What is our primary use case?
Our company uses the solution to provide firewall and vulnerability management for customers. We work with our customer's IT and cybersecurity departments to determine the use case such as viral assurance, network assurance, and change management. We have implemented the solution for 60 customers.
We provide firewall management for customers who can afford to purchase the Skybox firewall model.
Most of our use cases are implementing Skybox Control as a firewall tool. We provide customers with more focus so they can understand attack vectors and whether they come from different parts of a network or a partner workforce. The vulnerability control determines how we operate with an attack vector. For example, we might close ports, close some vectors, or patch software.
What is most valuable?
The solution is mature and powerful because it includes elaborate tools for getting a focused view of an infrastructure or creating attack vectors based on details from Qualys and Tenable.
Robust modules can be used for different parts of network security to match the business needs of big organizations.
There is a strong focus on customer retention because the customer satisfaction department works with the development department to implement customers' feedback in new releases.
What needs improvement?
The solution does not support certain devices or vendors in some regions or countries due to regulations. A universal connector would be an interesting way to ensure that support is worldwide.
The UX interface could be simplified and more convenient.
For how long have I used the solution?
I have been using the solution for eight years.
Buyer's Guide
Skybox Security Suite
May 2025
Learn what your peers think about Skybox Security Suite. Get advice and tips from experienced pros sharing their opinions. Updated: May 2025.
856,873 professionals have used our research since 2012.
What do I think about the stability of the solution?
The solution has a mature environment and is quite stable. We properly implement any hardware and cover the infrastructure so we have no issues with operating and analyzing data.
The solution includes tools for backup. If for some reason a customer experiences a slow down, then it takes only ten or twenty minutes to use the backup and recover.
What do I think about the scalability of the solution?
The solution is scalable so it works well for retail. For example, you can use a number of consoles or servers that operate with specific data in a specific segment. You can have a management server with a proxy in a different part of the network that operates specific devices on a segment or provides data for analyzing a management service.
You can add RAM or cores for virtual machines if you need more or deeper infrastructure segments.
How are customer service and support?
Training and technical support are provided at no extra charge.
Which solution did I use previously and why did I switch?
Most of our customers were using custom tools or scripts. They may have been trying to get insights from Cisco or Juniper.
Once businesses grow and mature, they understand the need for viral or vulnerability management tools. The solution can operate with custom tools so it provides the needed coverage.
For example, customers might have specific scanners but they do not cover or provide reports for all of the infrastructure's vulnerabilities. It is important for IT to manage the configuration of all network devices while competently managing vulnerabilities.
How was the initial setup?
I have years of experience so setup is quite simple.
It is important to understand networking and how various modules work. In general, a bit of training from the solution's partners is beneficial.
What about the implementation team?
We implement the solution for customers. Easy use cases can be completed by one technician and more complex security networks might be completed by three technicians.
We train our internal team and provide training to customers that includes general administration or common issues.
One or two administrators can handle hardware maintenance and report interpretation.
What was our ROI?
We work with customers to understand their ROI. The buy-in cost varies by customer because it is based on the modules selected.
The cost of implementation might end up being equal to a yearly salary but the importance of cybersecurity cannot be outweighed.
What's my experience with pricing, setup cost, and licensing?
The solution is based on a subscription model with annual licenses. Modules of interest are purchased separately. Training and updates are included at no extra charge.
A perpetual license used to be popular but is rarely used these days.
Which other solutions did I evaluate?
The solution is the most interesting for customers because its complexity and power is a match to different parts of networks.
AlgoSec is the toughest tool for viral management so is an option for customers who only want to focus on that.
What other advice do I have?
It is important to understand your company's needs. Jumping in and implementing all functionality or modules is not advised because they might not be needed.
Additionally, module implementation is complex because you must meet corporate compliance requirements for library management, network maps, and network security.
Take a step-by-step approach and try modules before purchasing them. Understand your needs and see if modules match them.
I rate the solution an eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: partner