tomorrow’s security is here · tomorrow’s security is here do more with an integrated security...

9
SOLUTIONS OVERVIEW Vulnerability and Threat Management Security Policy Management Attack Surface Visualization TOMORROW’S SECURITY IS HERE Do more with an integrated security analytics platform, the Skybox Security Suite FIREWALL ASSURANCE NETWORK ASSURANCE CHANGE MANAGER VULNERABILITY CONTROL THREAT MANAGER HORIZON

Upload: others

Post on 22-Jul-2020

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: TOMORROW’S SECURITY IS HERE · TOMORROW’S SECURITY IS HERE Do more with an integrated security analytics platform, the Skybox Security Suite FIREWALL ASSURANCE NETWORK ASSURANCE

SOLUTIONS OVERVIEW

Vulnerability and Threat Management Security Policy Management Attack Surface Visualization

TOMORROW’S SECURITY

IS HEREDo more with an integrated security analytics platform,

the Skybox Security Suite

FIREWALLASSURANCE

NETWORKASSURANCE

CHANGEMANAGER

VULNERABILITY CONTROL

THREAT MANAGER HORIZON

Page 2: TOMORROW’S SECURITY IS HERE · TOMORROW’S SECURITY IS HERE Do more with an integrated security analytics platform, the Skybox Security Suite FIREWALL ASSURANCE NETWORK ASSURANCE

3

For years, security leaders have struggled to gain visibility over the attack surface, all the ways in which their organization is vulnerable to attacks. Conventional security solutions create data silos, giving only a partial view into an enterprise’s overall state of security.

Unprecedented Visibility

With Skybox® Security, it’s possible. Our solutions give security leaders unprecedented visibility of the attack surface and the tools they need to systematically reduce exposure to cyberattacks. This includes visualization of hybrid IT environments and a broad range of indicators of exposures (IOEs), such as vulnerability hot spots, unsecure device configurations and risky access rules.

Advanced Security Analytics: One Platform, Many Solutions

The Skybox® Security Suite unifies security and network data from the broadest range of

sources, using advanced analytics to extract contextual intelligence that gives security pros the insight needed to make fast, informed decisions about where to direct resources. Analyze, prioritize and respond to critical security exposures with accuracy — not in days, but in minutes.

Global leaders in every industry use Skybox to protect critical business services and confidential data — financial services, government and defense, energy and utilities, service providers, technology, manufacturing, retail and pharmaceutical.

Skybox solutions are built to perform and scale in large, complex environments. Our modules integrate with more than 100 security and networking technologies and the Suite has been named best–of–breed, rated five stars by SC Magazine.

To Solve a Problem, You Need to See It

SILICON VALLEY HEADQUARTERS

2099 Gateway Place Suite 450 San Jose, CA 95110 United States www.skyboxsecurity.com [email protected]

2

Page 3: TOMORROW’S SECURITY IS HERE · TOMORROW’S SECURITY IS HERE Do more with an integrated security analytics platform, the Skybox Security Suite FIREWALL ASSURANCE NETWORK ASSURANCE

4 5

Skybox Security Suite Integrated Security Analytics

The Skybox® Security Suite is a proven, award–winning security management platform with an attack surface visualization layer and a suite of five security analytics solutions for vulnerability and threat management and security policy management.

With continuous visibility of the attack surface, security teams are able to eliminate attack vectors and respond to security threats and incidents in minutes.

CHANGEMANAGER

VULNERABILITYCONTROL

FIREWALLASSURANCE

THREATMANAGER

NETWORKASSURANCE

Skybox Horizon

Attack Surface Visualizat

ion

Skybox Platform

Vulnerability and Threat Management

Security Policy Management

Think Strategically and Holistically

Now is the time to evolve your security management program. Go from a passive “check–the–box” approach that relies on disconnected products and processes to a powerful, data–driven program that uses network modeling, attack vector analytics, multi–factor vulnerability assessment and real–time threat intelligence from the Skybox® Research Lab.

These powerful capabilities will give you a better understanding of the potential business impact of an attack, so you can focus security action where it matters most.

