Download presentation
Presentation is loading. Please wait.
Published byNorma Allen Modified over 9 years ago
1
www.skyboxsecurity.com Skybox® Security Solutions for Symantec CCS Comprehensive IT Governance Risk and Access Compliance Management Skybox Security's automated security management solutions help IT organizations pinpoint and prioritize security risks, compliance and availability exposures within minutes. These solutions automatically collect and analyze comprehensive data about network topology and systems, configuration settings, threats and vulnerabilities - anticipating and reporting on the most urgent IT concerns before harm can be done. Symantec Control Compliance Suite (CCS) and Skybox have integrated solutions to automate and analyze key IT governance risk and compliance management tasks. The CCS ensures coverage of external mandates through written policy creation, dissemination, acceptance logs, and exception management—helping managers demonstrates compliance to both external regulatory mandates and internal policies. Then CCS allows Skybox solutions to link the written policy to specific technical and industry procedural standards, such as PCIDSS, SOX, NIST, etc. Customers can assess policies daily, using the high performance and scalability of Skybox Security’s sophisticated rule and access compliance assessments. Skybox® Firewall Assurance imports firewall data from CCS and other network device vendors and normalizes the data for easy analysis. Automatic tools for data collection, analytics, and reporting find security and compliance issues, cutting firewall assessment time by 80- 90%. Skybox® Change Manager is a workflow solution that manages the steps needed to complete a firewall change request. With Change Manager, organizations can submit a request, ask for a risk assessment, plan the firewall changes, and verify that the request is completed successfully. Skybox® Network Assurance provides full network visibility, so that network devices can be examined with an understanding of the impact of other devices, zones, segments, and access paths. Network Assurance gathers and analyzes network device configuration data, creating a detailed network model and topology map. Managers use the model to find security issues caused by device configuration errors, or troubleshoot access issues and connectivity routes. Skybox® Risk Control automatically discovers and correlates vulnerability scan data with information about network topology, device settings, asset values and known threats. Through this correlation, Risk Control e can prioritize which threats pose the highest risk in the network. The Skybox View Enterprise Suite, a complete set of tools for efficient and effective security management. Solution Brief
2
2www.skyboxsecurity.com Skybox View Platform Suite www.skyboxsecurity.com Headquarters: Skybox Security, Inc. 2099 Gateway Place, Suite 450 San Jose, California 95110 USA Phone: +1 (866) 441 8060 Phone: +1 408 441 8060 Fax: +1 408 441 8068 Copyright © 2012 Skybox Security, Inc. All rights reserved. Skybox is a trademarks of Skybox Security, Inc. All other registered or unregistered trademarks are the sole property of their respective owners. PB_FA_EN_111512 Key Features of Skybox® Firewall Assurance –Automated data collection: Import configuration and policies for Juniper devices, including ScreenOS (ISG, SSG) and JunOS (J-series, SRX) based devices, directly from the device, via Juniper NSM, or via file system based repositories. –Rule compliance: Analyze the policy structure to detect risky and non-compliant access rules, ranging from detection of 'any' rules, to rules that exceed a defined number of hosts or services –Access compliance: Topology aware access compliance, models and analyzes firewall access paths to quickly identify access policy violations, and provide root cause analysis. The patented What-if analysis checks planned firewall changes before they are made, avoiding configuration errors. Audit for compliance with PCI DSS and NIST regulations easily with out-of-the-box policies. –Platform configuration checks: Verify correct device configurations automatically for Juniper devices, such as specific security settings or logging settings. –Optimization and cleanup: Detect redundant, shadowed and disabled rules in Juniper firewalls. Find unused rules and objects from Juniper log files, or identify most-used rules to aid in firewall optimization. –Change tracking: Continuously monitor changes in rules and objects in Juniper devices over time. Users may review changes, mark status, and write comments. When used with Skybox Change Manager, customers can automatically match actual changes with the tickets that initiated the changes. Key Features of Skybox® Change Manager –Change workflow: Manage the workflow steps for firewall change requests. End-users can submit requests for connectivity; firewall administrators identify the relevant firewalls and whether a change is required; security personnel evaluate the risk of the request. –Change planning: Helps plan how to implement the firewall change, and verifies that the change was actually implemented. –Web-based API: Integrate the change workflow and risk assessment functionality easily with external applications, such as trouble-ticketing systems. Key Features of Skybox® Network Assurance –Comprehensive network map: Full visibility of all network devices including Juniper firewalls, other firewalls, routers, load balancers, and IPS solutions. For each device, the user is empowered with the ability to view the Access List, routing table, and more. –Traffic simulation: Check connectivity between any source and destination to troubleshoot connectivity issues and plan changes for one firewall or the full network topology. Simulation takes into consideration routing rules, access rules, translation rules, VPN definitions, etc. Key Features of Skybox® Risk Control –Attack explorer: Simulate attack scenarios to identify potential impact of cyber threats –Vulnerability detection and prioritization: Perform non-intrusive vulnerability detection automatically without an active scan, pinpoint and prioritize the vulnerabilities that can be exploited by an attacker –Key performance indicators (KPIs) : Demonstrate the before and after impact of security programs to overall risk level, dramatically reduce the risk exposure time window from months to hours
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.