skyboxSkybox gives security leaders the cybersecurity management solutions they need to eliminate attack vectors and safeguard business data and services every day. With unparalleled visibility and context-aware intelligence of the attack surface, Skybox solutions drive effective vulnerability and threat management, firewall management and continuous compliance monitoring.

Established in 2002, Skybox is a privately held company with worldwide sales and support teams serving an international customer base of Global 2000 enterprises and government agencies.

The Skybox Platform


Reduce your attack surface and contain cyberattacks fast with a cybersecurity management solution that gives you total visibility and actionable security intelligence.

The Skybox Platform combines firewall and network device data with vulnerability and threat intelligence, prioritizing security issues in the context of your unique environment.

Powerful attack vector analytics reduce response times and risks, bringing firewall, vulnerability and threat management processes for complex networks under control.

Get unprecedented visibility of the attack surface, including indicators of exposure (IOEs). Horizon’s security visualization and mapping capabilities are rooted in Skybox intelligence and analysis of all the layers that make up the attack surface — including assets, hybrid network topology, weaknesses and threats.

Horizon makes it easier for operational teams to understand and discuss security risks and cyberthreats — and plan how to address them. Horizon tracks risk levels over time, so status and progress can easily be communicated with security stakeholders — including the C-suite and the board.

Cyber Security Management - Skybox Horizon

Gain total visibility of the vulnerabilities in your attack surface without waiting for a scan. Leverage Skybox Research Lab’s vulnerability and threat intelligence, and automatically correlate it to your unique environment.

With network modeling and advanced simulations, pinpoint exposed vulnerabilities and other attack vectors. And use context to prioritize vulnerabilities in terms of actual risk and respond to threats with accuracy and efficiency.

Cyber Security Management - Skybox Vulnerability Control

Consolidate threat intelligence from multiple sources in a normalized view to pinpoint your most critical risks. Harness risk-based security analytics to prioritize threats and optimize your response for your organization.

Add valuable threat intelligence to your vulnerability analysis with Threat Manager data to better understand your risk.

Cyber Security Management - Skybox Security Threat Manager

Secure and optimize your firewalls and keep rulesets clean with automated firewall rule life cycle management. With support for nearly every enterprise firewall vendor, you can keep security gaps closed and automate continuous compliance across all firewalls at once.

Firewall Assurance also performs “what-if” analysis to see into the future of your network, investigating the security and business impact of proposed changes before they go live.

Cyber Security Management - Skybox Firewall Assurance

Streamline daily firewall change management tasks with an automated workflow that speeds up processes from planning to execution. Check each proposed change for security and compliance with automated, proactive risk assessments, and track every step for a full audit trail.

Change Manager’s Network Mode also lets you visualize proposed change routes to see details surrounding the change, identify relevant firewalls and plan necessary actions.

Cyber Security Management - Skybox Change Manager

See your network—no matter how big or complex — with the Skybox network model. Use attack vector analytics to assess proposed network changes, and verify network compliance every day with customizable reporting and metrics.

With the Access Analyzer feature and our support for Amazon Web Services, Microsoft Azure and VMware NSX, Network Assurance visualizes end-to-end access paths — even into virtualized environments — so the right users have the right access anywhere in your network.