• Measurably reduce risk

• Improve your security posture across physical, virtual and cloud environments

• Increase cost savings and reduce resource burdens

• Improve operational processes

• Enhance communication and collaboration

Skybox customers are ranked among the FORBES Global 2000, including seven of the top 10 global retail banks and six of the 10 largest NATO member countries.

Page 4: TOMORROW’S SECURITY IS HERE · TOMORROW’S SECURITY IS HERE Do more with an integrated security analytics platform, the Skybox Security Suite FIREWALL ASSURANCE NETWORK ASSURANCE

6 7

Skybox Horizon Attack Surface Visualization

Skybox® Horizon combines security analytics with data integration and visualization technologies to give CISOs unprecedented attack surface visibility and on–demand intelligence to quickly reduce exposure to cyberattacks across the entire enterprise.

• Explore the attack surface with an interactive, visual model linking network topology, network connections, business units and organizational hierarchy

• Show indicators of exposure (IOEs) — new, exposed or concentrations of vulnerabilities, unsecure device configurations and risky access rules — and rank their severity

• Drill down with interactive tools for quick summaries and to pinpoint the systems most vulnerable to threats

• Communicate security issues across teams and up the management chain

• Justify security investments and resource allocation

• Track progress toward security goals, and compare past and present risk levels

London

New York

Paris

DubaiJapan

PrivateCloud

3RD PARTIES

Sweden

Severity Threshold

Indicators of Exposure

VulnerabilityExposure

Vulnerability Density

New Vulnerabilities

Risky Access Rules

UnsecureDeviceConfiguration

ProductsSkybox Horizon | CATHER INC

ProductsSkybox Horizon | New York

FIREWALL

FIREWALL

NETWORKNETWORK

NETWORK

LOAD BALANCER

LOAD BALANCERS

FIREWALL

ROUTERROUTER

IPS DEVICE

IPS DEVICE

FIREWALL

GATEWAYGATEWAY

GATEWAYGATEWAY

CHICAGO

MIAMI

My Neighbors

ACME INC. U.S. NEW YORK

Europe

Moscow

SAU PAULO

SINGAPORE

TOKYO

BACKBONE

AMAZON C...

3RD PARTIES

MPLS

Skybox Horizon | CATHER INC

CATHER INC.

IOE History: 6 Months ago | 3 Months ago | 4 Weeks ago | 7 Days ago

US

Seattle

SFO

Omaha

Dallas

Chicago

Los Angeles

New York

Miami

ProductsSkybox Horizon | CATHER INC

New York

542 Hosts

More Info

Risky Access Rules

UnsecureDevice

Configuration

NewVulnerabilities

VulnerabilityDensity

VulnerabilityExposure

ID SBV-296CVE-2002-0392Direct Exposure

ID SBV-37740CVE-2012-5955Direct Exposure

ID SBV-33883CVE-2011-4130Direct Exposure

ID SBV-492CVE-2001-0012Direct Exposure

ID SBV-897CVE-2002-0661Direct Exposure

Apache Chunked-Encoding Memory Corruption Vulnerability

IBM WebSphere 5.3 HTTP Server for z/OS Unspecified Remote Code Execution

ProFTPD<1.3.3g Response Pool Allocation Lists Use-After-Free Error

ISC BIND Internal Memory Disclosure Vulnerability

Apache 2.0 Encoded Backslash Directory Traversal Vulnerability

Vulnerability ExposureDirect Vulnerabilities: 5. Second Step Vulnerabilities: 0

London

New York

Paris

DubaiIsrael

Paris

Brazil

Russia

Sweden

US

312 Assets6 Firewalls

Site Details

Risky Access Rules

UnsecureDevice

Configuration

NewVulnerabilities

VulnerabilityDensity

VulnerabilityExposure

ID SBV-36114

CVE-2012-3136

ID SBV-55396

CVE-2015-8664

ID SBV-46432

CVE-2014-4073

ID SBV-47012

CVE-2014-4149

ID SBV-36637

CVE-2012-3137

Reported date: 8/30/2012

# Asset 80

Reported date: 12/23/20...

# Asset 112

Reported date: 10/14/20...

# Asset 33

Reported date: 11/11/20...

# Asset 33

Reported date: 09/20/2012

# Asset 25

Oracle Java SE 7 Update 6 and Earlier JRE Unspecified Remote

Vulnerability R...

