Welcome!

News Feed Item

Skybox Security Introduces Vulnerability Remediation Dashboard in Risk Control 7.0

Skybox Security, the leading provider of risk analytics for cyber security, launched Skybox Risk Control 7.0, a comprehensive vulnerability management solution. Highlighting the Risk Control 7.0 release is a new remediation dashboard, which provides a central view for IT security professionals to effectively monitor and track vulnerability remediation activities in large organizations. Today, hackers frequently exploit vulnerabilities in servers, desktops and network devices to breach information system defenses to launch attacks, spread viruses and malware and steal confidential data.

Skybox’s context-aware remediation approach allows IT practitioners to automatically convert volumes of vulnerability data into detailed remediation instructions, supporting an end-to-end vulnerability management process that is 50 times faster than traditional solutions. Skybox identifies concentrations of vulnerabilities by vendor, business unit, security bulletins, or by geographic location in a company, enabling organizations to reduce overall vulnerability levels quickly, with minimal effort. In addition, Skybox uses attack simulation and its comprehensive view of network topology to identify specific attack vectors against critical assets.

“Skybox Security allows security teams to address and remediate risks every single day,” said Gidi Cohen, CEO of Skybox Security. “Most enterprises take months to discover, prioritize and remediate vulnerabilities, and hackers take advantage of that time lapse. Using Skybox Risk Control for vulnerability management, our customers meet challenging internal requirements to deliver same-day identification and resolution of critical vulnerabilities. This is impossible to achieve using traditional vulnerability management approaches.”

Created for security managers who are responsible for taking action on found vulnerabilities, the remediation dashboard provides a centralized view to monitor and track the vulnerability remediation process against defined service level agreements (SLAs). Security metrics track resolution of vulnerabilities against goals, such as fixing high-priority vulnerabilities within a defined period of time, or achieving a target rate of found versus fixed vulnerabilities, and provide a breakdown of vulnerabilities that meet the SLA and those that do not.

The remediation dashboard guides daily remediation efforts by providing a prioritized list of vulnerabilities and presenting multiple remediation alternatives to block or mitigate known vulnerabilities, such as patching, IPS shielding, configuration changes, or a prioritized list of security bulletins that should be applied.

The remediation dashboard completes Risk Control’s three-step workflow to simplify vulnerability management for enterprise-scale organizations:

  • The Discovery Center provides a centralized view of the initial vulnerability assessment process, including quick access to vulnerability data gathered from third-party scanners or Skybox’s scanless Vulnerability Detector.
  • The Analytics Center uses sophisticated risk analytics and the Skybox Vulnerability Database to eliminate irrelevant vulnerability data and provide an accurate, prioritized picture of risk.
  • Finally, the Remediation Center, featuring the new vulnerability remediation dashboard, supports fast resolution to achieve desired security objectives.

Additional enhancements for Skybox’s vulnerability management solution, based on Risk Control, include Vulnerability Detector, providing scanless non-disruptive vulnerability detection at speeds of 100,000 hosts per hour. By comparison, the typical rate of a traditional active scanner is 250 hosts/hour.

Risk Control’s Vulnerability Detector supports Microsoft Windows, Linux, VMWare, Citrix, Apple Mac OS and various Unix operating systems; network devices from Cisco, Check Point, Juniper Networks, and F5; and popular enterprise end user applications such as web browsers, Microsoft Office, Adobe Flash Player, Adobe Reader, Skype, and Microsoft Lync.

With Skybox’s vulnerability management solution, a leading UK financial services team was able to take action on critical risks the same day the vulnerabilities were detected. And Repsol, a Spanish multinational oil and gas company, has been able to significantly reduce the number of false positives from 20 percent to less than 1 percent, allowing it to focus accurately on high-priority risks.

Skybox will be demonstrating the Risk Control 7.0 and the Remediation Center at RSA Conference USA 2014. For more information, please visit Booth 715, South Hall.

About Skybox Security, Inc.

Skybox Security, Inc. provides the most powerful risk analytics for cyber security, giving security management and operations the tools they need to eliminate attack vectors and safeguard business data and services. Skybox solutions provide a context-aware view of the network and risks that drives effective vulnerability and threat management, firewall management, and continuous compliance monitoring. Organizations in Financial ServicesGovernment, Energy, DefenseRetail, and Telecommunications rely on Skybox Security every day for automated, integrated security management solutions that lower risk exposure and optimize security management processes. For more information visit: www.skyboxsecurity.com.

