sb-nz logo
Story image

Skybox Security launches update to simplify hybrid cloud risk management

17 Jun 2019

Cyber risk management company Skybox Security has announced the launch of Skybox Security Suite 10.

This product version aims to strengthen Skybox capabilities to simplify enterprise security management processes that oversee mass-scale, hybrid networks.

“The CISO’s biggest challenge is complexity,” says Skybox CEO and founder Gidi Cohen.

“It has become impossible for security teams to understand — let alone manage — security effectively in today’s multi-cloud, hybrid environments.

“The development behind Skybox 10 was done with the aim of making it easier to manage security policies in clouds, monitor risks to industrial control systems, and find important assets at risk,” Cohen says.

“We want to help CISOs maximise the value of their teams and their technology to secure and support the business.”

Skybox 10 brings an intuitive, customisable user experience to simplify management of vulnerabilities, security policies, firewalls and changes from a central solution.

Cloud and operational technology (OT) security insights are integrated for uniform risk management across hybrid networks.

Intelligent automation brings harmony and efficiency to multi-vendor environments, integrating data and yielding contextual insight.

Customers can also use the new REST API to leverage Skybox intelligence in other tools and processes, increasing their ROI.

Skybox 10 also includes several new integrations including Splunk, ElasticSearch and ServiceNow, as well as Twistlock which provides visibility to the security of containers in cloud-native applications.

The biggest changes are found in the vulnerability management module, Skybox Vulnerability Control. 

The new release provides fast access to vulnerability insights through fully customisable dashboards and reports.

New, flexible risk scoring allows users to replace generic severity scores with context-based scores unique to their environment; this prioritisation method shrinks the workload to focus on exposed and exploitable vulnerabilities — typically less than one percent of an organisation’s occurrences.

“Risk scoring is one of those things that’s so simple on its face, but in reality, there’s a hugely detailed process going on under the hood,” says Skybox Security products VP Amrit Williams.

“Our methodology goes beyond CVSS severity and exploitability, taking into account asset importance, exposure within the network and more.

“We want to make it easy to determine which assets are at risk and see if an existing security control can be used to protect against an attack, even without a patch. This is critical to knowing which risks require immediate attention and which ones can wait for scheduled remediation.”

Osterman Research principal analyst Michael Osterman says, “For the last decade, accurate risk prioritisation has been the thing that eludes enterprises and can lead to serious damage.”

“Having a way to bring the right vulnerabilities — and vulnerable assets — to light with an approach that quantifies exposure and exploitability will be hugely valuable.”

Story image
How the editorial team works at Techday: Our tips for you
Preparing your releases in a particular way will not only make our lives easier, but improve the chances of your lead being picked among the masses.More
Story image
BackupAssist partners with Wasabi for greater cyber-resilience
This partnership provides customers with an up to 80% less expensive solution that is faster than the competition for achieving enterprise-grade cyber-resilience, the company states. More
Story image
As digital transformation grows in A/NZ companies, misconceptions about their role in cloud security abound
While an 81% majority of A/NZ organisations are accelerating their digital transformation, a giant 99% of surveyed respondents say they believe their cloud security provider provides enough protection, according to a Trend Micro study. More
Story image
Cybersecurity strategies must involve every part of the organisation - study
In the past year, a third of the breaches incorporated social engineering techniques and the cost of a breach caused by a human error averaged to $3.33 million. More
Story image
Cyberattacks on healthcare organisations "out of control" - Check Point
There has been a 45% increase in cyberattacks on healthcare organisations worldwide in the last two months, making healthcare the most targeted industry by cyber criminals.More
Story image
Red Hat to acquire Kubernetes-native security provider StackRox
Red Hat will further expand its security offering, adding StackRox's complementary capabilities to strengthen integrated security across its open hybrid cloud portfolio.More