Google Chrome <47.0.2526.106 Remote DoS or Unspecified Other Impact-

C...

[MS14-057] Microsoft .NET Framework Remote Privilege Escalation via

ClickO...

[MS14-072] Microsoft .NET Framwork Remote Code Execution via Crafter

Da...

[cpuoct2012-1515893, cpuoct2012-1515893] Oracle Database Server 10g2,...

Vulnerability Density

Last 6 Months

(Contributing Vulnerabilities: 1554, Vulnerable Assets: 303)

Mar 2016 May 2016Apr 2016 Jun 2016 Aug 2016Jul 2016 Current

Skybox Horizon | US

Page 5: TOMORROW’S SECURITY IS HERE · TOMORROW’S SECURITY IS HERE Do more with an integrated security analytics platform, the Skybox Security Suite FIREWALL ASSURANCE NETWORK ASSURANCE

8 9

Vulnerability and Threat ManagementSkybox Vulnerability Control and Threat Manager

Enterprise networks are under continuous threat from cybercriminals and advanced attackers, and they can have thousands of vulnerabilities at any given time. Skybox solutions for vulnerability control and threat management enable security professionals to respond effectively to new threat advisories and prioritize and mitigate critical attack vectors before they’re exploited.

[With Skybox] we can drive operations to mitigate only the most critical vulnerabilities, the ones that require immediate attention.

— Program Manager, USAID ISSO Team

Skybox Vulnerability Control Context–Aware Vulnerability Management

Skybox® Vulnerability Control goes beyond scanners, using analytics and the context of the attack surface to identify exposures, prioritize risks, fill in blind spots and quickly focus remediation efforts.

• View all vulnerabilities and pinpoint critical risk to eliminate exploitable attack vectors

• Assess the impact of a new vulnerability advisory in minutes, without waiting for a scan

• Add business, network and security control context to vulnerability analysis for more accurate prioritization

• Receive remediation guidance tailored to your environment

• Leverage vulnerability and attack vector intelligence, updated daily by the Skybox® Research Lab

Skybox Threat ManagerThreat Intelligence Analysis and Response

Skybox® Threat Manager keeps security leaders abreast of the latest threat intelligence, alerting to new advisories that could affect critical assets and highlighting focused response alternatives.

• Automate the collection and normalization of threat intelligence

• Enable fast correlation between threats and your IT infrastructure

• Get recommendations for remediation options

• Integrate ticketing workflow for remediation tracking

CHANGEMANAGER

VULNERABILITYCONTROL

FIREWALLASSURANCE

THREATMANAGER

NETWORKASSURANCE

Skybox Horizon

Attack Surface Visualizat

ion

Skybox Platform

Vulnerability and Threat Management

Security Policy Management

Page 6: TOMORROW’S SECURITY IS HERE · TOMORROW’S SECURITY IS HERE Do more with an integrated security analytics platform, the Skybox Security Suite FIREWALL ASSURANCE NETWORK ASSURANCE

10 11

Security Policy ManagementSkybox Firewall Assurance, Network Assurance and Change Manager

Maintaining continuous compliance is not easy. Security teams constantly deploy new applications, maintain existing ones and juggle multiple tiers of data architecture and next–generation network security technologies — all without room for error. Skybox solutions ensure that firewall rules and security policies enable connectivity without exposing the organization to risky attack vectors or violating compliance requirements.

Skybox Firewall AssuranceComprehensive Multi–Vendor Firewall Management

Skybox® Firewall Assurance brings all firewalls into a single view and continuously monitors policy compliance, optimizes firewall rulesets and finds attack vectors that others miss.

• Identify security policy violations and critical vulnerabilities to reduce your attack surface

• Visualize how network traffic may flow through firewalls to troubleshoot access issues

• Clean and optimize firewall rules to maintain firewall performance

CHANGEMANAGER

VULNERABILITYCONTROL

FIREWALLASSURANCE

THREATMANAGER

NETWORKASSURANCE

Skybox Horizon

Attack Surface Visualizat

ion

Skybox Platform

Vulnerability and Threat Management

Security Policy Management

Skybox Network AssuranceTotal Network Visibility and Control

Skybox® Network Assurance illuminates physical, virtual and cloud environments, complex network security zones and policy compliance violations, giving the insight needed to reduce attack vectors and network disruptions.