NOTE: Skybox® Security is a registered trademark of Skybox Security Inc. All other registered and unregistered trademarks herein are the sole property of their respective owners. Product specifications subject to change at any time without prior notice. © 2014 Skybox Security, Inc. All rights reserved.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
The best way to leverage your Cloud Expo presence as a sponsor and exhibitor is to plan your news announcements around our events. The press covering Cloud Expo and @ThingsExpo will have access to these releases and will amplify your news announcements. More than two dozen Cloud companies either set deals at our shows or have announced their mergers and acquisitions at Cloud Expo. Product announcements during our show provide your company with the most reach through our targeted audiences.
Traditional on-premises data centers have long been the domain of modern data platforms like Apache Hadoop, meaning companies who build their business on public cloud were challenged to run Big Data processing and analytics at scale. But recent advancements in Hadoop performance, security, and most importantly cloud-native integrations, are giving organizations the ability to truly gain value from all their data. In his session at 19th Cloud Expo, David Tishgart, Director of Product Marketing ...
DevOpsSummit New York 2018, colocated with CloudEXPO | DXWorldEXPO New York 2018 will be held November 11-13, 2018, in New York City. Digital Transformation (DX) is a major focus with the introduction of DXWorldEXPO within the program. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term.
Machine Learning helps make complex systems more efficient. By applying advanced Machine Learning techniques such as Cognitive Fingerprinting, wind project operators can utilize these tools to learn from collected data, detect regular patterns, and optimize their own operations. In his session at 18th Cloud Expo, Stuart Gillen, Director of Business Development at SparkCognition, discussed how research has demonstrated the value of Machine Learning in delivering next generation analytics to impr...
Andi Mann, Chief Technology Advocate at Splunk, is an accomplished digital business executive with extensive global expertise as a strategist, technologist, innovator, marketer, and communicator. For over 30 years across five continents, he has built success with Fortune 500 corporations, vendors, governments, and as a leading research analyst and consultant.
The challenges of aggregating data from consumer-oriented devices, such as wearable technologies and smart thermostats, are fairly well-understood. However, there are a new set of challenges for IoT devices that generate megabytes or gigabytes of data per second. Certainly, the infrastructure will have to change, as those volumes of data will likely overwhelm the available bandwidth for aggregating the data into a central repository. Ochandarena discusses a whole new way to think about your next...
Extreme Computing is the ability to leverage highly performant infrastructure and software to accelerate Big Data, machine learning, HPC, and Enterprise applications. High IOPS Storage, low-latency networks, in-memory databases, GPUs and other parallel accelerators are being used to achieve faster results and help businesses make better decisions. In his session at 18th Cloud Expo, Michael O'Neill, Strategic Business Development at NVIDIA, focused on some of the unique ways extreme computing is...
"We do one of the best file systems in the world. We learned how to deal with Big Data many years ago and we implemented this knowledge into our software," explained Jakub Ratajczak, Business Development Manager at MooseFS, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
CI/CD is conceptually straightforward, yet often technically intricate to implement since it requires time and opportunities to develop intimate understanding on not only DevOps processes and operations, but likely product integrations with multiple platforms. This session intends to bridge the gap by offering an intense learning experience while witnessing the processes and operations to build from zero to a simple, yet functional CI/CD pipeline integrated with Jenkins, Github, Docker and Azure...
Today, we have more data to manage than ever. We also have better algorithms that help us access our data faster. Cloud is the driving force behind many of the data warehouse advancements we have enjoyed in recent years. But what are the best practices for storing data in the cloud for machine learning and data science applications?
The hierarchical architecture that distributes "compute" within the network specially at the edge can enable new services by harnessing emerging technologies. But Edge-Compute comes at increased cost that needs to be managed and potentially augmented by creative architecture solutions as there will always a catching-up with the capacity demands. Processing power in smartphones has enhanced YoY and there is increasingly spare compute capacity that can be potentially pooled. Uber has successfully ...
All zSystem customers have a significant new business opportunity to extend their reach to new customers and markets with new applications and services, and to improve the experience of existing customers. This can be achieved by exposing existing z assets (which have been developed over time) as APIs for accessing Systems of Record, while leveraging mobile and cloud capabilities with new Systems of Engagement applications. In this session, we will explore business drivers with new Node.js apps ...
Using new techniques of information modeling, indexing, and processing, new cloud-based systems can support cloud-based workloads previously not possible for high-throughput insurance, banking, and case-based applications. In his session at 18th Cloud Expo, John Newton, CTO, Founder and Chairman of Alfresco, described how to scale cloud-based content management repositories to store, manage, and retrieve billions of documents and related information with fast and linear scalability. He addres...
The technologies behind big data and cloud computing are converging quickly, offering businesses new capabilities for fast, easy, wide-ranging access to data. However, to capitalize on the cost-efficiencies and time-to-value opportunities of analytics in the cloud, big data and cloud technologies must be integrated and managed properly. Pythian's Director of Big Data and Data Science, Danil Zburivsky will explore: The main technology components and best practices being deployed to take advantage...
For years the world's most security-focused and distributed organizations - banks, military/defense agencies, global enterprises - have sought to adopt cloud technologies that can reduce costs, future-proof against data growth, and improve user productivity. The challenges of cloud transformation for these kinds of secure organizations have centered around data security, migration from legacy systems, and performance. In our presentation, we will discuss the notion that cloud computing, properl...