Search
00
GBAF Logo
trophy
Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

Subscribe to our newsletter

Get the latest news and updates from our team.

Global Banking and Finance Review

Global Banking and Finance Review - Subscribe to our newsletter

Company

    GBAF Logo
    • About Us
    • Profile
    • Privacy & Cookie Policy
    • Terms of Use
    • Contact Us
    • Advertising
    • Submit Post
    • Latest News
    • Research Reports
    • Press Release
    • Awards▾
      • About the Awards
      • Awards TimeTable
      • Submit Nominations
      • Testimonials
      • Media Room
      • Award Winners
      • FAQ
    • Magazines▾
      • Global Banking & Finance Review Magazine Issue 79
      • Global Banking & Finance Review Magazine Issue 78
      • Global Banking & Finance Review Magazine Issue 77
      • Global Banking & Finance Review Magazine Issue 76
      • Global Banking & Finance Review Magazine Issue 75
      • Global Banking & Finance Review Magazine Issue 73
      • Global Banking & Finance Review Magazine Issue 71
      • Global Banking & Finance Review Magazine Issue 70
      • Global Banking & Finance Review Magazine Issue 69
      • Global Banking & Finance Review Magazine Issue 66
    Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

    Global Banking & Finance Review® is a leading financial portal and online magazine offering News, Analysis, Opinion, Reviews, Interviews & Videos from the world of Banking, Finance, Business, Trading, Technology, Investing, Brokerage, Foreign Exchange, Tax & Legal, Islamic Finance, Asset & Wealth Management.
    Copyright © 2010-2026 GBAF Publications Ltd - All Rights Reserved. | Sitemap | Tags | Developed By eCorpIT

    Editorial & Advertiser disclosure

    Global Banking and Finance Review is an online platform offering news, analysis, and opinion on the latest trends, developments, and innovations in the banking and finance industry worldwide. The platform covers a diverse range of topics, including banking, insurance, investment, wealth management, fintech, and regulatory issues. The website publishes news, press releases, opinion and advertorials on various financial organizations, products and services which are commissioned from various Companies, Organizations, PR agencies, Bloggers etc. These commissioned articles are commercial in nature. This is not to be considered as financial advice and should be considered only for information purposes. It does not reflect the views or opinion of our website and is not to be considered an endorsement or a recommendation. We cannot guarantee the accuracy or applicability of any information provided with respect to your individual or personal circumstances. Please seek Professional advice from a qualified professional before making any financial decisions. We link to various third-party websites, affiliate sales networks, and to our advertising partners websites. When you view or click on certain links available on our articles, our partners may compensate us for displaying the content to you or make a purchase or fill a form. This will not incur any additional charges to you. To make things simpler for you to identity or distinguish advertised or sponsored articles or links, you may consider all articles or links hosted on our site as a commercial article placement. We will not be responsible for any loss you may suffer as a result of any omission or inaccuracy on the website.

    Home > Top Stories > SKYBOX SECURITY ANNOUNCES THREAT–CENTRIC VULNERABILITY MANAGEMENT FOR VIRTUAL AND CLOUD NETWORKS
    Top Stories

    SKYBOX SECURITY ANNOUNCES THREAT–CENTRIC VULNERABILITY MANAGEMENT FOR VIRTUAL AND CLOUD NETWORKS

    Published by Gbaf News

    Posted on October 4, 2017

    6 min read

    Last updated: January 21, 2026

    Image of Kim Leadbeater addressing the media about proposed changes to the UK's assisted dying law, emphasizing the removal of High Court judge sign-off to enhance the legislative process.
    Lawmaker Kim Leadbeater discusses UK's assisted dying law changes - Global Banking & Finance Review
    Why waste money on news and opinion when you can access them for free?

    Take advantage of our newsletter subscription and stay informed on the go!

    Subscribe

    Expands solutions to ease day–to–day security management across all networks in one platform

    Skyboxä Security, a global leader in cybersecurity management, continues to expand its cloud security management solution, Skybox for the Cloud™. The solution now includes threat–centric vulnerability management (TCVM) for virtual and multi–cloud environments and extends capabilities for security policy management, attack surface visibility and network path analysis. With one platform, the Skybox™ Security Suite, organizations are now able to consistently and securely manage day–to–day security processes across their entire network infrastructure, whether on premises or in the cloud.

