infographic: are you keeping pace with security risks?

1
TRADITIONAL VULNERABILITY MANAGEMENT NEXT-GENERATION VULNERABILITY MANAGEMENT VS. Whole process takes 250 3 MONTHS OR MORE! RINSE & REPEAT ACTIVE SCAN PROCESS HOSTS PER HOUR Scanless Discovery Manual Analysis Active Scan Assessment 300 Page Report Automated, Context-Aware Analysis Support Ticket 3 Whole process takes 12,000 ONE DAY! SCANLESS DETECTION HOSTS PER HOUR 50x FASTER IN LESS THAN 1 DAY 40% of companies scan the DMZ monthly or less frequently due to concerns about disruption. Round-robin scanning skips important systems for weeks or months. Data is continuously updated, with no round-robin compromise needed. Derives vulnerabilities from existing data resulting in no network disruption. 50% IN 30-90 DAYS STALE DATA FRESH DATA VISIBILITY Network Visibility Focused Risk-based Blind spots Data Overload No Context 90% NON-DISRUPTIVE DISRUPTIVE OF NETWORK COVERED OF NETWORK COVERED RISK REDUCTION to prioritize of unnecessary patching alternatives false positives false positives by risk automatically HARD HIGH LOTS NEAR ZERO RANK FIND CONTEXT AWARE CHASE RED HERRINGS ATTACK VECTORS OPEN FOR MONTHS ELIMINATE ATTACK VECTORS FAST 99% TOO MUCH DATA DATA REDUCTION Raise the bar against attacks every day. SOURCES Skybox Security Customer Deployment Analysis Skybox Security Lab Test Results Skybox Security Vulnerability Manangement Survey 2012 (conducted in conjunction with Osterman Research)

Upload: skybox-security

Post on 15-Jan-2015

303 views

Category:

Technology


1 download

DESCRIPTION

Traditional vulnerability management is dependent on active scanners for vulnerability discovery, which can cause significant disruption to enterprise networks. In a large network with thousands of hosts, scans generate tens or hundreds of thousands of vulnerabilities, presenting security analysts with an impossible prioritization task and elongating the vulnerability window of exposure by many weeks. Skybox next-generation vulnerability management uses scanless vulnerability detection to continuously monitor the attack surface and critical vectors, feeding vulnerability data into automated risk-based prioritization and remediation. This allows security teams to remediate critical vulnerabilities immediately, sealing off vulnerabilities that could lead to intrusion or data breach at least 50 times faster compared to traditional vulnerability management processes.

TRANSCRIPT

Page 1: Infographic: Are You Keeping Pace with Security Risks?

TRADITIONALVULNERABILITY MANAGEMENT

NEXT-GENERATIONVULNERABILITY MANAGEMENT

VS.

Whole process takes250

3 MONTHSOR MORE!

RINSE & REPEAT

ACTIVE SCAN

PR

OC

ES

S

HOSTSPER HOUR

Scanless Discovery

Manual AnalysisActive ScanAssessment

300 PageReport

Automated, Context-AwareAnalysis

Support Ticket

3 Whole process takes

12,000

ONE DAY!

SCANLESS DETECTIONHOSTSPER HOUR50x

FASTER

IN LESS THAN 1 DAY

40% of companies scan the DMZmonthly or less frequently due toconcerns about disruption.

Round-robin scanning skipsimportant systems for weeksor months.

Data is continuously updated,with no round-robincompromise needed.

Derives vulnerabilities fromexisting data resulting in nonetwork disruption.

50%IN 30-90 DAYS

STALE DATA FRESH DATA

VIS

IBIL

ITY

Network Visibility

Focused

Risk-based

Blind spots

Data Overload

No Context 90%

NON-DISRUPTIVEDISRUPTIVE

OF NETWORK COVERED OF NETWORK COVERED

∞∞

RIS

K R

ED

UC

TIO

N

to prioritize

of unnecessary patching alternatives

false positives false positives

by risk automaticallyHARD

HIGH

LOTS

N E A R

ZERO

RANK

FIND

CONTEXTAWARE

CHASE REDHERRINGS

ATTACK VECTORSOPEN FOR MONTHS

ELIMINATE ATTACKVECTORS FAST

99%TOO MUCH

DATA DATA REDUCTION

Raise the bar against attacks every day.SOURCES

Skybox Security Customer Deployment Analysis

Skybox Security Lab Test Results

Skybox Security Vulnerability Manangement Survey 2012(conducted in conjunction with Osterman Research)