Audience

Enterprise

About Vulnerability Control

The Skybox approach to risk-based vulnerability management starts with fresh vulnerability data from your entire network — physical IT, multi–cloud and operational technology (OT). Skybox uses a wide range of sources, including asset and patch management systems and network devices, to assess vulnerabilities without a scan. We also collect, centralize and merge data from multiple scanners to give you the most accurate vulnerability assessments on demand.

- Centralize and enhance vulnerability management processes from discovery to prioritization and remediation
- Harness the power vulnerability and asset data, as well as network topology and security controls
- Use network modeling and attack simulation to find exposed vulnerabilities
- Augment vulnerability data with intelligence on the current threat landscape
- Know your best remediation option, including patching, IPS signatures and network–based changes

Pricing

Free Trial:
Free Trial available.

Integrations

Ratings/Reviews

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Company Information

Skybox Security
Founded: 2002
United States
www.skyboxsecurity.com

Videos and Screen Captures

Product Details

System Requirements

Windows
Mac
SaaS

Training

Documentation
Live Online
Webinars
In Person

Support

Business Hours
24/7 Live Support
Online

Vulnerability Control Product Features

Audit

Compliance Management
Dashboard
Internal Controls Management
Risk Assessment
Exceptions Management
Issue Management
Multi-Year Planning

Cloud Security

Application Security
Threat Intelligence
Vulnerability Management
Antivirus
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Two-Factor Authentication

Computer Security

Compliance Management
Database Security Audit
Anti Spam
Antivirus
Audit Trail
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection

Cybersecurity

Vulnerability Scanning
AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Whitelisting / Blacklisting

IT Security

Vulnerability Scanning
Web Threat Management
Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Web Traffic Reporting

Network Security

Threat Response
Vulnerability Scanning
Access Control
Analytics / Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
VPN

Vulnerability Management

Network Scanning
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Asset Discovery
Asset Tagging
Patch Management
Web Scanning