Networking News

Skybox Security is Now Interoperability with VMware NSX

~Network mapping, access analysis and vulnerability detection are now more robust for virtual and cloud environments~

Continuing its efforts to be relevant to the virtual and cloud networks, Skybox Security has opened up its solution to VMware NSX network virtualization platform, supporting network mapping, access analysis and vulnerability detection in NSX environments. It means the solutions is now interoperable with the VMware Network platform.

This progression of Skybox will bring greater visibility to hybrid IT environments. Skybox previously announced integration with Amazon Web Services. And, the company will rollout support for additional virtualization and cloud platforms in the next year.

With new functionality in Skybox Network Assurance, enterprises gain end-to-end visibility, from their physical networks to virtualized and cloud networks. Comprehensive network mapping and modeling gives network security administrators insight to how policy is actually deployed on virtual machines and enables end-to-end access analysis, combining both north-south and east-west policies. Using Skybox security analytics and the network model, vulnerability management teams are also now able to discover vulnerabilities in virtual and cloud environments that were previously uncharted or inaccessible.

“Virtual machines are often spun up by system administrators who don’t view network architecture the same as security engineers”, said Skybox VP of Products Ravid Circus. “Yet, security teams need to be able to ensure security policy and tagging is implemented correctly to allow only authorized access to these machines. To do that, you need the same level of visibility into your virtual and cloud environments that you’ve come to expect with physical networks — Skybox provides that.”

Increased visibility into software-defined networks also further strengthens the capabilities of the Skybox Security Suite by providing the contextual information needed for accurate, risk-based prioritization of security and compliance exposures and attack vectors across the entire attack surface.

Related posts

Should We Migrate to SAP S/4HANA Now or Wait? The Dilemma of Today’s CIOs

enterpriseitworld

The Role of AIOps in Strengthening Cybersecurity

enterpriseitworld

Yotta CEO Sunil Gupta receives ‘AI Leader of the Year’ Award

enterpriseitworld
x