infographic: are you keeping pace with security risks?
DESCRIPTION
Traditional vulnerability management is dependent on active scanners for vulnerability discovery, which can cause significant disruption to enterprise networks. In a large network with thousands of hosts, scans generate tens or hundreds of thousands of vulnerabilities, presenting security analysts with an impossible prioritization task and elongating the vulnerability window of exposure by many weeks. Skybox next-generation vulnerability management uses scanless vulnerability detection to continuously monitor the attack surface and critical vectors, feeding vulnerability data into automated risk-based prioritization and remediation. This allows security teams to remediate critical vulnerabilities immediately, sealing off vulnerabilities that could lead to intrusion or data breach at least 50 times faster compared to traditional vulnerability management processes.TRANSCRIPT
![Page 1: Infographic: Are You Keeping Pace with Security Risks?](https://reader035.vdocuments.site/reader035/viewer/2022081907/54b6b36b4a79597b0c8b465a/html5/thumbnails/1.jpg)
TRADITIONALVULNERABILITY MANAGEMENT
NEXT-GENERATIONVULNERABILITY MANAGEMENT
VS.
Whole process takes250
3 MONTHSOR MORE!
RINSE & REPEAT
ACTIVE SCAN
PR
OC
ES
S
HOSTSPER HOUR
Scanless Discovery
Manual AnalysisActive ScanAssessment
300 PageReport
Automated, Context-AwareAnalysis
Support Ticket
3 Whole process takes
12,000
ONE DAY!
SCANLESS DETECTIONHOSTSPER HOUR50x
FASTER
IN LESS THAN 1 DAY
40% of companies scan the DMZmonthly or less frequently due toconcerns about disruption.
Round-robin scanning skipsimportant systems for weeksor months.
Data is continuously updated,with no round-robincompromise needed.
Derives vulnerabilities fromexisting data resulting in nonetwork disruption.
50%IN 30-90 DAYS
STALE DATA FRESH DATA
VIS
IBIL
ITY
Network Visibility
Focused
Risk-based
Blind spots
Data Overload
No Context 90%
NON-DISRUPTIVEDISRUPTIVE
OF NETWORK COVERED OF NETWORK COVERED
∞∞
RIS
K R
ED
UC
TIO
N
to prioritize
of unnecessary patching alternatives
false positives false positives
by risk automaticallyHARD
HIGH
LOTS
N E A R
ZERO
RANK
FIND
CONTEXTAWARE
CHASE REDHERRINGS
ATTACK VECTORSOPEN FOR MONTHS
ELIMINATE ATTACKVECTORS FAST
99%TOO MUCH
DATA DATA REDUCTION
Raise the bar against attacks every day.SOURCES
Skybox Security Customer Deployment Analysis
Skybox Security Lab Test Results
Skybox Security Vulnerability Manangement Survey 2012(conducted in conjunction with Osterman Research)