Access member only content, take part in discussions with comments on blogs, news and reviews and receive all the latest security industry news directly to your inbox. Join now for free.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can start posting.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain @scmagazine.com.au to your white-listed senders.
Skybox Security provides a portfolio of automated tools. Skybox Risk Control and Skybox Network Assurance v5.5 can be used separately or together to help organizations address their risk management needs. The combined platform collects data from various networks, assessment tools and security products; normalizes that data into a single, common-view user interface; and provides risk analysis tools to map out remediation options. The tool is offered as either software or appliance. The product works by importing the configuration data from all the various network and security solutions deployed in the enterprise. The admin defines the targets for data collection using the web-based user interface. The list of supported devices should cover most environments. Skybox also supports APIs for adding more "collector" tasks. New features in this version include Firewall Assurance, which takes into account user and applications settings when conducting firewall rule analysis, policy compliance audits, firewall change tracking and network access path analysis. There is also access path analysis at the firewall and network-level change tracking at the user and application level, expanded firewall rule compliance audits and platform configuration checks for network devices. After interfacing the product to network, security and vulnerability scanning systems, it can configure policy and use all of the correlated data to determine adherence with those corporate policies. The firewall module has a nice checking capability to find things like duplicate rules and inadvertent rules that don't match stated policy. There is a useful change-tracking feature providing a solid audit log. There is a solid "what if" simulation tool for modeling changes. The network module works much the same way and builds an automated network map that is very helpful and customizable. There is also a useful attack simulation capability.
To begin commenting right away, you can log in below or register an account if you don't yet have one. Please read our guidelines on commenting. Offending posts will be removed and your access may be suspended. Abusive or obscene language will not be tolerated. The comments below do not necessarily reflect the views or opinions of SC Magazine, Haymarket Media or its employees.