Skybox Security Suite Valuable Features

Randy Watkins
Director, Security Architecture at a tech services company with 51-200 employees
The Vulnerability Management module is among the ones we talk about the most and the one that customers are biting off on quite a bit. Skybox, in general, has quite a few features that are particularly useful to large clients, but their scalability is unparalleled in the space. They have massive scalability, thousands of devices that they can pull from, hundreds of thousands of IP addresses for the vulnerability results and casting; that in itself is very unique. The way they do vulnerabilities, providing the additional context of the network mitigations is fairly unique and valuable. View full review »
Sharath K
Sr. Consultant at a tech services company with 10,001+ employees
For us, it's more important for our firewalls, to maintain the configuration compliance, to look at duplication of rules; clean up functionalities on the firewall and compliance of the firewall. That's where it's most important. We're still looking at making use of this tool for other purposes, but it's still a work in progress at this moment. We are using Network Assurance, primarily for our devices like routers and switches. Change Manager is still a work in progress for us. While we have that module, we're still working on customizing it. It's understandable and it works well, right now. We are looking at automating that whole change management procedure using a third-party API integration along with Skybox. So that's still a work in progress at the moment. View full review »
Informat54af
Information Security Consultant at a insurance company with 1,001-5,000 employees
The most valuable feature is the compliance, whether it's access compliance or the configuration compliance, to make sure that all of our devices are configured as they're supposed to be, to limit access as much possible, to follow least-access guidelines. View full review »
Find out what your peers are saying about Qualys, Skybox Security, Rapid7 and others in Vulnerability Management. Updated: June 2019.
348,275 professionals have used our research since 2012.
Informatb8c7
Information Security Architect with 201-500 employees
It's the firewall change audit every week. Also, being able to track firewall ACL usage, so that we can produce semiannual reports on ACL usage and on shadowed and redundant rules on the firewall. View full review »
Vishal Bindra
CEO at a tech services company with 51-200 employees
Change Manager is most important because of the impact on each other of a network change or a firewall change. We want to understand this and to know, beforehand, what the impact of a change will be. We are a large network so that is a very important tool. It's the most important one to use. View full review »
SeniorIn877a
Senior Information Security Analyst at a energy/utilities company with 501-1,000 employees
Security review is the most important feature, because it offers a single pane of glass to analyze multiple firewalls. View full review »
Gerhard Schwegler
Networks Vice President at a tech services company with 1,001-5,000 employees
Network path analysis is the most valuable feature. There is a lot of work in my team to support internal and external customers, to answer their questions and difficulties with connectivity that doesn’t work. Mostly, the problem is missing orders. So if the customer can do the network path analysis for himself, the customer is able to write the request for the missing connectivity, without any support from my team. Aside from Firewall Assurance, we are using Network Assurance and Change Manager for an overview of the whole network and for documenting requests and the recertification of the ruleset. View full review »
Lisa Niles
Director of Solutions Integration at a tech services company with 51-200 employees
The platform provides insight and context from many threat logs and prioritizes them. There is not anything on the market that * correlates logs and threats and prioritizes * provides network maps * provides change result context and resulting vulnerability for the network/enterprise. View full review »
Andrea Ghislandi
CEO at a tech services company with 51-200 employees
Identifies direct exposed vulnerabilities. View full review »
ITSecurid7a6
IT Security Specialist with 10,001+ employees
* Change Tracking (audit logs) * Access Analyser (access checks) * Compliance View full review »
Find out what your peers are saying about Qualys, Skybox Security, Rapid7 and others in Vulnerability Management. Updated: June 2019.
348,275 professionals have used our research since 2012.

Sign Up with Email