Skybox Security Skybox 4000 v1.0
June 01, 2010
starts at $9,000 for software subscription and increases per licensing option selected
- Ease of Use:
- Value for Money:
- Overall Rating:
- Strengths: This product offers great modeling with a strong correlated controls view, great simulator and graphical views of risk.
- Weaknesses: The only drawback is the lack of real-time analysis. This is an after-the-fact risk analysis tool.
- Verdict: A great operational risk tool that has everything you need to measure, manage and enhance your enterprise security posture. We make this our Best Buy in this group
Skybox 4000 v1.0 is an operational risk management platform that collects data from various network assessment tools and security products, normalizes that data into a single, common-view user interface, and provides risk analysis tools to map out risk and remediation options.
The product works by importing the configuration data from all the various network and security solutions deployed in the enterprise. The admin defines the targets for data collection using the web-based user interface. The list of supported devices should cover most environments. If your product is not supported, Skybox supports APIs for adding more collector tasks and for providing data to portals and external workflow/ticketing systems. Using the configuration data, Skybox creates a network map based on the combined and correlated sets of rules. The product automatically normalize the data into its database, building a virtual network model representing the topology and traffic rules. Skybox then overlays data from vulnerability scanners to create the risk analysis.
The user interface is a menu-driven web-style interface. Capturing configuration data from devices can be automatic or manual depending on the device. We really liked the normalized view of all the combined configuration information. This feature can allow a security team member that may not be familiar with all the various point interfaces to see a consolidated set of security rules in one common, easy-to-read screen. There is a very nice simulator feature that allows you to "test" configuration or rule changes and picture what those changes would do to the overall enterprise security posture.
The product is sold as client-side software and deploys on Windows or Linux server platforms. There is a server component, including a backend database, a client-side Java-based client, and collectors for the collection of network data.
Eight-hours-a-day/five-days-a-week support is included with the product and additional 24/7 options are available for a fee.
This is a real nice operational risk management tool. It gives admins a complete, easy-to-use view of risk and truly helps with remediation decisions. The only drawback is that it is an after-the-fact tool and not a real-time analysis tool.
SC Magazine Articles
- USAA members hit with multiple phishing attacks
- Three zero-days found in iOS, Apple suggests users update their iPhone
- MedSec goes its own way with medical device flaw
- Two-thirds of IT security pros surveyed expect a breach to hit their company, report
- Juniper confirms leaked "NSA exploits" affect its firewalls, no patch released yet
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- Wendy's POS breach 'considerably' bigger than first thought
- No hacking required: Israeli researchers show how to steal data through PC components
- Don't connect your charging cell to a computer or you may get hacked!