Network Firewalls, Network Access Control , Next-Generation Technologies & Secure Development

Visualizing the Entire Attack Surface

Skybox Security CEO Gidi Cohen on the Evolution of Total Visibility
Visualizing the Entire Attack Surface
Gidi Cohen, CEO, Skybox Security

In the world of the extended enterprise, everybody seeks greater visibility into network activity. But Gidi Cohen was there in 2002, founding Skybox Security to provide analytics to improve cybersecurity. Cohen discusses the evolution of visibility.

"Skybox since its inception ... always focused on providing basic management tools to the CISOs and security teams," says Cohen, the CEO of Skybox. "We always believed one of the most elementary tools for any management in security specifically is getting visibility into whatever's going on. "

And with today's tools and the power of data analytics, this visibility translates into new ways to actually visualize one's security landscape.

One of today's key priorities is for security leaders to be able to visualize their attack surface across all of the multiple endpoints. "That might sound simple, but large enterprises or government agencies may have potentially millions of attack vectors," Cohen says. "So, the ability to distill [data] into simple visuals ... can bring great value to every CISO."

In an interview recorded at RSA Conference 2016, Cohen discusses:

  • The evolution of visibility tools;
  • How this visibility enhances cybersecurity;
  • Feedback from security leaders who have deployed these tools.

Cohen co-founded Skybox in 2002 and has guided the company's vision and development as a leader in cybersecurity analytics. He is a frequent speaker at industry conferences worldwide, demonstrating how sophisticated analytics, modeling and simulation, as well as unprecedented network visibility can be used to reduce an enterprise's attack surface.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.