    As businesses continue to migrate to virtual and cloud environments, security becomes more complicated due to the nature of cloud architecture, from multi–tenancy to elasticity and the shared responsibility for the computing stack. For example, security mechanisms in virtual and cloud networks are different from physical environments, and even differ between cloud service providers. In addition, cloud elasticity means virtual machines are quickly spun up and down, making traditional vulnerability scanning insufficient as the environment may change significantly between scans.

    To counteract these challenges and reduce the chance of human error, Skybox helps automate security processes not only in virtual and cloud environments, but across all networks within a single, unified dashboard.

    “IT teams are tasked with launching new services and applications on a daily basis. By leveraging cloud architecture, they can achieve that in minutes — opposed to days of work,” said Skybox VP of Products Ravid Circus. “The challenge is that this leads to a fluid security situation where assets (virtual machines) can be assigned to the wrong security group, resulting in immediate exposure. Security teams need to be on top of this, and the only way to do it is have global visibility and management across all your networks.”

    Whether an organization’s network infrastructure is physical, virtual, cloud or a hybrid of all three, Skybox for the Cloud addresses a number of use cases in the following areas:

    • Comprehensive visibility of the attack surface in a single network model, capable of incorporating data from 120+ security and networking technologies
    • End–to–end path analysis from any source to any destination across or within physical, virtual and multi–cloud networks, including detailed path analysis on the devices, rules, etc., along the path
    • Unified security policy management across all networks, including out–of–the–box compliance checks for key industry regulations such as NIST and PCI DSS
    • Vulnerability discovery, prioritization and remediation planning with the context of an organization’s on–prem and multi–cloud networks; this information is correlated to current threat intelligence of exploits in the wild

    As cyber events like the Equifax breach (caused by the Apache Struts vulnerability) continue to increase, it’s obvious that organizations are struggling to quickly identify and effectively remediate vulnerabilities in their systems. This challenge can be compounded by the nature of cloud environments and even procedural requirements from service providers that impact third–party scans.

    Skybox for the Cloud gives security teams the power to assess vulnerabilities in the cloud on demand by combining data from cloud–based patch and asset management systems, scanners and network devices. The results are analyzed and prioritized using the TCVM approach, taking into account:

    • The vulnerabilities on the virtual machine and its importance to the organization
    • The virtual machine’s exposure based on the hybrid network topology and security controls in place
    • Threat intelligence on available and active exploits in the wild

    TCVM also gives prescriptive guidance of what action can be taken to prevent exploitation and how urgently that action should be performed.

    Expands solutions to ease day–to–day security management across all networks in one platform

    Skyboxä Security, a global leader in cybersecurity management, continues to expand its cloud security management solution, Skybox for the Cloud™. The solution now includes threat–centric vulnerability management (TCVM) for virtual and multi–cloud environments and extends capabilities for security policy management, attack surface visibility and network path analysis. With one platform, the Skybox™ Security Suite, organizations are now able to consistently and securely manage day–to–day security processes across their entire network infrastructure, whether on premises or in the cloud.

    As businesses continue to migrate to virtual and cloud environments, security becomes more complicated due to the nature of cloud architecture, from multi–tenancy to elasticity and the shared responsibility for the computing stack. For example, security mechanisms in virtual and cloud networks are different from physical environments, and even differ between cloud service providers. In addition, cloud elasticity means virtual machines are quickly spun up and down, making traditional vulnerability scanning insufficient as the environment may change significantly between scans.

    To counteract these challenges and reduce the chance of human error, Skybox helps automate security processes not only in virtual and cloud environments, but across all networks within a single, unified dashboard.

    “IT teams are tasked with launching new services and applications on a daily basis. By leveraging cloud architecture, they can achieve that in minutes — opposed to days of work,” said Skybox VP of Products Ravid Circus. “The challenge is that this leads to a fluid security situation where assets (virtual machines) can be assigned to the wrong security group, resulting in immediate exposure. Security teams need to be on top of this, and the only way to do it is have global visibility and management across all your networks.”

