SOURCE: Skybox Security, Inc.

Skybox Security

May 03, 2017 06:00 ET

Skybox Security: Organizations Must Change Approach to Vulnerability Management to Stay Ahead of Real-World Threats

Threat-Centric Vulnerability Management identifies the true risk of vulnerabilities, focuses action where it's needed most and prioritizes imminent threats

SAN JOSE, CA--(Marketwired - May 03, 2017) - Skybox™ Security, a global leader in cybersecurity operations, analytics and reporting, today announced the availability of threat-centric vulnerability management (TCVM) for the Skybox™ Security Suite, signaling a fundamental shift in the approach to managing and prioritizing vulnerabilities. TCVM changes vulnerability management from an exercise of trying to patch "everything all the time" to focused, intelligent action that considers real-world threats. TCVM does this by correlating multiple factors to determine vulnerability risk, including:

With the Prioritization Center in Skybox™ Vulnerability Control, security leaders can automatically analyze the thousands -- even millions -- of vulnerabilities in their environment (including cloud and virtual) to pinpoint those that are truly putting their organization at risk. This means narrowing a huge volume of "known" vulnerabilities that are potential threats down to a small, manageable number of vulnerabilities that are identified as imminent threats -- exposed vulnerabilities known to be exploited in the wild. In addition, TCVM enables a systematic approach for ongoing, gradual risk reduction of potential threats that could escalate in the future.

Skybox TCVM leverages ongoing intelligence of the active threat landscape produced by the Skybox™ Research Lab. The Lab aggregates information from more than 30 security data feeds along with research of exploits available on more than 700,000 dark web sites and validated by Skybox's security analysts.

For example, Skybox analysts have been closely monitoring three major event categories impacting organizations today: the use of a specific, commercialized set of exploit kits, the rise of targeted client-side vulnerabilities and the continued popularity of Internet of Things (IoT) botnets.

"Security leaders understand that the threat landscape is always changing. The difference now is that we're seeing the growth of an increasingly commercialized cybercrime market. This is making it easier than ever for threat actors to attack, adjust and attack again until they accomplish their objective," said Skybox CEO Gidi Cohen. "They tend to aim for the easy targets -- and the biggest ROI -- by exploiting a surprisingly small number of vulnerabilities, many of which current vulnerability management approaches don't consider as priorities. This has to change. Security leaders have to be smarter and way more targeted in their approach -- aligning it to what's happening in the real world -- if they are to stay ahead of cybercriminals."

Skybox TCVM makes focused action possible by combining attack surface visibility, threat-centric vulnerability intelligence and attack vector analytics to identify and prioritize an organization's biggest risks according to vulnerabilities known to:

Threat-centric approaches to vulnerability management require the use of multiple technologies using several different types of security analytics. Skybox is the only company that brings together and automates the technology stack that makes TCVM possible. Skybox is also the only vendor that correlates network context (using network modeling and attack vector analytics) with real-world threat intelligence.

To learn more about Skybox TCVM and the Skybox Research Lab, click here.

Tweet This:
Do you use #threatintel & #network context to prioritize #vulns? @SkyboxSecurity does. http://ow.ly/nbwh30bnpbd #threatcentric #SkyboxTCVM

About Skybox Security
www.skyboxsecurity.com

Skybox™ Security arms security professionals with the broadest platform of solutions for security operations, analytics and reporting. By integrating with more than 100 networking and security technologies organizations are already using, the Skybox™ Security Suite merges data silos into a dynamic network model of your organization's attack surface, giving comprehensive visibility of public, private and hybrid IT environments. Skybox provides the context needed for informed action, combining attack vector analytics and threat-centric vulnerability intelligence to continuously assess vulnerabilities in your environment and correlate them with exploits in the wild. This makes the accurate prioritization and mitigation of imminent threats a systematic process, decreasing the attack surface and enabling swift response to exposures that truly put your organization at risk. Our award-winning solutions in vulnerability and threat management, automated firewall and security policy management and attack surface visibility increase operational efficiency by as much as 90 percent and are used by the world's most security-conscious enterprises and government agencies, including Forbes Global 2000 companies.

© 2017 Skybox Security, Inc. All rights reserved. Skybox Security and the Skybox Security logo are either registered trademarks or trademarks of Skybox Security, Inc., in the United States and/or other countries. All other trademarks are the property of their respective owners. Product specifications subject to change at any time without prior notice.

Image Available: http://www.marketwire.com/library/MwGo/2017/5/3/11G137745/Images/Vulnerability_Prioritization_Graphic-01-bef2370590a69230b290ae6f3dbef84f.jpg