Vendor: Skybox Security
- Attack Simulation conducts millions of path analysis queries, providing a picture of overall asset exposure to help analysts define risk by understanding what exposure looks like.
- The web client does not do everything the Java client does.
- The platform gives complete visibility into risk by modeling the entire attack surface for insight into reducing risk and maintaining security posture through both automation and orchestration.
SC Labs Reviews
Reviews from our expert team
Skybox Security Platform enhances scan data by applying compliance to the entire hybrid network and serving as a single source of truth of what happens after a vulnerability is found. It can be deployed on a hardware appliance, as a virtual appliance or installed via AMI through AWS. Organizations also can deploy it on VMware as a virtual appliance. Skybox traditionally has used a Java client, but recently released a web client. The company plans to move this product exclusively to the web client in the future.
The web client isn’t as robust as the Java client, and although the plan is to migrate away from Java in the future, this inconsistency diminishes the product’s current overall ease-of-use.
The platform provides complete visibility into risk by modeling the entire attack surface, offering insight into reducing risk and maintaining security posture via both automation and orchestration. Four different modules make up the platform: Vulnerability Control, Firewall Assurance, Network Assurance and Change Manager. Regardless of which module is chosen as the starting point upon login, security pros can access any of the other three.
Vulnerability Control receives vulnerability data from scanners and assigns a number to rank and track risk over time. Scores are customized per business needs. The Attack Simulation feature within Vulnerability Control helps analysts understand what exposure looks like so they can define risk. Millions of path analysis queries provide a picture of overall asset exposure that can raise vulnerability risk levels.
Risk prioritization and asset classification put the focus where it is needed most. Cross-checking severity with exploitability, exposure and asset importance offers an accurate view of security posture so companies can feasibly assess risk and vulnerabilities.
Firewall Assurance automates firewall management tasks across an infrastructure with continuous monitoring for optimum firewall functionality. The tasks extend well beyond rule checks and analyze possible traffic between zones in order to find hidden risk.
Through Network Assurance, organizations get seamless visibility across all networks to validate security policies, which can either be out-of-the box or customized configurations. Observations are translated into on-demand reporting.
Starting price is $13,542. Phone, email, web-based support, a knowledgebase and FAQs are available 9 a.m. to 5 p.m., included standard with subscription. For an additional charge, Premium support is available 24/7. An Advanced Monitoring Service option is offered for an additional fee.
Tested by Matthew Hreben