Story image

Skybox Security launches update to simplify hybrid cloud risk management

17 Jun 2019
Twitter
Facebook

Cyber risk management company Skybox Security has announced the launch of Skybox Security Suite 10.

This product version aims to strengthen Skybox capabilities to simplify enterprise security management processes that oversee mass-scale, hybrid networks.

“The CISO’s biggest challenge is complexity,” says Skybox CEO and founder Gidi Cohen.

“It has become impossible for security teams to understand — let alone manage — security effectively in today’s multi-cloud, hybrid environments.

“The development behind Skybox 10 was done with the aim of making it easier to manage security policies in clouds, monitor risks to industrial control systems, and find important assets at risk,” Cohen says.

“We want to help CISOs maximise the value of their teams and their technology to secure and support the business.”

Skybox 10 brings an intuitive, customisable user experience to simplify management of vulnerabilities, security policies, firewalls and changes from a central solution.

Cloud and operational technology (OT) security insights are integrated for uniform risk management across hybrid networks.

Intelligent automation brings harmony and efficiency to multi-vendor environments, integrating data and yielding contextual insight.

Customers can also use the new REST API to leverage Skybox intelligence in other tools and processes, increasing their ROI.

Skybox 10 also includes several new integrations including Splunk, ElasticSearch and ServiceNow, as well as Twistlock which provides visibility to the security of containers in cloud-native applications.

The biggest changes are found in the vulnerability management module, Skybox Vulnerability Control. 

The new release provides fast access to vulnerability insights through fully customisable dashboards and reports.

New, flexible risk scoring allows users to replace generic severity scores with context-based scores unique to their environment; this prioritisation method shrinks the workload to focus on exposed and exploitable vulnerabilities — typically less than one percent of an organisation’s occurrences.

“Risk scoring is one of those things that’s so simple on its face, but in reality, there’s a hugely detailed process going on under the hood,” says Skybox Security products VP Amrit Williams.

“Our methodology goes beyond CVSS severity and exploitability, taking into account asset importance, exposure within the network and more.

“We want to make it easy to determine which assets are at risk and see if an existing security control can be used to protect against an attack, even without a patch. This is critical to knowing which risks require immediate attention and which ones can wait for scheduled remediation.”

Osterman Research principal analyst Michael Osterman says, “For the last decade, accurate risk prioritisation has been the thing that eludes enterprises and can lead to serious damage.”

“Having a way to bring the right vulnerabilities — and vulnerable assets — to light with an approach that quantifies exposure and exploitability will be hugely valuable.”

Story image
08 Nov
Rocket Lab chooses Siemens to aid in next phase of growth
Rocket Lab plans to implement Siemens hi-tech industrial software to help digitally manage the lifecycle needs of the business.More
Story image
11 Nov
Unpopular opinion: The software monolith is wrongly maligned
We’re led to believe microservices are modern and monoliths are legacy - but it’s not that easy, writes Segment’s Alexandra Noonan and Calvin-French Owen.More
Story image
08 Nov
Sourced Group reaches fifth APN milestone in 12 months
Sourced Group has officially achieved the AWS Financial Services Competency, recognising the company’s success in helping financial institutions adopt cloud at scale.More
Story image
13 Nov
Microsoft showcases innovations in new Asia Pacific HQ
Almost 145,000 metres of cabling, 200 display screens, 179 Bluetooth beacons and 900 sensors make up Microsoft’s new Asia Pacific headquarters in Singapore, which is now home to the region’s first Microsoft Experience Centre.More
Story image
29 Oct
Securing the unknown with visibility and control
What’s getting in the way of an organisation’s security health and what needs to happen to secure those vulnerabilities? What assets does an organisation own? How does an organisation gain visibility? Where do the assets live? Who has access to those assets?More
Download image
Ten keys to unlocking cybersecurity automation
Modern cybercriminals are well organized, well-funded, and profit driven. To effectively combat these cybercriminals, enterprise security teams must become crimefighters. More