TECH DIGITAL RESOURCE LIBRARY

Skybox Security

Skybox Security's automated security risk and compliance management solutions help IT organizations pinpoint and prioritize security risks, compliance and availability exposures within minutes. These solutions automatically collect and analyze comprehensive data about network topology and systems, configuration settings, threats and vulnerabilities - anticipating the most urgent IT concerns before harm has been done.

Our Website: http://www.skyboxsecurity.com


Latest Content From Skybox Security

Research Report: 2017 Security Management Outlook: Five Trends to Watch

by Skybox SecurityJan 27, 2017

Cybersecurity can't sit still. As we look ahead to what this year has in store for the security management landscape, organizations globally should be paying attention to five key trends. Download this report to learn what they are.


Infographic: Indicators of Compromise vs Indicators of Exposure

by Skybox SecurityJan 27, 2017

An ounce of prevention is worth a pound of cure.
While indicators of compromise give valuable insight to past cyber-events, it's difficult to use them as early warning signs of potential attacks. Combining them with the new approach of indicators of exposure can power proactive, unified cybersecurity.


Webcast: Is Your Vulnerability Management Program Keeping Pace With Risks?

by Skybox SecurityDec 05, 2013

To effectively reduce the risks of cyber attacks, comply with continuous monitoring requirements, and provide visibility to executives, organizations need to manage their vulnerabilities and associated risks continuously. This is required in order to match or exceed the daily rate of attacks.

Why bother to assess your risks every 90 days when new threats are unleashed every day?

Register for this webcast to see how you can:

  • Transform vulnerability discovery from a ‘round robin’ schedule to continuous monitoring for vulnerabilities
  • Prioritize vulnerabilities based on exploitability and potential business impact
  • Focus remediation efforts and track progress to show a measurable reduction of risk
  • Make vulnerability management an essential part of daily change management processes


This webcast will include case studies, survey data, and best practices – ideal for IT security practitioners who are considering, or already implementing, next-generation vulnerability management to effectively and measurably mitigate risk.

Register Now.


Webcast: Next-Gen Firewall Management - Take advantage of advanced threat protection with IPS

by Skybox SecurityNov 22, 2013

Next-generation firewalls offer robust protection against complex attacks by integrating firewalls with intrusion-prevention systems (IPS). In a recent survey, nearly 95 percent of respondents said embedded threat-protection was among their top reasons for moving to a next-generation firewall platform.

Yet many enterprises are still hindered by transitioning policies and other firewall-migration challenges. Also, most are still only in the early stages of understanding how IPS signatures can work effectively in their IT environments.

Join this InformationWeek webcast, and you will learn:

  • New techniques for evaluating and managing the advanced threat protection offered by next-generation firewalls.
  • Tips to shorten and optimize your migration to a mature, next-generation firewall.
  • Best practices for upgrading to a next-generation firewall.
  • How IPS signatures can help your organization move quickly into "active protection" mode.


Are you ready to protect your enterprise with the next generation of firewalls and intrusion prevention? Then register now to attend this free webcast!


Whitepaper: Preparing for Compliance with General Data Protection Regulation

by Skybox SecurityMar 06, 2017

A Technology Guide for Security Professionals

The General Data Protection Regulation (GDPR) is the latest amplification of the European Union's data security requirements that articulates measures to protect individuals and holds organizations accountable for data security.

When it goes into effect, GDPR can apply widely to various organizations, including many without a physical presence in the European Union. This SANS report explores this lengthy, complex regulation by focusing on the key steps your organization needs to take in order to comply. This includes:

  • How to get ready for the regulation
  • How to identify a Data Protection Officer and what this person needs to know to be effective in this role
  • Steps toward a checklist for compliance with concise, practical information your organization can begin using now


Whitepaper: Rule-Driven Profiling:A Next-Generation Approach to Vulnerability Discovery

by Skybox SecurityApr 03, 2013

Vulnerability scanning, or the process of identifying a list of known security gaps in the network environment, is the focal point for most enterprise vulnerability management programs. Before any action can be taken to assess risks or prioritize vulnerabilities for remediation � you have to know the extent of your vulnerability challenge.

The use of vulnerability scanners as security assessment tools is nearly ubiquitous in large organizations. Regular network scans are recommended by security industry best practices and required by numerous regulations. However, as network infrastructures have grown more complex and identified vulnerabilities have multiplied, the effectiveness of vulnerability scanning as a security management tool has declined.

In a June 2012 Skybox Security survey, enterprise IT personnel reported several major challenges that limited their use of traditional active vulnerability scanning. Respondents indicated that there were concerns about disrupting critical business services due to the active probing of hosts; some hosts were not scannable due to their system characteristics or other factors; and security teams were often unable to keep up with the amount of analysis and remediation work necessary to resolve found issues.

This white paper reviews Skybox�s new approach to vulnerability discovery:

�Finding vulnerabilities without an active scan
�Vulnerability discovery with Rule-Driven Profiling
�Data sources for product profiling
�Key benefits of Rule-Driven Profiling
�Mixing Rule-Driven Profiling and traditional active scanning


Whitepaper: Skybox Security Survey:Next-Generation Firewall Management

by Skybox SecurityApr 03, 2013

Organizations struggle to realize benefits of next-generation firewalls

Learn what IT professionals had to say about adopting and migrating to next-generation firewalls at their organizations, including adoption drivers, priorities, and the challenges they encounter.

The Skybox Security Next-Generation Firewall Survey 2012, conducted in conjunction with Osterman Research, polled more than 200 respondents worldwide in varying information security and C-level roles involved in the IT decision making process.

Among the findings:

�There will be significant deployment of next-generation firewalls over the next 12 months, with North American and European respondents reporting similar current and future deployment plans

�Yet, each region has its own set of migration concerns:Planning architecture changes and validating correct operation of NGFWs are the top concerns for North American respondents
� Europeans listed process changes and staff training as the top concerns

�The median time to migrate to next-generation firewalls is 6 months

� 46% of North American organizations and 60% of European organizations manage more than 100 rules per firewall - Europeans reported more than twice the number of rule changes per month, 273 vs 123

� 93% of organizations use or plan to use the IPS module of their NGFW; 62% in active management


Whitepaper: Skybox Security Vulnerability Management Survey

by Skybox SecurityApr 03, 2013

Survey reveals pitfalls of traditional vulnerability scanners

Learn what IT professionals had to say about vulnerability management programs at their organizations, including how often and what zones they scan, and the challenges they encounter.

The Skybox Security Vulnerability Management Survey 2012, conducted in conjunction with Osterman Research, polled more than 100 IT decision makers including security managers, and network and systems engineers involved in vulnerability management processes.

Among the findings:

�   90% of firms have a vulnerability management program and consider it a priority
�   49% have experienced a cyber attack in the past 6 months
�   Large organizations tend to scan more frequently and with greater coverage
�   The top reasons for not scanning more often are concerns about disruptions and lacking resources for analysis or patching activity


Whitepaper: The 451 Group Impact Report: Skybox Enters Vulnerability Management Space

by Skybox SecurityApr 03, 2013

New vulnerabilities are discovered at a rapid rate, so in order to discover and defend against them, companies conduct vulnerability scanning. However, the frequency and coverage of scans provide increasing challenges for some organizations. Active scanning can be disruptive if conducted excessively, and there are some parts of the network that companies don't feel comfortable scanning at all. In order to address this problem, Skybox Security has introduced what it refers to as its next-generation vulnerability management product that discovers vulnerabilities without the need for an active scan.