Skybox Risk Control & Network Assurance v5.5
Strengths: Network mapping, risk correlation, simulation option; strong on audit logging, ability to understand IPS events.
Weaknesses: Business risk support and compliance control gaps.
Verdict: Great for mapping network and firewall configurations to corporate policy.
SummarySkybox Security provides a portfolio of automated tools. Skybox Risk Control and Skybox Network Assurance v5.5 can be used separately or together to help organizations address their risk management needs. The combined platform collects data from various networks, assessment tools and security products; normalizes that data into a single, common-view user interface; and provides risk analysis tools to map out remediation options. The tool is offered as either software or appliance.
The product works by importing the configuration data from all the various network and security solutions deployed in the enterprise. The admin defines the targets for data collection using the web-based user interface. The list of supported devices should cover most environments. Skybox also supports APIs for adding more "collector" tasks. New features in this version include Firewall Assurance, which takes into account user and applications settings when conducting firewall rule analysis, policy compliance audits, firewall change tracking and network access path analysis. There is also access path analysis at the firewall and network-level change tracking at the user and application level, expanded firewall rule compliance audits and platform configuration checks for network devices.
After interfacing the product to network, security and vulnerability scanning systems, it can configure policy and use all of the correlated data to determine adherence with those corporate policies. The firewall module has a nice checking capability to find things like duplicate rules and inadvertent rules that don't match stated policy. There is a useful change-tracking feature providing a solid audit log. There is a solid "what if" simulation tool for modeling changes. The network module works much the same way and builds an automated network map that is very helpful and customizable. There is also a useful attack simulation capability.