“Security leaders understand that the threat landscape is always changing. The difference now is that we’re seeing the growth of an increasingly commercialized cybercrime market. This is making it easier than ever for threat actors to attack, adjust and attack again until they accomplish their objective,” said Skybox CEO Gidi Cohen. “They tend to aim for the easy targets — and the biggest ROI — by exploiting a surprisingly small number of vulnerabilities, many of which current vulnerability management approaches don’t consider as priorities. This has to change. Security leaders have to be smarter and way more targeted in their approach — aligning it to what’s happening in the real world — if they are to stay ahead of cybercriminals.”
Skybox TCVM makes focused action possible by combining attack surface visibility, threat-centric vulnerability intelligence and attack vector analytics to identify and prioritize an organization’s biggest risks according to vulnerabilities known to:
- Exist and are exposed in the network
- Be actively exploited in the wild; or known to be attacked within a specific industry or geography
- Have an exploit available, but are not known to be part of an active exploit campaign
- Exist but are not exposed in the network
Threat-centric approaches to vulnerability management require the use of multiple technologies using several different types of security analytics. Skybox is the only company that brings together and automates the technology stack that makes TCVM possible. Skybox is also the only vendor that correlates network context (using network modeling and attack vector analytics) with real-world threat intelligence.
To learn more about Skybox TCVM and the Skybox Research Lab, click here.