• Visualize and understand hybrid environments and the interactions of network devices and controls

• Analyze network paths between any source and destination — including virtualized networks — to uncover access issues and attack vectors

• Check security zones, routers and switches for configuration violations and vulnerabilities to ensure compliance

• Troubleshoot connectivity and network zoning in a virtual model to avoid disruption

Page 7: TOMORROW’S SECURITY IS HERE · TOMORROW’S SECURITY IS HERE Do more with an integrated security analytics platform, the Skybox Security Suite FIREWALL ASSURANCE NETWORK ASSURANCE

12

Skybox provides a fully fledged workflow that we can roll out to all of the key teams in IT. When they have a firewall change request, we will know it followed the appropriate steps and was validated and approved by the appropriate people.

— David Robinson, Security Consultant, Capita Customer Management

Skybox Change Manager Secure, Automated Firewall Change Workflow

Skybox® Change Manager ends risky firewall changes with network–aware planning and risk assessment. Speed up firewall change processes with customizable workflows and automation.

• Evaluate proposed firewall changes for compliance violations and exposed vulnerabilities

• Accurately identify firewalls in need of change using complete network context

• Translate change requests into a detailed plan for quick, error–free implementation and opt to push select changes live

• Automate and optimize rule life cycle management

• Customize workflows to match organizational needs

• Verify changes were completed as intended

Page 8: TOMORROW’S SECURITY IS HERE · TOMORROW’S SECURITY IS HERE Do more with an integrated security analytics platform, the Skybox Security Suite FIREWALL ASSURANCE NETWORK ASSURANCE

14

VULNERABILITY CONTROL

THREAT MANAGER

FIREWALLASSURANCE

NETWORKASSURANCE

CHANGEMANAGER HORIZON

Pantone Warm Red CPantone Warm Red U

Pantone 716 CPantone 716 U

Pantone 319 C Pantone 319 U

Pantone 361 CPantone 361 U

Pantone 527 CPantone 527 U

Pantone 7684 CPantone 662 U

Probably the most versatile and flexible product of its types that we have seen. There is nowhere near enough room on our page to cover all of its capabilities.

— SC Magazine,Risk and Policy ManagementGroup Test

5 STARS FOR GROUP TEST: VULNERABILITY AND THREATMANAGEMENT— SC Magazine

5 STARS FOR GROUP TEST: RISK AND POLICY MANAGEMENT— SC Magazine

NAMED AMONG WORLD’SHOTTEST SECURITY COMPANIES— Cybersecurity Ventures

1 OF THE 25 COOLESTNETWORK SECURITY VENDORS— CRN Magazine

SKYBOX® HORIZON NAMED THE MOSTINNOVATIVE PRODUCT OF THE YEAR — Cyber Security Awards

SKYBOX® HORIZON NAMED 1 OF 30 COOL NEW SECURITY PRODUCTS LAUNCHED AT RSA 2016— CRN Magazine

SKYBOX® HORIZON NAMED HOT SECURITY PRODUCT LAUNCHED AT RSA 2016— Network World

Next–generation firewalls introduced new complexity into our environment. Many competitors could not keep up. Skybox understood our environment and tackled innovation and virtualization head on.

— CISO of a Silicon Valley Financial Services Company

Page 9: TOMORROW’S SECURITY IS HERE · TOMORROW’S SECURITY IS HERE Do more with an integrated security analytics platform, the Skybox Security Suite FIREWALL ASSURANCE NETWORK ASSURANCE

www.skyboxsecurity.com [email protected]

Skybox arms security leaders with the broadest set of

solutions in security operations, analytics and reporting

(SOAR). The Skybox® Security Suite integrates with 100+

technologies and uses network modeling, attack vector

analytics and multi–factor vulnerability assessment to give

unprecedented visibility of the attack surface and key

indicators of exposure (IOEs). This gives security leaders

the insight needed for effective threat–centric vulnerability

management and automated firewall and security policy

management across physical, virtual and cloud networks.

TOTAL VISIBILITY. FOCUSED PROTECTION.™