Skip to main content
Home
Home

Основная навигация

  • COMPANY
    • About Us
    • Career
    • News
    • Events
    • Partners
    • Contacts
  • VENDORS
  • SOLUTIONS
    • Archiving
    • Data security
    • Fraud prevention
    • IT-infrastructure security
    • Network security
    • Protection against enhanced attacks
    • Secure processing
    • Secure Internet access
    • Video analytics
  • TECHNICAL SUPPORT
  • BECOME A PARTNER
  • FOR VENDORS
  • ru
  • en
search
  • ru
  • en
search
Skybox
The Skybox platform unites data of firewalls and network devices with the information on vulnerabilities and threats focusing on security issues with due regard to the customer’s unique environment.
  • Skybox Network Assurance859.46 KB
  • Skybox Firewall Assurance799.73 KB
  • Skybox Vulnerability Control920.94 KB
  • Skybox Security489.85 KB
Demo Request
Skybox Security offers a comprehensive set of tools designed to provide network security, analytics and reporting. The Skybox platform unites data of firewalls and network devices with the information on vulnerabilities and threats focusing on security issues with due regard to the customer’s unique environment. Powerful attack vector analytics reduces the response time and mitigates risks providing control over firewalls, vulnerabilities and threats in complex networks.
skybox

The solution is much in demand of both IT and data security services of various industries due to the synergy of Firewall Management and Vulnerability Control features within one platform
FIREWALL MANAGEMENT
 
Skybox Firewall Assurance (FA) is designed to manage firewall operation. It gains visibility into all firewalls from one window, performs their continuous policy compliance monitoring, streamlines FW rules, identifies shaded and rarely used rules and objects. It is also capable to recognize a most complete list of FW vendors.
CONTROL, AUTOMATION, AUDIT
 
Skybox Change Manager (CM) is a supplemental application leveraging the Firewall Assurance module capabilities. It is responsible for control and automation of the configuration change process from change request registration to its completion, assuring full compliance with the established network access policy, and making it possible to verify, at an early stage, scheduled changes and their impact on the data security policies and route availability.
MANAGEMENT OF NETWORK DEVICES
 
Skybox Network Assurance (NA) is designed to manage network assets through building a live network model. It allows you to make a copy of the network for further in-depth analysis and/or to verify scheduled changes without disrupting network services, check up the network assets for compliance with the security policies and standards.
ENHANCEMENT OF SECURITY SCANNER
 
Skybox Vulnerability Control (VC) is designed to manage vulnerabilities. It is a substitute for a security scanner leveraging its capabilities by collecting and uniting data from all scanners, information on weak points and threat sources, correlating vulnerability data with the network visibility map which makes it possible to visualize potential attack vectors. One of VC’s very important features is a embedded vulnerability prioritization tools.
TRACKING AND ANALYSIS OF VULNERABILITIES
 
Skybox Research Lab, a research laboratory of Skybox, is a driving force of threat oriented vulnerability analysis. Skybox Research Lab finds and identifies dozens of thousands of vulnerabilities in more than 8,000 products.

Skybox Benefits

NETWORK SECURITY
Segmentation and security area control
Vector attack analysis
Access rule change automation
Identification of vulnerabilities between scanning sessions
Configuration accuracy control
Prioritization of vulnerabilities and generation of remediation recommendations
Access rule optimization
Automation of vulnerability management (from discovery to remediation control)
VULNERABILITY MANAGEMENT

Advantages

 
Network Security
Optimizes network security processes and increase their efficiency
 
Process Automation
Automates complex vulnerability management and security policy compliance processes
 
Analytics Tools
Conducts in-depth network analysis and visualizes potential attack vectors without disrupting network services
 
 
Network Modeling
Enables change assessment and analysis, including scheduled changes without interrupting network operations
 
Firewall Optimization
Reduces the number of FW rules (and loads accordingly) by 30-50%
 
Single Platform
Skybox modules may function both independently and combined all together
 
 
Integration Capacities
Unites scattered data by integrating with 120+ IT and data security solutions
More

Cases

Building Vulnerability Control

A critical challenge for banking companies and other financial institutions is to ensure a contentious vulnerability management control and attack vector awareness between routine infrastructure scanning sessions. The Vulnerability Control module is designed to arrange the daily updating of data on actual vulnerabilities and ensure mapping of critical threats by building attack vectors with due regard to the actual network context. As a result, with the help Skybox Security the security team gains valuable external and internal threat insights and tools capable to manage and neutralize such threats.

Building Continuous Network Equipment Configuration Auditing Process

Skybox Security is an excellent solution for an industrial enterprise that needs to audit and optimize its active network assets and maintain updated its network infrastructure visual model. The Firewall Assurance and Network Assurance modules guarantee that the network asset settings and configurations are checked and generate reports indicating found weak points and providing configuration improvement recommendations on the basis of the world best practices and internal policies of the company. Network Assurance helps security teams generate an actual network map with due regard to the network asset configuration information. As a result, the productivity of individual devices and the network as a whole will increase, as will increase the level of cyber security compliance of the network infrastructure as a whole, and the IT-infrastructure visibility picture will be updated on a regular basis.

Enhancing Network Infrastructure Change Control

Telecom companies are often face the necessity to arrange the FW periodic recertification rule service and ensure preliminary verification of scheduled changes in the network infrastructure. Skybox Security’s Change Manager can provide the functionality needed. It allows the existing work process to be utilized having slightly adjusted the access request permission procedures with due regard to the results of preliminary analysis of possible threat modifications that can occur when the new rules are applied. Access permission and change requests come into Change Manager to undergo an initial checkup, being verified by responsible personnel at different stages of the process. Change Manager enables the scheduling of periodic rule recertification on fire walls. As a result the process of periodic auditing of existing rules and their relevance is established and shaped.

Demo Request

Consent to the processing of personal data
By pressing the «Send the Form» button you confirm your consent to the processing of your personal data according to Federal Law No 152-FZ «On Personal Data» of July 27, 2006. ITD Group and its affiliates warrant confidential treatment of the information you provide.
Privacy Policy
The personal data are processed in order to facilitate effective management of your requests and queries in compliance with the «Personal Data Confidentiality Policy».

Company

Vendors

Technical support

Become a partner

For vendors

Archiving

Secure processing

IT-infrastructure security

Secure Internet access

Video analytics

Data security

Protection against enhanced attacks

Fraud prevention

Network security

Application testing

International IT-Distribution Group (ITD Group) is a group of companies representing the interests of the developers of innovative solutions in the field of information security.

Address: 115114, Moscow, st. Derbenevskaya, d.15b
Phone: +7 (499) 502-13-75
E-mail: info@iitdgroup.ru
/iitdgroup/
/company/iitd-group

© 2020 Copyright by International IT-Distribution Group

Website creation