SlideShare a Scribd company logo
Skybox Security:
Take Charge of Risk!
Security Leaders Choose Skybox
Financial
Services

Service
Providers

Energy &
Utilities

Gov &
Defense

Others

6 OF THE TOP 10 GLOBAL BANKS
6 OF THE TOP 10 NATO COUNTRIES

© 2014 Skybox Security Inc.

2
Security Management Challenges
Problem: “Swivel chair integration”
Firewall & Change
Management

No
Network
Context

© 2014 Skybox Security Inc.

Vulnerability
Management

Threat
Response

Slow to
respond

Too
much data
3
Skybox: Visibility, Intelligence, Control
Automate
security
tasks

Visualize
network
security

FIREWALL &
CHANGE
MANAGEMENT

TAKE ACTION FAST!
THREAT
RESPONSE

VULNERABILITY
MANAGEMENT

Identify
attack
vectors
© 2014 Skybox Security Inc.

4

Prioritize
critical
risks
Skybox Builds a Model of the Network
Layer 3

Routing

© 2014 Skybox Security Inc.

Threats

Vulns

5

Assets

Log Data

Policies
Comprehensive Network Context

√ All and more integrated with Skybox
© 2014 Skybox Security Inc.

6

6
Analytics Find the Real Risks, Fast
Vulnerabilities

Rogue Admin

 CVE 2013-0640
 CVE 2012-1895
 CVE 2013-0093

Internet
Hacker

Attack
Simulation

Compromised
Partner
© 2014 Skybox Security Inc.

7
Network Security Management
with Skybox
Model
Network

Analyze
Firewalls

Monitor
Compliance

Manage
Changes
Change
Request

 Network

 Rule and

 Automatic

topology view
 Normalize data
from 80+
systems
 Access
simulation

configuration
checks
 Access path
analysis
 Optimize rules
 Track changes

audits
 PCI DSS,
FISMA, NERC,
NIST…
 Custom
Policies

Understand
network context
© 2014 Skybox Security Inc.

Automate
assessments

Verify controls
continuously
8

Tech
Details
Assess
Risks
Make
Change

Reconcile
Verify

Optimize
change process
Vulnerability and Threat Management
with Skybox
Discover

Analyze

Prioritize

 Scanless

 Vulnerability hot

vulnerability
detection
 Import 3rd
party VA scans
 Threat intel

spots
 Attack simulation technology
 Network context  Attack vectors
 Business impact  Heat maps

Up-to-date, less
disruption
© 2014 Skybox Security Inc.

 Risk exposure
 Geo or

Find areas of
greatest impact

Reduce risk
exposure
9

Remediate
and Track

 Remediation
planning
 Ticketing and
workflow
 Dashboards
and reporting

Manage
effectively
Success Stories

Reinventing Security Management
Vulnerability Management – Accurate and Fast

 From once a month scanning to continuous
view of vulnerabilities
 False positives rate dropped from 20%+ to <1%
 Reduced incident response from weeks to hours!
Network Security – Continuous Compliance


Now able to easily manage 1000 firewalls, 40,000 rules
 Daily compliance with ISO27001, SOX
 From weeks to analyze, to security diagnosis in minutes
© 2014 Skybox Security Inc.

10
Take Charge, Take Control of Risk!
Vulnerability Management Comparison
TRADITIONAL TOOLS

© 2014 Skybox Security Inc.

SKYBOX SECURITY

11
Make sure you are registered to WIN an
e-Zip E750 Electric Scooter

Thank you

www.skyboxsecurity.com

© 2014 Skybox Security Inc.

