sb-au logo
Story image

Skybox Security launches update to simplify hybrid cloud risk management

17 Jun 2019

Cyber risk management company Skybox Security has announced the launch of Skybox Security Suite 10.

This product version aims to strengthen Skybox capabilities to simplify enterprise security management processes that oversee mass-scale, hybrid networks.

“The CISO’s biggest challenge is complexity,” says Skybox CEO and founder Gidi Cohen.

“It has become impossible for security teams to understand — let alone manage — security effectively in today’s multi-cloud, hybrid environments.

“The development behind Skybox 10 was done with the aim of making it easier to manage security policies in clouds, monitor risks to industrial control systems, and find important assets at risk,” Cohen says.

“We want to help CISOs maximise the value of their teams and their technology to secure and support the business.”

Skybox 10 brings an intuitive, customisable user experience to simplify management of vulnerabilities, security policies, firewalls and changes from a central solution.

Cloud and operational technology (OT) security insights are integrated for uniform risk management across hybrid networks.

Intelligent automation brings harmony and efficiency to multi-vendor environments, integrating data and yielding contextual insight.

Customers can also use the new REST API to leverage Skybox intelligence in other tools and processes, increasing their ROI.

Skybox 10 also includes several new integrations including Splunk, ElasticSearch and ServiceNow, as well as Twistlock which provides visibility to the security of containers in cloud-native applications.

The biggest changes are found in the vulnerability management module, Skybox Vulnerability Control. 

The new release provides fast access to vulnerability insights through fully customisable dashboards and reports.

New, flexible risk scoring allows users to replace generic severity scores with context-based scores unique to their environment; this prioritisation method shrinks the workload to focus on exposed and exploitable vulnerabilities — typically less than one percent of an organisation’s occurrences.

“Risk scoring is one of those things that’s so simple on its face, but in reality, there’s a hugely detailed process going on under the hood,” says Skybox Security products VP Amrit Williams.

“Our methodology goes beyond CVSS severity and exploitability, taking into account asset importance, exposure within the network and more.

“We want to make it easy to determine which assets are at risk and see if an existing security control can be used to protect against an attack, even without a patch. This is critical to knowing which risks require immediate attention and which ones can wait for scheduled remediation.”

Osterman Research principal analyst Michael Osterman says, “For the last decade, accurate risk prioritisation has been the thing that eludes enterprises and can lead to serious damage.”

“Having a way to bring the right vulnerabilities — and vulnerable assets — to light with an approach that quantifies exposure and exploitability will be hugely valuable.”

Story image
Why securing IoT installations will be ‘do or die’ in post-pandemic Australia
Unless IoT technology is visible on the network, organisations will find themselves at risk with an unmanageable high-tech morass, warns ExtraHop A/NZ regional sales manager Glen Maloney.More
Story image
Why it’s essential to re-write IT security for the cloud era
Key components of network security architecture for the cloud era should be built from the ground up, as opposed to being bolted on to legacy solutions built for organisations functioning only on-premises or from only managed devices.More
Story image
Jamf extends Microsoft collaboration with iOS Device Compliance
Organisations will soon be able to use Jamf for Apple ecosystem management while using Azure Active Directory and Microsoft Endpoint manager to maintain conditional access.More
Link image
Webinar: Best practices for keeping your video chats secure
Video collaboration providers nowadays operate exclusively on a multi-tenant, public cloud - and security and privacy concerns have come into the spotlight. Here's how to secure your communications.More
Story image
Check Point acquires Odo Security to bolster remote security offering
The deal will integrate Odo’s remote access software with Check Point’s Inifinity architecture, bolstering the latter company’s remote security capabilities in a time where working and learning from home has become the norm, and looks to largely remain that way in the near future.More
Story image
Trend Micro receives AWS Outposts Ready designation
rend Micro solutions are now fully and demonstrably capable of integrating with Outposts deployments.More