SAN JOSE, Calif.--(BUSINESS WIRE)--Skybox Security, a global leader in Security Posture Management, today unveiled new automated cyber risk quantification capabilities. Leveraging its proprietary network modeling techniques, Skybox now quantifies the business impact of cyber risks into economic impact. This new financial calculation enables customers to identify and prioritize the most critical threats based on the size of financial impact, among other risk analyses.
"Other industry solutions are only capable of secondary risk assessment based on asset importance. To develop an accurate risk calculation, you need the network modeling, exposure management, and path analysis that only Skybox can deliver," said Gidi Cohen, CEO and Founder, Skybox Security. "Actual and timely risk reduction is how we ultimately define customer success. That can be achieved only with a proactive, risk-based approach to managing your security posture."
Skybox Security continues to evolve its platform through new innovations and technology integrations to solve critical customer cybersecurity challenges. The new Skybox cyber risk quantification capabilities elevate the role of cybersecurity and enable CISOs to:
- Prioritize critical cyber risks based on vulnerabilities that are exposed and exploited in the wild
- Target risk mitigation on the most significant risks with remediation options that go beyond patching
- Make data-driven decisions as they navigate the risks and opportunities of digital transformation
- Calculate ROI of cybersecurity budgets to validate investments and report on the financial impact
According to Forrester Research: "Even with unlimited budget and resources, it would be impossible and impractical for the security organization to address every single threat. The fast moving and evolving nature of cyberattacks requires CISOs to act quickly and decisively to mitigate those risks with the greatest impact on the business. By quantifying assets and expressing the dollar value at risk from cyberevents, CISOs can target their risk mitigation strategies on the most significant risks with most consequence to the firm."1
Vulnerability lifecycle management algorithm expands to AWS, Microsoft Azure, and Google Cloud Platform
Skybox Security also expanded its industry-leading exposure analysis and vulnerability management capabilities to the three leading public cloud providers – Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). Available now, these new capabilities provide customers with continuous, precise risk assessment and vulnerability prioritization within hybrid cloud deployments.
By extending its industry-leading IT/OT exposure management capabilities to the leading cloud services providers, customers reap the following benefits:
- Asset and vulnerability discovery – For comprehensive visibility, Skybox discovers blind spots that active scanning solutions can't reach. As a result, customers gain a complete picture of their unique hybrid attack surface. The Skybox Platform aggregates multi-vendor scan data from across a customer's environments and discovers vulnerabilities across unscannable cloud workloads.
- Vulnerability prioritization – Finds and identifies the gaps an adversary will exploit first by analyzing exploitability, criticality, asset importance, and exposure. The Skybox algorithm prioritizes risk using a flexible, customizable formula that can be tailored to a customer's unique business. The platform identifies the most effective remediation options, including network-based compensating controls to supplement patches and software updates for a defense-in-depth approach.
- Network modeling and attack surface visualization – Security Architects can model how risks are mitigated with a layered combination of alternative native, custom, and other security controls. The Skybox network model enables path analysis and attack simulation to identify exposed vulnerabilities.
- Targeted attack remediation – The Skybox Security network model identifies potential attack paths, enabling customers to prioritize which security controls will mitigate a threat or an attack. In addition to identifying redundant, weak, or risky rules, Skybox enables faster audit compliance reporting because of its comprehensive security control reports.
- Integration with IT Service Management Tools (ITSM) – Improve decision-making and ITSM performance with an integrated view of how well security and IT teams are managing cybersecurity risks. ITSM integrations support strategic planning and an aligned approach to reducing cyber risk across the business.
- De-risk IT/OT convergence – The cornerstone of an effective cybersecurity strategy is a comprehensive single pane of glass view of assets and vulnerabilities spanning IT, OT, and cloud environments. Skybox aggregates vulnerability information from active scanning solutions (such as traditional Vulnerability Assessment scanners), specialized passive scanning-based OT security platforms, and its unique scanless detection techniques to deliver the industry's most advanced Vulnerability Management solution.
Network model innovations advance attack simulation and path analysis automation
The latest release also includes major network model updates that significantly increase customer time to value and real-time exposure analysis through faster aggregation across customers' disparate tech stacks and security toolkits. Skybox Security is the only solution that builds an extensive model of a customer's unique hybrid environment, including all L3 devices.
The network model is continuously updated, incorporating customer scan data and proprietary threat intelligence feeds from the Skybox Research Lab. The network model's top customer use cases include conducting path analysis, performing attack simulations. analyzing network configuration, verifying proper network segmentation, assessing security controls, and highlighting broken paths.
"Many customers struggle to understand and visualize the complete topology of their hybrid network and correctly assess exposure of their critical assets. A new Skybox innovation now automatically determines and adds missing network elements to build a complete network model," said Haggai Polak, Chief Product Officer, Skybox Security. "This is a game-changer for customers who don't have the resources or visibility needed to feed all their data sources into the model. As a result of this innovation, customers are delivered an accurate picture of their attack surface within hours. In addition, the model can bridge organizational silos by delivering a comprehensive view of the complex, heterogeneous IT, hybrid cloud, and OT estate that multiple enterprise teams can reference as a single source of truth."
1 Transform Cyber Risk with Cyber Risk Quantification, Forrester Research, Inc., January 28, 2022.
Additional resources
- Secure cloud adoption and migration
- Skybox Research Lab 2022 vulnerability and threat trends report
- Network visibility and contextual insight power network security management
About Skybox Security
Over 500 of the world's largest and most security-conscious enterprises rely on Skybox for the insights and assurance required to stay ahead of dynamically changing attack surfaces. At Skybox, we don't just serve up data and information. Instead, we provide the intelligence and context to make informed decisions, taking the guesswork out of securely enabling enterprises at scale and speed. Our unified security posture management platform delivers complete visibility, analytics, and automation to quickly map, prioritize, and remediate vulnerabilities across your organization. The vendor-agnostic platform intelligently optimizes security policies, actions, and change processes across all corporate and cloud environments. With Skybox, security teams can focus on the most strategic business initiatives while ensuring that enterprises remain protected.
https://www.skyboxsecurity.com
© 2022 Skybox Security, Inc. All rights reserved. Skybox Security and the Skybox Security logo are either registered trademarks or trademarks of Skybox Security, Inc., in the United States and/or other countries. All other trademarks are the property of their respective owners. Product specifications subject to change at any time without prior notice.