Distribuidor autorizado See What You ve Been Missing Gain unprecedented visibility and intelligence of your attack surface SOLUTIONS OVERVIEW Vulnerability and Threat Management Security Policy Management
Skybox customers are on Forbes Global 2000 List, including six of the top 10 global banks and six of the 10 largest NATO member countries. SILICON VALLEY HEADQUARTERS 2099 Gateway Place Suite 450 San Jose, CA 95110 United States www.skyboxsecurity.com info@skyboxsecurity.com 2
To Solve a Problem, You Need to See It For years, security leaders have struggled to gain visibility over the attack surface, all the ways in which their organization is vulnerable to multi vector attacks. Traditional approaches fall short. Data is siloed between vendor technologies and network, applications glimpses into an enterprise s state of security. Unprecedented Visibility What if security teams could visualize and analyze the attack surface like never before? What if CISOs could see at a glance the areas of highest risk within business units, geographical locations or network devices within a location? Or, they could pinpoint critical gaps in policy compliance and identify potential attack vectors? With Skybox, it s possible. Our security analytics and visualization solutions give security leaders unprecedented visibility of the attack surface and the tools they need to systematically reduce exposure to cyberattacks. This includes visualization of a broad range of Indicators of Exposures (IOEs), such as exploitable attack vectors, hot spots of vulnerabilities, network security misconfigurations and non compliant firewalls. Advanced Security Analytics One Platform, Many Solutions The Skybox Security Suite uses advanced analytics to extract relevant and actionable intelligence from data silos, giving leaders the insight needed to make fast, informed decisions about where to direct resources. Analyzing, prioritizing and responding to critical security exposures with accuracy goes from days to minutes. Global leaders in every industry use Skybox to protect critical business services and confidential data financial services, government and defense, energy and utilities, technology, manufacturing, retail and pharmaceutical. The Suite is built to perform and scale in large, complex environments. It integrates with more than 90 security and networking products and has been named best of breed, rated 5 stars by SC Magazine. 3
Skybox Security Suite Integrated Security Analytics The Skybox Security Suite is a proven, award winning security management platform with attack surface visualization and a complete portfolio of security analytics products for vulnerability and threat management and security policy management. The Suite gives operational teams continuous visibility of the attack surface, enabling them to eliminate attack vectors and respond to security threats and incidents in minutes. Vulnerability and Threat Management Vulnerability Control Skybox Horizon Threat Manager Skybox Platform Attack Surface Visualization Firewall Assurance Change Manager Network Assurance Security Policy Management 4
Skybox Horizon Attack Surface Visualization Skybox Horizon provides unprecedented visibility of the attack surface, including a range of IOEs, giving security leaders the insight needed to build a mature security advanced cyberthreats. Explore the attack surface with a visual, interactive model that links network topology, network connections, business units and organizational hierarchy Present IOEs, such as exploitable attack vectors, hot spots of vulnerabilities, network security misconfigurations and non compliant firewalls Drill down with interactive tools to get quick summaries and actionable intelligence Provide insights for security strategy and resource planning; quickly communicate security status to business executives Horizon RTC, INC. Products Severity Threshold Paris Private Cloud Indicator of Experience New York Exposure London Vulnerability Density Horizon RTC, INC. New Vulnerabilities Products Russia Sweden Dubai Exposure London Platform Violations Paris Violating Rules Violating Rules ork Brazil Direct Vulnerabilities 49 Exposure Second Step Vulnerabilities: 0 ID SBV-296 Apache Chunked-Encoding CVE-2002-0392 Memory Corruption Direct Exposure Vulnerability Vulnerability Density 542 hosts More info Sweden ID SBV-37740 CVE-2012-5955 Direct Exposure London ID SBV-33883 CVE-2011-4130 Platform Direct Exposure Violations ID SBV-492 CVE-2001-0012 Direct Exposure IBM WebSphere 5.3 HTTP Server for z/os Unspecified Paris Remote Code Execution ProFTPD<1.3.3g Response Pool Allocation Lists Use-After-Free Error ISC BIND Internal Memory Disclosure Vulnerability Russiasia New Vulnerabilities Dubai ID SBV-897 CVE-2002-0661 Direct Exposure Apache 2.0 Encoded Backslash Directory Traversal Israel Vulnerability 5
