Data Centre ICT Security Product of the Year
Skybox Security announced major enhancements to its Security Posture Management Platform. Skybox is the only platform that offers IT and security teams the ability to collectively visualize and analyze hybrid and multi-cloud networks, providing full context and understanding of their attack surfaces. Our latest release includes advanced analytics, optimized attack simulation, and increased dashboard customization – all of which increase the speed and accuracy of exposure analysis to improve overall security efficacy.
Skybox evolved its platform to support customers contending with expediated digital transformation initiatives such as cloud migration and IT/OT convergence. Customers will benefit from:
• Increased agility with more granular insights delivered at a faster speed. To support bespoke organizational and operational workflow requirements, the Skybox platform includes new reporting capabilities with advanced dashboards, sophisticated data visualization features, and the ability to ingest and process more diverse datasets at higher rates.
• Greater visibility across hybrid networks. Skybox continues to grow its comprehensive list of 150+ technology partnerships with new connectors that combine rich data from leading SD-WAN and SASE vendors such as Versa Networks and Zscaler. This release also extends support for Check Point, Cisco, Forcepoint, and Fortinet FortiManager.
• Optimized attack simulation. Deeper insights into exposure and risk in near real-time allow customers to develop the ideal remediation strategy and reduce mean time to remediation (MTTR). Customers with highly complex network models will significantly benefit from these performance enhancements.
“Digital transformation demands a new approach to security posture management,” said Haggai Polak, chief product officer, Skybox Security. “Through automating data collection, correlation and analysis, security and IT teams can together leverage a multidimensional dynamic network model to understand risk levels, simulate attacks, and remediate vulnerabilities where it’s needed most.”