12

More Related Content

PDF
Infosec 2014: Who Is Skybox Security?
PPTX
Network Security Trends for 2016: Taking Security to the Next Level
PPTX
Risk Analytics: One Intelligent View
PDF
Infosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
PDF
Black Hat 2014: Don’t be a Target: Everything You Know About Vulnerability Pr...
PPTX
Network Security Best Practices - Reducing Your Attack Surface
PPTX
What's Wrong with Vulnerability Management & How Can We Fix It
PPTX
5 Steps to Reduce Your Window of Vulnerability
Infosec 2014: Who Is Skybox Security?
Network Security Trends for 2016: Taking Security to the Next Level
Risk Analytics: One Intelligent View
Infosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
Black Hat 2014: Don’t be a Target: Everything You Know About Vulnerability Pr...
Network Security Best Practices - Reducing Your Attack Surface
What's Wrong with Vulnerability Management & How Can We Fix It
5 Steps to Reduce Your Window of Vulnerability

What's hot (20)

PPTX
Using a Network Model to Address SANS Critical Controls 10 and 11
PDF
Best Practices for Network Security Management
PPTX
#ALSummit: Accenture - Making the Move: Enabling Security in the Cloud
PPTX
A Call to Arms: Using a Working Model of the Attack Surface to Improve Incide...
PPTX
#ALSummit: Realities of Security in the Cloud
PDF
Top 5 Cloud Security Predictions for 2016
PPTX
Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...
PDF
Security Starts at the Endpoint
PDF
Web App Attacks - Stats & Remediation
PDF
Introduction to Azure Sentinel
PPTX
#ALSummit: Architecting Security into your AWS Environment
PDF
Securing Your Business #3 - Role Of The Service Provider
PPTX
How to Rapidly Identify Assets at Risk to WannaCry Ransomware
PDF
Pervasive Security Across Your Extended Network
PPTX
Azure Sentinel
PDF
Cisco Security Presentation
PDF
Midsize Business Solutions: Cybersecurity
PPTX
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...
PDF
Security Whack-a-Mole: SANS 2017 Threat Landscape Survey
PPTX
Automating Critical Security Controls for Threat Remediation and Compliance
Using a Network Model to Address SANS Critical Controls 10 and 11
Best Practices for Network Security Management
#ALSummit: Accenture - Making the Move: Enabling Security in the Cloud
A Call to Arms: Using a Working Model of the Attack Surface to Improve Incide...
#ALSummit: Realities of Security in the Cloud
Top 5 Cloud Security Predictions for 2016
Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...
Security Starts at the Endpoint
Web App Attacks - Stats & Remediation
Introduction to Azure Sentinel
#ALSummit: Architecting Security into your AWS Environment
Securing Your Business #3 - Role Of The Service Provider
How to Rapidly Identify Assets at Risk to WannaCry Ransomware
Pervasive Security Across Your Extended Network
Azure Sentinel
Cisco Security Presentation
Midsize Business Solutions: Cybersecurity
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...
Security Whack-a-Mole: SANS 2017 Threat Landscape Survey
Automating Critical Security Controls for Threat Remediation and Compliance
Ad

Similar to RSA 2014: Skybox Security Risk Analytics Overview (20)

PPTX
Cloud Computing Security Essentials for beginners
PPTX
The Notorious 9 Cloud Computing Threats - CSA Congress, San Jose
PDF
ArticWolf - Securing Amazon AWS & Microsoft Azure.pdf
PPTX
CSS 17: NYC - Realities of Security in the Cloud
PDF
Get ahead of cloud network security trends and practices in 2020
PPTX
CSS17: Atlanta - Realities of Security in the Cloud
PDF
Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control
PDF
PPTX
Enterprise Security in Cloud
PPTX
Enterprise Security in Hybrid Cloud ISACA-SV 2012
PDF
Is Your Vulnerability Management Program Keeping Pace With Risks?
PDF
Cloud security risks
PDF
Cloud security risks
PDF
CCSK, cloud security framework, Indonesia
PPTX
Presentation.pptx
PPTX
OWASP Cloud Top 10
PPTX
Lss implementing cyber security in the cloud, and from the cloud-feb14
PDF
7-Cloudy with a chance of digitalization.pdf
PDF
Itmgen 4317 security
PDF
The Share Responsibility Model of Cloud Computing - ILTA NYC
Cloud Computing Security Essentials for beginners
The Notorious 9 Cloud Computing Threats - CSA Congress, San Jose
ArticWolf - Securing Amazon AWS & Microsoft Azure.pdf
CSS 17: NYC - Realities of Security in the Cloud
Get ahead of cloud network security trends and practices in 2020
CSS17: Atlanta - Realities of Security in the Cloud
Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control
Enterprise Security in Cloud
Enterprise Security in Hybrid Cloud ISACA-SV 2012
Is Your Vulnerability Management Program Keeping Pace With Risks?
Cloud security risks
Cloud security risks
CCSK, cloud security framework, Indonesia
Presentation.pptx
OWASP Cloud Top 10
Lss implementing cyber security in the cloud, and from the cloud-feb14
7-Cloudy with a chance of digitalization.pdf
Itmgen 4317 security
The Share Responsibility Model of Cloud Computing - ILTA NYC
Ad