    Whether an organization’s network infrastructure is physical, virtual, cloud or a hybrid of all three, Skybox for the Cloud addresses a number of use cases in the following areas:

    • Comprehensive visibility of the attack surface in a single network model, capable of incorporating data from 120+ security and networking technologies
    • End–to–end path analysis from any source to any destination across or within physical, virtual and multi–cloud networks, including detailed path analysis on the devices, rules, etc., along the path
    • Unified security policy management across all networks, including out–of–the–box compliance checks for key industry regulations such as NIST and PCI DSS
    • Vulnerability discovery, prioritization and remediation planning with the context of an organization’s on–prem and multi–cloud networks; this information is correlated to current threat intelligence of exploits in the wild

    As cyber events like the Equifax breach (caused by the Apache Struts vulnerability) continue to increase, it’s obvious that organizations are struggling to quickly identify and effectively remediate vulnerabilities in their systems. This challenge can be compounded by the nature of cloud environments and even procedural requirements from service providers that impact third–party scans.

    Skybox for the Cloud gives security teams the power to assess vulnerabilities in the cloud on demand by combining data from cloud–based patch and asset management systems, scanners and network devices. The results are analyzed and prioritized using the TCVM approach, taking into account:

    • The vulnerabilities on the virtual machine and its importance to the organization
    • The virtual machine’s exposure based on the hybrid network topology and security controls in place
    • Threat intelligence on available and active exploits in the wild

    TCVM also gives prescriptive guidance of what action can be taken to prevent exploitation and how urgently that action should be performed.

    More from Top Stories

    Explore more articles in the Top Stories category

    Image for Lessons From the Ring and the Deal Table: How Boxing Shapes Steven Nigro’s Approach to Banking and Life
    Lessons From the Ring and the Deal Table: How Boxing Shapes Steven Nigro’s Approach to Banking and Life
    Image for Joe Kiani in 2025: Capital, Conviction, and a Focused Return to Innovation
    Joe Kiani in 2025: Capital, Conviction, and a Focused Return to Innovation
    Image for Marco Robinson – CLOSE THE DEAL AND SUDDENLY GROW RICH
    Marco Robinson – CLOSE THE DEAL AND SUDDENLY GROW RICH
    Image for Digital Tracing: Turning a regulatory obligation into a commercial advantage
    Digital Tracing: Turning a regulatory obligation into a commercial advantage
    Image for Exploring the Role of Blockchain and the Bitcoin Price Today in Education
    Exploring the Role of Blockchain and the Bitcoin Price Today in Education
    Image for Inside the World’s First Collection Industry Conglomerate: PCA Global’s Platform Strategy
    Inside the World’s First Collection Industry Conglomerate: PCA Global’s Platform Strategy
    Image for Chase Buchanan Private Wealth Management Highlights Key Autumn 2025 Budget Takeaways for Expats
    Chase Buchanan Private Wealth Management Highlights Key Autumn 2025 Budget Takeaways for Expats
    Image for PayLaju Strengthens Its Position as Malaysia’s Trusted Interest-Free Sharia-Compliant Loan Provider
    PayLaju Strengthens Its Position as Malaysia’s Trusted Interest-Free Sharia-Compliant Loan Provider
    Image for A Notable Update for Employee Health Benefits:
    A Notable Update for Employee Health Benefits:
    Image for Creating Equity Between Walls: How Mohak Chauhan is Using Engineering, Finance, and Community Vision to Reengineer Affordable Housing
    Creating Equity Between Walls: How Mohak Chauhan is Using Engineering, Finance, and Community Vision to Reengineer Affordable Housing
    Image for Upcoming Book on Real Estate Investing: Harvard Grace Capital Founder Stewart Heath’s Puts Lessons in Print
    Upcoming Book on Real Estate Investing: Harvard Grace Capital Founder Stewart Heath’s Puts Lessons in Print
    Image for ELECTIVA MARKS A LANDMARK FIRST YEAR WITH MAJOR SENIOR APPOINTMENTS AND EXPANSION MILESTONES
    ELECTIVA MARKS A LANDMARK FIRST YEAR WITH MAJOR SENIOR APPOINTMENTS AND EXPANSION MILESTONES
    View All Top Stories Posts
    Previous Top Stories Post‘MINICORNS – EXCITING YOUNG FINTECH ‘FOALS’AIMING TO BECOME UNICORNS THAT DESERVE RECOGNITION’
    Next Top Stories PostAION, THE FIRST INTEROPERABLE BLOCKCHAIN NETWORK, ANNOUNCES ADVISORY BOARD