Review: Skybox Risk Control & Network Assurance

By on
Review: Skybox Risk Control & Network Assurance

It has good network mapping, risk correlation, audit logging, and an ability to understand IPS events, but it lacks in business risk support and compliance control.

Skybox Security provides a portfolio of automated tools. Skybox Risk Control and Skybox Network Assurance v5.5 can be used separately or together to help organizations address their risk management needs. The combined platform collects data from various networks, assessment tools and security products; normalizes that data into a single, common-view user interface; and provides risk analysis tools to map out remediation options. The tool is offered as either software or appliance.

The product works by importing the configuration data from all the various network and security solutions deployed in the enterprise. The admin defines the targets for data collection using the web-based user interface. The list of supported devices should cover most environments. Skybox also supports APIs for adding more "collector" tasks. New features in this version include Firewall Assurance, which takes into account user and applications settings when conducting firewall rule analysis, policy compliance audits, firewall change tracking and network access path analysis. There is also access path analysis at the firewall and network-level change tracking at the user and application level, expanded firewall rule compliance audits and platform configuration checks for network devices.

After interfacing the product to network, security and vulnerability scanning systems, it can configure policy and use all of the correlated data to determine adherence with those corporate policies. The firewall module has a nice checking capability to find things like duplicate rules and inadvertent rules that don't match stated policy. There is a useful change-tracking feature providing a solid audit log. There is a solid "what if" simulation tool for modeling changes. The network module works much the same way and builds an automated network map that is very helpful and customizable. There is also a useful attack simulation capability.

Great for mapping network and firewall configurations to corporate policy.

Tags:

Most Read Articles

You must be a registered member of iTnews to post a comment.
| Register

Poll

How should the costs of Australia's piracy scheme be split?
Rights holders should foot the whole bill
50/50
ISPs should foot the whole bill
Government should chip in a bit
Other
Flash is heading towards its grave, and that's...
Great! Good riddance
Sad! Flash had some good qualities
Irrelevant. I don't care
What's Flash?
View poll archive

Whitepapers from our sponsors

What will the stadium of the future look like?
What will the stadium of the future look like?
New technology adoption is pushing enterprise networks to breaking point
New technology adoption is pushing enterprise networks to breaking point
Gartner names IBM a 'Leader' for Disaster Recovery as a Service
Gartner names IBM a 'Leader' for Disaster Recovery as a Service
The next era of business continuity: Are you ready for an always-on world?
The next era of business continuity: Are you ready for an always-on world?

Log In

Username:
Password:
|  Forgot your password?