More from Skybox Security (17)

PPTX
CAPITA - Network Visibility to Manage Firewall Changes & Reduce Risk
PPTX
Secure Data GI - Delivering Contextual Intelligence
PDF
Infosec 2014: Tech Talk - Firewall Change Management
PDF
Infosec 2014: Tech Talk - Non-Disruptive Vulnerability Discovery
PDF
Infosec 2014: Finding and Understanding the Risk Impact of Firewall Changes
PDF
Infosec 2014: Capita Customer Management: Network Visibility to Manage Firewa...
PDF
Infosec 2014: Intelligence as a Service: The Future of Frontline Security
PDF
RSA 2014: Non-Disruptive Vulnerability Discovery, Without Scanning Your Network
PDF
RSA 2014: Firewall Change Management: Automate, Secure & Comply
PDF
Infographic: Are You Keeping Pace with Security Risks?
PDF
Best Practice Next-Generation Vulnerability Management to Identify Threats, ...
PDF
Out With the Old, In With the New – Reinvent and Justify Your 2013 Security S...
PDF
Security at the Breaking Point: Rethink Security in 2013
PDF
Transitioning to Next-Generation Firewall Management - 3 Ways to Accelerate t...
PDF
Is Your Vulnerability Management Program Irrelevant?
PPTX
Anticipate and Prevent Cyber Attack Scenarios, Before They Occur
PDF
Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...
CAPITA - Network Visibility to Manage Firewall Changes & Reduce Risk
Secure Data GI - Delivering Contextual Intelligence
Infosec 2014: Tech Talk - Firewall Change Management
Infosec 2014: Tech Talk - Non-Disruptive Vulnerability Discovery
Infosec 2014: Finding and Understanding the Risk Impact of Firewall Changes
Infosec 2014: Capita Customer Management: Network Visibility to Manage Firewa...
Infosec 2014: Intelligence as a Service: The Future of Frontline Security
RSA 2014: Non-Disruptive Vulnerability Discovery, Without Scanning Your Network
RSA 2014: Firewall Change Management: Automate, Secure & Comply
Infographic: Are You Keeping Pace with Security Risks?
Best Practice Next-Generation Vulnerability Management to Identify Threats, ...
Out With the Old, In With the New – Reinvent and Justify Your 2013 Security S...
Security at the Breaking Point: Rethink Security in 2013
Transitioning to Next-Generation Firewall Management - 3 Ways to Accelerate t...
Is Your Vulnerability Management Program Irrelevant?
Anticipate and Prevent Cyber Attack Scenarios, Before They Occur
Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...

Recently uploaded (20)

PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
sap open course for s4hana steps from ECC to s4
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Cloud computing and distributed systems.
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Spectroscopy.pptx food analysis technology
PPT
Teaching material agriculture food technology
PDF
Machine learning based COVID-19 study performance prediction
PDF
KodekX | Application Modernization Development
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Encapsulation theory and applications.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Reach Out and Touch Someone: Haptics and Empathic Computing
sap open course for s4hana steps from ECC to s4
MYSQL Presentation for SQL database connectivity
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Per capita expenditure prediction using model stacking based on satellite ima...
The AUB Centre for AI in Media Proposal.docx
Cloud computing and distributed systems.
Empathic Computing: Creating Shared Understanding
Spectroscopy.pptx food analysis technology
Teaching material agriculture food technology
Machine learning based COVID-19 study performance prediction
KodekX | Application Modernization Development
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Agricultural_Statistics_at_a_Glance_2022_0.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Diabetes mellitus diagnosis method based random forest with bat algorithm
Encapsulation theory and applications.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...

RSA 2014: Skybox Security Risk Analytics Overview

  • 2. Security Leaders Choose Skybox Financial Services Service Providers Energy & Utilities Gov & Defense Others 6 OF THE TOP 10 GLOBAL BANKS 6 OF THE TOP 10 NATO COUNTRIES © 2014 Skybox Security Inc. 2
  • 3. Security Management Challenges Problem: “Swivel chair integration” Firewall & Change Management No Network Context © 2014 Skybox Security Inc. Vulnerability Management Threat Response Slow to respond Too much data 3
  • 4. Skybox: Visibility, Intelligence, Control Automate security tasks Visualize network security FIREWALL & CHANGE MANAGEMENT TAKE ACTION FAST! THREAT RESPONSE VULNERABILITY MANAGEMENT Identify attack vectors © 2014 Skybox Security Inc. 4 Prioritize critical risks
  • 5. Skybox Builds a Model of the Network Layer 3 Routing © 2014 Skybox Security Inc. Threats Vulns 5 Assets Log Data Policies
  • 6. Comprehensive Network Context √ All and more integrated with Skybox © 2014 Skybox Security Inc. 6 6
  • 7. Analytics Find the Real Risks, Fast Vulnerabilities Rogue Admin  CVE 2013-0640  CVE 2012-1895  CVE 2013-0093 Internet Hacker Attack Simulation Compromised Partner © 2014 Skybox Security Inc. 7
  • 8. Network Security Management with Skybox Model Network Analyze Firewalls Monitor Compliance Manage Changes Change Request  Network  Rule and  Automatic topology view  Normalize data from 80+ systems  Access simulation configuration checks  Access path analysis  Optimize rules  Track changes audits  PCI DSS, FISMA, NERC, NIST…  Custom Policies Understand network context © 2014 Skybox Security Inc. Automate assessments Verify controls continuously 8 Tech Details Assess Risks Make Change Reconcile Verify Optimize change process
  • 9. Vulnerability and Threat Management with Skybox Discover Analyze Prioritize  Scanless  Vulnerability hot vulnerability detection  Import 3rd party VA scans  Threat intel spots  Attack simulation technology  Network context  Attack vectors  Business impact  Heat maps Up-to-date, less disruption © 2014 Skybox Security Inc.  Risk exposure  Geo or Find areas of greatest impact Reduce risk exposure 9 Remediate and Track  Remediation planning  Ticketing and workflow  Dashboards and reporting Manage effectively
  • 10. Success Stories Reinventing Security Management Vulnerability Management – Accurate and Fast  From once a month scanning to continuous view of vulnerabilities  False positives rate dropped from 20%+ to <1%  Reduced incident response from weeks to hours! Network Security – Continuous Compliance  Now able to easily manage 1000 firewalls, 40,000 rules  Daily compliance with ISO27001, SOX  From weeks to analyze, to security diagnosis in minutes © 2014 Skybox Security Inc. 10
  • 11. Take Charge, Take Control of Risk! Vulnerability Management Comparison TRADITIONAL TOOLS © 2014 Skybox Security Inc. SKYBOX SECURITY 11
  • 12. Make sure you are registered to WIN an e-Zip E750 Electric Scooter Thank you www.skyboxsecurity.com © 2014 Skybox Security Inc. 12