Review: Skybox Security Skybox 4000 v1.0

By

A risk management platform that collects data from various network assessment tools.

Skybox 4000 v1.0 is an operational risk management platform that collects data from various network assessment tools and security products, normalises that data into a single, common-view user interface, and provides risk analysis tools to map out risk and remediation options.

Review: Skybox Security Skybox 4000 v1.0

The product works by importing the configuration data from all the various network and security solutions deployed in the enterprise. The admin defines the targets for data collection using the web-based user interface. The list of supported devices should cover most environments. If your product is not supported, Skybox supports APIs for adding more collector tasks and for providing data to portals and external workflow/ticketing systems.

Using the configuration data, Skybox creates a network map based on the combined and correlated sets of rules. The product automatically normalise the data into its database, building a virtual network model representing the topology and traffic rules. Skybox then overlays data from vulnerability scanners to create the risk analysis.

The user interface is a menu-driven web-style interface. Capturing configuration data from devices can be automatic or manual depending on the device. We really liked the normalised view of all the combined configuration information.

This feature can allow a security team member that may not be familiar with all the various point interfaces to see a consolidated set of security rules in one common, easy-to-read screen. There is a very nice simulator feature that allows you to "test" configuration or rule changes and picture what those changes would do to the overall enterprise security posture.

The product is sold as client-side software and deploys on Windows or Linux server platforms. There is a server component, including a backend database, a client-side Java-based client, and collectors for the collection of network data.

Eight-hours-a-day/five-days-a-week support is included with the product and additional 24/7 options are available for a fee.

This is a real nice operational risk management tool. It gives admins a complete, easy-to-use view of risk and truly helps with remediation decisions. The only drawback is that it is an after-the-fact tool and not a real-time analysis tool.

For:This product offers great modelling with a strong correlated controls view, great simulator and graphical views of risk. Against: The only drawback is the lack of real-time analysis. This is an after-the-fact risk analysis tool. Verdict: A great operational risk tool that has everything you need to measure, manage and enhance your enterprise security posture. We make this our Best Buy in this group

Got a news tip for our journalists? Share it with us anonymously here.
Tags:

Most Read Articles

BoM's seven-year technology transformation cost $866m

BoM's seven-year technology transformation cost $866m

Medibank allegedly missed EDR alerts before data breach

Medibank allegedly missed EDR alerts before data breach

ANZ joins NAB and CBA on ConnectID

ANZ joins NAB and CBA on ConnectID

James Cook University accelerates digital roadmap and cyber uplift

James Cook University accelerates digital roadmap and cyber uplift

Log In

  |  Forgot your password?