Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Skybox Security

Skybox Security | Skybox appliance 13.2.110.00-22.04.530

Linux/Unix, Ubuntu 22.04 - 64-bit Amazon Machine Image (AMI)

Reviews from AWS Marketplace

0 AWS reviews
  • 5 star
    0
  • 4 star
    0
  • 3 star
    0
  • 2 star
    0
  • 1 star
    0

External reviews

3 reviews
from G2

External reviews are not included in the AWS star rating for the product.


    Erdem E.

Skybox Risk Management Solution

  • January 13, 2023
  • Review provided by G2

What do you like best about the product?
The algorithms of shadowed rules and redundant rules are working very well. This feature is very beneficial. The shadowed rule optimization is a must to optimize and harden the firewall rules.
What do you dislike about the product?
The old dashboard and the background of the software is so cumbersome and bulky. On the new releases, the web-based dashboard has been published. Thankfully the new web-based dashboard is lightweight.
What problems is the product solving and how is that benefiting you?
It is extremely hard to detect the rule usage, shadowed and redundant rules, the rules which have vulnerabilities, and the rules which include vulnerable services.


    Computer & Network Security

Skybox: The Best Solution For Security Policy, Firewall , Vulnerability And Threat Management

  • November 20, 2022
  • Review provided by G2

What do you like best about the product?
The best part about the Skybox platform is that we can integrate multiple firewalls of different vendors and manage them from a single dashboard. Suppose any organization uses different firewall vendors like Palo Alto, CheckPoint, Fortigate or any other. In that case, we can add them to the skybox dashboard and see what rules are made on the, which rules are duplicates, which policy is redundant and several other use cases. Tracking individual rules on each firewall is very difficult, and skybox helps in this by giving a centralized view of all the policies made. We can also add our network devices running in the organization. Skybox automatically prepares a network map showing the connected devices and their network route.
What do you dislike about the product?
The solution is very costly, and large enterprises mainly purchase it. If any organization uses three to four firewalls, this solution is not meant for them. Also, the deployment part is challenging because no proper documentation is available on the website. The TAC team is slow to respond, and they do not provide immediate resolution to the problem. In the first two-three meeting, they simply collect logs, which can be critical if we work in any bank environment because the issue needs to be resolved immediately. Upgrades are released after a long time.
What problems is the product solving and how is that benefiting you?
We are using the skybox platform for our firewall rules optimization and to keep track of the changes made to them. Features like the change manager and firewall assurance of skybox are fantastic, and we mainly use them. Earlier, we kept many staffs for handling the firewall because all belonged to different vendors. It was hard to manage, but after skybox implementation, the work became manageable, and we also reduced the staff size; hence we have a good ROI and profit. Skybox delivers what it promises, which is incredible.


    Computer & Network Security

Advanced tool with good visualisation

  • October 01, 2022
  • Review provided by G2

What do you like best about the product?
Real time threat intelligence and most reliable user friendly platform, totally worth the cost and great firewall for the safety and in terms of vulnerability assessment this tool plays vital role for the company
What do you dislike about the product?
Dynamic objects are not properly identified by the tool and lots of bugs need to cleaned and it cannot be integrated with Microsoft Azure and at last too many updates
What problems is the product solving and how is that benefiting you?
Monitoring as well as detecting threats and providing total security to the user and vulnerability assessment are top notch and firewall security management is also good


showing 1 - 3