• Support
  • Contact Us
Stellar Cyber
  • Platform
    • Overview
    • Platform Tour
    • How It Works
    • Stellar Cyber for Enterprises
    • Stellar Cyber for MSSPs
    • Before and After Stellar Cyber
    • What is Open XDR
  • Industries
    • Manufacturing
    • Government
    • Higher Education
    • Financial Services
  • Services
    • Overview
    • Customer Enablement
    • Stellar Cyber Academy
    • Customer Success
    • Customer Support
  • Pricing
  • Resources
    • Library
    • Blogs
    • Case Studies
    • Data Sheets
    • Ebooks
    • Research Reports
    • Use Case Videos
    • Podcasts
    • Whitepapers
    • Webinars
  • Partners
    • Become A MSSPs Partner
    • Become A Channel Partner
    • Become A Technology Partner
    • Open XDR Marketplace
    • Partner Portal
  • Company
    • About Us
    • Our History
    • Events
    • Press Coverage
    • News Releases
    • Customer Testimonials
    • Careers
    • Contact Us
  • Request A Demo
  • Platform
    • Overview
    • Platform Tour
    • How It Works
    • Stellar Cyber for Enterprises
    • Stellar Cyber for MSSPs
    • Before and After Stellar Cyber
    • What is Open XDR
  • Industries
    • Manufacturing
    • Government
    • Higher Education
    • Financial Services
  • Services
    • Overview
    • Customer Enablement
    • Stellar Cyber Academy
    • Customer Success
    • Customer Support
  • Pricing
  • Resources
    • Library
    • Blogs
    • Case Studies
    • Data Sheets
    • Ebooks
    • Research Reports
    • Use Case Videos
    • Podcasts
    • Whitepapers
    • Webinars
  • Partners
    • Become A MSSPs Partner
    • Become A Channel Partner
    • Become A Technology Partner
    • Open XDR Marketplace
    • Partner Portal
  • Company
    • About Us
    • Our History
    • Events
    • Press Coverage
    • News Releases
    • Customer Testimonials
    • Careers
    • Contact Us
  • Request A Demo
Year: 2019
network detection response applicationnetwork detection response application
Artificial Intelligence, Breach Detection, Data Collection, Uncategorized November 27, 2019October 4, 2022

XDR Without Limits

The industry is awash in cybersecurity tools that focus on specific parts of the infrastructure. There’s EDR (endpoint detection and response)

Continue reading

extended detection and responseextended detection and response
Artificial Intelligence, Breach Detection, Data Collection, Uncategorized November 14, 2019October 4, 2022

A brief history of machine learning in cybersecurity

How to connect all the dots in a complex threat landscape Originally published in Security infowatch AUTHORS DAVID BARTONDR. ALBERT ZHICHUN LI

Continue reading

network detection response applicationnetwork detection response application
Artificial Intelligence, Breach Detection, Data Collection November 5, 2019October 4, 2022

A Platform to Support XDR

Edward Amoroso, Tag Cyber | November 04, 2019 Let’s start with some conditionals: First, if you focus on indicators, then detection and response

Continue reading

Firewall Traffic AnalysisFirewall Traffic Analysis
Breach Detection October 29, 2019October 4, 2022

MDR-as-a-Service – Is it the Holy Grail as Some Say?

MDR-as-a-Service – Is it the Holy Grail as Some Say? David Barton, Stellar Cyber CISO Every few months it seems there is another wave of new

Continue reading

network traffic analysisnetwork traffic analysis
Breach Detection October 17, 2019October 4, 2022

SIEM is dead! Long live C.I.A.

For years, I have heard the benefits of log forwarding and collection. Send all your data to a SIEM and your security program will be better and

Continue reading

network traffic analysis for cybersecuritynetwork traffic analysis for cybersecurity
Artificial Intelligence, Breach Detection October 16, 2019October 4, 2022

Introducing “Swipe Left” Security

You may have heard about the idea of shifting left in security: as developers move more to the cloud, security professionals are looking more

Continue reading

next gen siemnext gen siem
Artificial Intelligence, Breach Detection, Data Collection September 18, 2019October 4, 2022

Security as a Service – Where do I start?

