BT | August 2016

Vendor Spotlight

Vendor Spotlight

Skybox Security Products Honoured With Three Cybersecurity Awards in June

Skybox® Security, a global leader in security analytics, is proud to announce the company was honoured with three separate cybersecurity awards in June:

  • SC Magazine gave the Skybox® Security Suite its highest rating of five stars in its Group Test for Vulnerability Management. The test was conducted by the magazine’s U.S. testing team, which includes SC Lab staff and a network of external experts who are respected industrywide. According to the review, five stars means, “Outstanding. An ‘A’ on the product’s report card.”
  • The Cyber Security Awards honoured Skybox® Horizon as “Innovative Product of the Year” for 2016.
  • SC Magazine UK honoured the Skybox Security Suite with high commendation in two categories — Best Vulnerability Management Solution and Best Risk/Policy Management and Regulatory Compliance Solutions - at the 2016 SC Magazine Awards Europe. The awards were announced during Infosecurity Europe 2016. Each year, a handpicked panel of information technology security experts from the private and public sectors review hundreds of entries and narrow the field down to a select group of finalists.

Harnessing Integrated Security Analytics - Blog

Necessity is the mother of invention. To match the demands of a threat landscape that has grown exponentially in the last decade, cybersecurity innovation has moved at a break-neck pace. Like all innovation, it solves an immediate need — but it’s difficult to see the new issues it will cause. Cybersecurity point products that focus on one problem – or even one class of problems – have created major obstacles in security management and operations, in sourcing talent to wield these products and, most importantly, in comprehensive visibility of the attack surface. Lack of communication and integration between various vendors and solution sets have created disconnected environments, making it difficult to pull together the intelligence needed to gauge security status, preemptively strengthen defenses or respond quickly to an emerging threat or ongoing attack. In essence, the use of point solutions is like defending a castle one stone at a time.

View Here