Skybox Overview 2022 03
Skybox Overview 2022 03
BIGGER
PICTURE
With Skybox Security
Arthur Dinevich
1
Scale and Complexity in modern organizations
2
Financial Service Government Energy & Technology &
Healthcare Consumer
Services Providers & Defense Utilities Manufacturing
3
This is Skybox…
Attack Surface visibility, combining topology, vulnerability,
and threat intelligence to prevent and contain attacks
4
4
Firewall /
Network
Security &
Infrastructure
Vulnerability
Management,
SIEM
Endpoint
Security
150+
Technology
Integrations
Hybrid
Infrastructure
(Cloud & OT)
5
Establish a Single Source of Truth
Vulnerability &
Asset Repositories Security Weaknesses
Infrastructures
Intelligence Feeds
On-Prem Network Devices
Public Intelligence Feeds
Public/Private Clouds
Scanner and App Feeds
OT Networks
Dark Web Sources
6
Corporate Private Cloud
Network
OT Public Cloud
• Hardening/Misconfiguration errors
PUBLIC CLOUD
Partner
VPN
• Critical/Exposed/Exploitable vulnerabilities
AWS AWS
Customers Production
VPN IPS
AWS
Development
OPERATIONAL
Web TECHNOLOGY OT
Server
App App
DMZ DB London
8
SEE THE
BIGGER
PICTURE
With Skybox Security
Functional details
9
THE BIGGER PICTURE
• Network Security Policy Management
• Vulnerability & Threat Management
IN ONE PLATFORM
10
Firewall Assurance
Comprehensive Multi-Vendor Policy Management
How It Works
1 2 3
12
Change Manager
Secure, Automated Change Management
How It Works
1 2 3 4 5
14
Network Assurance
Complete Visibility and Command of Hybrid Networks
Network Compliance
Network Model Security Analytics
Verification
How It Works
1 2 3
16
Vulnerability Control
Risk-based Vulnerability Management
How It Works
1
2
3
1 2 3 4
18
The Skybox Platform – Threat Intelligence
Skybox Threat Intelligence: The threat landscape is in constant change. The Skybox Research Lab has been at the
forefront in analyzing the latest cyber vulnerabilities and threats across the industry for over a decade. Our
customers leverage this verified and up-to-the minute contextualized threat intelligence that delivers insights on
vulnerabilities, intelligence and remediation options in one consolidated source.
19
Imminent
Threat
Exposed
Network topology, security controls Imminent Threat
and attack simulation analysis
Exploitable
Imminent Threat Threat intelligence feeds and
security analyst research
Critical Severity
Common Vulnerability Potential or Imminent threat
Scoring System (CVSS)
Occurrences
Potential Threat Scanner and scanless
vulnerability assessments
All Vulnerabilities
Potential Threat
NVD and other databases
20
Remediation and Mitigation Options
Patch
Requires Asset
Layer Insight
Upgrades
IPS Signature
Requires Network
FW/Security Tags
Layer Insight
Configuration
21
SEE THE
BIGGER
PICTURE
Thank You!
Q&A
22