Vulnerability and Threat Management Skybox Vulnerability Control and Threat Manager Enterprise networks under continuous threat can have thousands of vulnerabilities at any given time. With networks growing increasingly complex, being able to mitigate the most critical attack vectors prior well at night and front page news. [With Skybox] we can drive operations to mitigate only the most critical vulnerabilities, the ones that require immediate attention. Program Manager, USAID ISSO Team 6
Skybox Vulnerability Control Context Aware Vulnerability Management Skybox Vulnerability Control goes beyond scanners, using analytics and the context of the attack surface to identify exposures, prioritize risks, fill in blind spots View all vulnerabilities to eliminate exploitable attack vectors Assess the impact of a new vulnerability advisory in minutes no waiting for a scan Add network and security controls context to vulnerability analysis for more accurate prioritization Calculate remediation options tailored to your network Leverage vulnerability and attack vector intelligence, updated daily by Skybox Research Lab Skybox Threat Manager Threat Intelligence Analysis and Response Skybox Threat Manager keeps security leaders abreast of the latest threat intelligence, alerting to highlighting focused response alternatives. Automate the collection and normalization of threat intelligence Enable fast correlation between threats and your IT infrastructure Get recommendations for remediation options Integrate ticketing workflow for remediation tracking 7
Security Policy Management Skybox Firewall Assurance, Network Assurance, and Change Manager Whether deploying new applications and technologies or maintaining existing ones, security personnel need to ensure that firewall rules and security policies enable connectivity without exposing the organization to risky attack vectors or violating compliance requirements. This requires a true balancing act, made even more next-generation network security technologies. Next generation firewalls introduced new complexity into our environment. Many competitors could not keep up. Skybox understood our environment and tackled innovation and virtualization head on. CISO of a Silicon Valley financial services company Skybox Firewall Assurance Comprehensive Multi Vendor Firewall Management Skybox Firewall Assurance brings all firewalls into a single view and continuously monitors policy compliance, optimizes firewall rule sets and finds attack vectors that others miss. Identify security policy violations and platform vulnerabilities to reduce your attack surface firewalls to troubleshoot access issues Clean and optimize firewall rules to maintain firewall performance 8
Skybox Network Assurance Total Network Visibility and Control Skybox Network Assurance illuminates complex network security zones and policy compliance violations, giving the insight needed to reduce attack vectors and network disruptions. Visualize and understand the network and interactions of network devices and controls Analyze network paths between any source and destination, including the cloud, to uncover access issues and attack vectors Stay secure and compliant by checking security zones, routers and switches for configuration violations and vulnerabilities Troubleshoot connectivity and network zoning in a virtual model to avoid disruption 9
Skybox Change Manager Secure, Automated Firewall Change Workflow Skybox Change Manager ends risky changes with network aware planning and risk assessment. Speed up firewall change processes with customizable workflows and automation. Evaluate proposed firewall changes for compliance violations and exposed vulnerabilities Accurately identify firewalls that need to be changed using complete network context Translate change requests into a detailed plan for quick, error free implementation Automate and optimize rule lifecycle management Customize workflows to match organizational needs Verify that changes were completed as intended Skybox provides a fully fledged workflow that we can roll out to all of the key teams in IT. When they have a firewall change request, we will know it followed the appropriate steps and was validated and approved by the appropriate people. David Robinson, Security Consultant, Capita Customer Management 10
Distribuidor autorizado TOTAL VISIBILITY. FOCUSED PROTECTION. Skybox Security arms security teams with a powerful set of security management solutions that extract insight from data silos to give unprecedented visibility of the attack surface, including all Indicators of Exposure. With Skybox, security leaders can quickly and accurately prioritize and address vulnerabilities and threat exposures in minutes. For All Inquiries www.aloglobal.com/contactenos info@aloglobal.com Colombia 1800 518 1253 www.aloglobal.com