sb-as logo
Story image

Skybox Security launches update to simplify hybrid cloud risk management

17 Jun 2019

Cyber risk management company Skybox Security has announced the launch of Skybox Security Suite 10.

This product version aims to strengthen Skybox capabilities to simplify enterprise security management processes that oversee mass-scale, hybrid networks.

“The CISO’s biggest challenge is complexity,” says Skybox CEO and founder Gidi Cohen.

“It has become impossible for security teams to understand — let alone manage — security effectively in today’s multi-cloud, hybrid environments.

“The development behind Skybox 10 was done with the aim of making it easier to manage security policies in clouds, monitor risks to industrial control systems, and find important assets at risk,” Cohen says.

“We want to help CISOs maximise the value of their teams and their technology to secure and support the business.”

Skybox 10 brings an intuitive, customisable user experience to simplify management of vulnerabilities, security policies, firewalls and changes from a central solution.

Cloud and operational technology (OT) security insights are integrated for uniform risk management across hybrid networks.

Intelligent automation brings harmony and efficiency to multi-vendor environments, integrating data and yielding contextual insight.

Customers can also use the new REST API to leverage Skybox intelligence in other tools and processes, increasing their ROI.

Skybox 10 also includes several new integrations including Splunk, ElasticSearch and ServiceNow, as well as Twistlock which provides visibility to the security of containers in cloud-native applications.

The biggest changes are found in the vulnerability management module, Skybox Vulnerability Control. 

The new release provides fast access to vulnerability insights through fully customisable dashboards and reports.

New, flexible risk scoring allows users to replace generic severity scores with context-based scores unique to their environment; this prioritisation method shrinks the workload to focus on exposed and exploitable vulnerabilities — typically less than one percent of an organisation’s occurrences.

“Risk scoring is one of those things that’s so simple on its face, but in reality, there’s a hugely detailed process going on under the hood,” says Skybox Security products VP Amrit Williams.

“Our methodology goes beyond CVSS severity and exploitability, taking into account asset importance, exposure within the network and more.

“We want to make it easy to determine which assets are at risk and see if an existing security control can be used to protect against an attack, even without a patch. This is critical to knowing which risks require immediate attention and which ones can wait for scheduled remediation.”

Osterman Research principal analyst Michael Osterman says, “For the last decade, accurate risk prioritisation has been the thing that eludes enterprises and can lead to serious damage.”

“Having a way to bring the right vulnerabilities — and vulnerable assets — to light with an approach that quantifies exposure and exploitability will be hugely valuable.”

Story image
Experiencing ransomware significantly impacts cybersecurity approach
"The survey findings illustrate clearly the impact of these near-impossible demands. Among other things, those hit by ransomware were found to have severely undermined confidence in their own cyber threat awareness."More
Story image
CrowdStrike targets Zero Trust blind spot with new offering
CrowdStrike has officially launched CrowdStrike Falcon Zero Trust Assessment (ZTA), designed to aid in overall security posture by delivering continuous real-time assessments across all endpoints in an organisation regardless of the location, network or user. More
Story image
Radware launches DDoS protection for online gaming
“Online games are a massive, multi-billion-dollar industry, but they frequently fall victim to powerful and targeted DDoS attacks,"More
Story image
Cisco report: Remote working is here to stay, making cybersecurity a top priority
"With this new way of working here to stay and organisations looking to increase their investment in cybersecurity, there’s a unique opportunity to transform the way we approach security as an industry to better meet the needs of our customers and end-users.”More
Story image
NordVPN upgrades infrastructure with launch of colocated servers
"The greatest advantage of having colocated servers is their complete ownership, which guarantees access only by our authorised people."More
Story image
Report reveals relationship between boardroom and cybersecurity investments
“While boards are definitely listening and stepping up with increased budget for cybersecurity, they tend to view any investment as a cost rather than adding business value."More