What is our primary use case?
Our company installs and manages the solution for our clients and we have two primary use cases.
The most common use case is monitoring the security compliance of firewalls. Every company has a firewall policy that includes rules, what traffic is allowed, which ports are open and more. The solution analyzes each firewall and reports if compliance is not achieved.
Another use case is importing network devices. The solution builds a map to analyze an entire network including compliance of routers and switches that sit behind the firewall. For example, a banking customer might have network zones such as office, core systems, and ATM cashpoints. Between those, the bank has various policies about what traffic can be open. The solution monitors compliance of the network's configuration against policies. Most UK banks are using the solution for this purpose because it is a unique feature.
A third use case is change management in relation to firewalls. Companies that monitor their firewalls and network zones's compliance often have change orders. If a user requests a change today but it isn't implemented for a week, some solutions will only pick up a non-compliance issue at the actual time of implementation. This solution includes a change manager module that reviews changes before they are implemented, catches non-compliance issues, and stops implementation until they are corrected. It handles all network assurance including in the cloud.
The final use case is vulnerability management. The solution is unlike Qualys which scans while it detects vulnerabilities, but it instead imports vulnerabilities and patch statuses from various vendors. This is a very useful tool for companies who may have different vulnerability scanners and patch management solutions because the solution imports everything into one consistent system where it runs vulnerabilities. The solution looks at which systems are most risky to fix those vulnerabilities first. Because of its unique network model, the solution understands possible flows of data in the network and analyzes attack vulnerabilities.
What is most valuable?
The solution's most valuable and unique assets are the vulnerability management and change management solutions because they identify mistakes in the network before implementation which reduces risks. There aren't many competitors offering these tools.
What needs improvement?
The solution needs to move and improve its interface to a full web browser version that is more accessible and doesn't require installation for use.
Speed of analysis could be improved because it takes quite a lot of computing power to import data from various networks, servers, firewalls, routers, and vulnerability scanners. Sometimes it can take 12 hours to run an analysis. If you understand scaling, upscaling vertically doesn't work really well because there's always a ceiling in computing resources. But upscaling horizontally by making the solution capable of paralyzing computational resources works well in computing science and theory.
For how long have I used the solution?
I have been using the solution every day for eight years.
Buyer's Guide
Skybox Security Suite
April 2025
Learn what your peers think about Skybox Security Suite. Get advice and tips from experienced pros sharing their opinions. Updated: April 2025.
849,686 professionals have used our research since 2012.
What do I think about the stability of the solution?
The stability has improved greatly because there has been a drive for improvement. Currently, stability is as good as any other enterprise software.
What do I think about the scalability of the solution?
The current solution is only scalable vertically. When you scale vertically, you are adding bigger resources to the same computer.
If you have a computer server that needs more speed, you might change CPUs. You may add an additional CPU or add more memory or disk space. But there is a ceiling because of server size. It is not feasible to buy a server with 300 petabytes of memory. There are also storage and CPU ceilings. If you have a bigger network and you need to analyze it faster or you have a lot of information, then you need a bigger server.
Skybox is rearchitecting the solution to scale horizontally and ask before running analysis on the server. Instead, the analysis will be offloaded to different virtual machines that can be paralyzed effectively. Essentially, you go left or right to connect with resources. Instead of one server for the task, you can have 50 servers that might only be in use for ten minutes. The server speaks to the infrastructure, tells it to access 50 servers to run a certain application like a script or Java codes, assigns the task, and tells the infrastructure to report back with the results. Scaling horizontally is the only way in computer science to effectively tap into unlimited scaling.
How are customer service and support?
We only use support when we have problems that we can't solve ourselves. For us, support is topnotch and I rate it a ten out of ten.
The support experience depends on who is asking. If an IT engineer has been given the solution to run, they might have to ask a lot of questions and the support for that won't be very good. To be honest, I've seen support queries from customers that clearly shouldn't be touching a server. Support doesn't know what to do with requests from these customers. For these cases, I would rate support an eight out of ten.
How would you rate customer service and support?
How was the initial setup?
Setup can be tricky if you don't have experience. It can be a complicated product to install and operate. Most of the issues we've experienced don't relate to the tool itself but relate to the availability of data points.
The solution needs to import conflicts from firewalls, network routers, vulnerability scanners, and maybe patch management solutions. Stakeholders are not only security teams but network teams that could be from Linux, Windows, a third-party provider, managed security, managed party, or managed IT providers.
The complexity is not related to how well the solution works but the process for embedding it in a company. The biggest challenge is organizational complexity and selling the usefulness of the solution to all parties. The typical owner of the solution is the security team. If they don't have a good relationship with the networking team, then that team may not want to provide information about the configuration of firewalls or routers. Without this information, the security team is stuck, won't be able to find conflicts, and Skybox isn't doing anything. This complexity is typically on the organizational structure side and includes internal politics and complex service partners.
What about the implementation team?
Our setup team is very experienced and handles installations. We are the only certified service plus partner in India for design, implementation, and management. Our experience is a ten out of ten.
We are often called on to review implementations and find inefficiencies. It is easy to make a mistake and it's important to correct them quickly for customers who've already invested a big budget in licenses and implementation.
An IT engineer who doesn't have experience might struggle. Based on this, I would rate the setup a six out of ten.
What's my experience with pricing, setup cost, and licensing?
The solution is not inexpensive but customers value cyber security assurance, network assurance, and vulnerability management. A mid-size organization may not be able to afford the solution which is geared toward companies with 2,000 users.
Value and ROI are two different things. Overall, ROI in cyber security only exists in well-defined cases, but there is clear value for customers who use the solution.
What other advice do I have?
It is important to talk with experts to determine if this is the right solution for your company. If you go to a car dealership, you might have a certain budget and can only afford a small Volkswagen Golf. But you might be persuaded to go with a top brand and bigger package.
An expert will first analyze needs or use cases and then engage with other teams required for configuration like network teams or third-party IT providers. If all teams are not on board but the solution is purchased, you might spend several months negotiating with those teams to get what you need. During this time, the company is wasting money because the solution is not able to do anything.
Experts will first create a design for the organization and solution. How will it be used? Who are the stakeholders? How will we obtain the necessary configuration files? Where will it be hosted? Who will operate it? The information creates a business case and informs a purchasing decision. It is important that companies follow this structure rather than advice like, "This is a really good tool so you should buy it now and figure it out later."
The tool is very useful but not marketed widely because it is a niche product. Other tools like FortiGate market widely and many companies are certified to design, implement, and manage it.
I rate the solution an eight out of ten only because it is not for small or medium-sized businesses but rather for large enterprises with specific compliance needs.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: reseller