Security as a Service – Where do I start? A discussion with David Barton, CISO at Stellar Cyber Every managed service provider seems to be

Continue reading

next gen siem applicationnext gen siem application
AI-driven security, Artificial Intelligence, Breach Detection, Data Breaches, Data Collection, Data Storage, Deployment Models - Datasheets, XDR, XDR Adoption, XDR Solutions September 18, 2019November 1, 2022

Bundling Security Services to Improve Pricing and Close Ratios

Today’s businesses succeed by selling a handful of bundled items to a large number of customers. Think about restaurants, where the trend has

Continue reading

open xdropen xdr
Breach Detection August 13, 2019October 4, 2022

The 2019 Capital One Breach

Data breaches are major security threats for enterprises and end users. Previously, we discussed the Equifax data breach that leaked the social

Continue reading

open xdr integrated applicationopen xdr integrated application
Breach Detection July 3, 2019October 4, 2022

New Ransomware called LooCipher has been found in the Wild

According to Bleeping Computer, a new ransomware called LooCipher has been found in the wild.

Continue reading

security analysissecurity analysis
Artificial Intelligence May 11, 2019October 4, 2022

Stellar Cyber with John Peterson, Chief Product Officer

On this episode of Silicon Valley Insider host Keith Koo has special guest John Peterson, Chief Product Officer of Stellar Cyber

Continue reading

security softwaresecurity software
Breach Detection, Data Collection May 9, 2019October 4, 2022

DNS under fire lately as nation-states and hacker groups steal credentials from unsuspecting victims.

DNS has come under fire lately as nation-states and hacker groups have targeted DNS as a method to steal credentials from unsuspecting victims.

Continue reading

FOR ENTERPRISE

  • Replace SIEM
  • Complement SIEM
  • Deploy NDR
  • Turn EDR Into XDR
  • Next Gen SOC

CAPABILITIES

  • Next Gen SIEM
  • Universal EDR
  • Automated Threat Hunting
  • Automated Response
  • Threat Intelligence

PARTNERS

  • Become a MSSP Partner
  • Become a Channel Partner
  • Become a Technology Partner
  • Open XDR Ecosystem
  • Partner Portal

Resources

  • Blogs
  • Case Studies
  • Data Sheets
  • eBooks
  • Use Case Videos
  • Podcasts
  • Webinars
  • Whitepapers

Company

  • Who We Are
  • Our History
  • Reduce Insurance Costs
  • Events
  • Media Kit
  • News Releases
  • Press Coverage
  • Customer Testimonials
  • Careers
  • Contact Us

For MSSP

  • Increase Revenue and Margin
  • Sell SOC-as-a-Service
  • Sell MDR-as-a-Service
  • Grow Market With Universal EDR

TECHNOLOGIES

  • Sensors
  • Interflow
  • Data Lake
  • AI Engine
  • XDR Kill Chain
  • Deployment

NETWORK

  • Network Traffic Analysis (NTA)
  • Firewall Traffic Analysis (FTA)
  • Data Streaming
  • Security Across Clouds
  • Automated SOC
  • Securing Containers
  • User Entity Behavior Analytics
  • Cloud Detection Response
  • NTA / NDR+ with ML-powered IDS

REPORTING

  • Log Management Use Cases
  • Compliance and reporting

FOR INFRASTRUCTURE

  • Integrating Existing Infrastructure
  • How Interflow Works
  • Collection Engines
  • Multi Tenant Security Platform
  • Data Processing Engine
Stellar Cyber
© 2023 Stellar Cyber All Rights Reserved | 2590 N First St Suite 360 San Jose, CA 95131
X
See Stellar Cyber
Upcoming Events!
Cookies on Stellar
We use cookies for a number of reasons, such as keeping Stellar Cyber websites reliable and secure, personalising content and ads, providing social media features and to analyse how our sites are used. Read More
AcceptReject
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT