAMED HOT SECURITY PRODUCT LAUNCHED AT RSA 2016— Network World
Next–generation firewalls introduced new complexity into our environment. Many competitors could not keep up. Skybox understood our environment and tackled innovation and virtualization head on.
— CISO of a Silicon Valley Financial Services Company
www.skyboxsecurity.com [email protected]
Skybox arms security leaders with the broadest set of
solutions in security operations, analytics and reporting
(SOAR). The Skybox® Security Suite integrates with 100+
technologies and uses network modeling, attack vector
analytics and multi–factor vulnerability assessment to give
unprecedented visibility of the attack surface and key
indicators of exposure (IOEs). This gives security leaders
the insight needed for effective threat–centric vulnerability
management and automated firewall and security policy
management across physical, virtual and cloud networks.
TOTAL VISIBILITY. FOCUSED PROTECTION.™