• Support
  • Contact Us
Stellar Cyber
  • Platform
    • Overview
    • Platform Tour
    • How It Works
    • Stellar Cyber for Enterprises
    • Stellar Cyber for MSSPs
    • Before and After Stellar Cyber
    • What is Open XDR
  • Industries
    • Manufacturing
    • Government
    • Higher Education
    • Financial Services
  • Services
    • Overview
    • Customer Enablement
    • Stellar Cyber Academy
    • Customer Success
    • Customer Support
  • Pricing
  • Resources
    • Library
    • Blogs
    • Case Studies
    • Data Sheets
    • Ebooks
    • Research Reports
    • Use Case Videos
    • Podcasts
    • Whitepapers
    • Webinars
  • Partners
    • Become A MSSPs Partner
    • Become A Channel Partner
    • Become A Technology Partner
    • Open XDR Marketplace
    • Partner Portal
  • Company
    • About Us
    • Our History
    • Events
    • Press Coverage
    • News Releases
    • Customer Testimonials
    • Careers
    • Contact Us
  • Request A Demo
  • Platform
    • Overview
    • Platform Tour
    • How It Works
    • Stellar Cyber for Enterprises
    • Stellar Cyber for MSSPs
    • Before and After Stellar Cyber
    • What is Open XDR
  • Industries
    • Manufacturing
    • Government
    • Higher Education
    • Financial Services
  • Services
    • Overview
    • Customer Enablement
    • Stellar Cyber Academy
    • Customer Success
    • Customer Support
  • Pricing
  • Resources
    • Library
    • Blogs
    • Case Studies
    • Data Sheets
    • Ebooks
    • Research Reports
    • Use Case Videos
    • Podcasts
    • Whitepapers
    • Webinars
  • Partners
    • Become A MSSPs Partner
    • Become A Channel Partner
    • Become A Technology Partner
    • Open XDR Marketplace
    • Partner Portal
  • Company
    • About Us
    • Our History
    • Events
    • Press Coverage
    • News Releases
    • Customer Testimonials
    • Careers
    • Contact Us
  • Request A Demo
Year: 2020
automated socautomated soc
Cyberattacks, Cybersecurity, IT technology, Network Security, Open XDR, XDR December 28, 2020October 3, 2022

Interview With Changming Liu by Safety Detectives

Changming Liu, CEO and Co-Founder of Stellar Cyber, did us the honor of sitting down for an interview with Aviva Zacks of Safety Detectives. He

Continue reading

Network securityNetwork security
AI-driven security, Cloud Security, Cyberattacks, Cybersecurity, Data Collection, security technology December 18, 2020October 3, 2022

SolarWinds SUNBURST Backdoor DGA and Infected Domain Analysis

On December 13 2020, multiple vendors such as FireEye and Microsoft reported emerging threats from a nation-state threat actor who compromised

Continue reading

automated socautomated soc
Podcast November 12, 2020October 4, 2022

How MSSPs Differentiate. Flexible Solutions. Brian Stoner,VP of Service Providers at Stellar Cyber

Meet Brian Stoner,VP of Service Providers at Stellar Cyber.   Cybercrime Magazine · How MSSPs Differentiate. Flexible Solutions. Brian

Continue reading

Network traffic analysis applicationNetwork traffic analysis application
AI-driven security, Artificial Intelligence, Cybersecurity, MSSP, Network Security, Open XDR, XDR November 2, 2020October 4, 2022

Managed Security Providers driving profitable MDR services with Stellar Cyber Open-XDR Platform

Extending managed detection and response across your customers entire attack surface with one comprehensive platform MSPs and MSSPs represent a

Continue reading

automated threat hunting applicationautomated threat hunting application
AI-driven security, Artificial Intelligence, Cybersecurity, Network Traffic Analysis, Open XDR October 22, 2020October 4, 2022

IUWorld Cybersecurity Governance, Risk & Compliance

Part II: User and Entity Behavior Management (10-minute discussion & demo) Jeff: Welcome to the 2nd Episode of IUWorld Thought Leadership

Continue reading

cloud detection and responsecloud detection and response
AI-driven security, Artificial Intelligence, Cloud Security, Cybersecurity, IT technology, Network Security, Open XDR, XDR October 4, 2020October 4, 2022

IUWorld Cybersecurity Governance, Risk & Compliance

Part I: Demystifying Cyber Health and Cyber Threat Hunting  JEFF: Welcome to Cloud Expo, can you please help explain what cyber threat hunting

Continue reading

Security softwareSecurity software
AI-driven security, Artificial Intelligence, Cloud Security, Cybercriminals, Cybersecurity, IT technology, Network Security, Network Traffic Analysis, Open XDR, XDR October 1, 2020October 4, 2022

Leverage the tools and telemetry you trust

The industry is at a pivotal point. With the pandemic driving up work-from-home and forcing hybrid work environments as well as many applications

Continue reading

Network traffic analysis applicationNetwork traffic analysis application
Application Security, Cloud Security, Cyberattacks, Cybercriminals, Cybersecurity, IT technology, Network Security, Network Traffic Analysis, security technology September 15, 2020October 4, 2022

What is Network Security?

The historical definition of network security is to use a firewall to screen users coming into the network, but as IT technology and security

Continue reading

entity behavior analytics toolsentity behavior analytics tools
AI-driven security, Artificial Intelligence, Cybercriminals, Cybersecurity, XDR September 10, 2020October 4, 2022

Red Team – Blue Team Testing – The Big Picture

Ever since offensive security testing began, we have expected that the test or simulation will find something. Even if a pen tester doesn’t

Continue reading

Network securityNetwork security
Podcast September 9, 2020October 4, 2022

Interview With Albert Zhichun Li, Chief Scientist at Stellar Cyber

Interview With Albert Zhichun Li, Chief Scientist at Stellar Cyber
extended detection and responseextended detection and response
AI-driven security, Artificial Intelligence, Breach Detection, Cyberattacks, Cybersecurity, Data Collection, Uncategorized, XDR August 28, 2020October 4, 2022

When is Enough, Enough?

Are SIEMs the foundation to build on or are they empty promises? With more complex cyberattacks on the rise, and with COVID-19 adding additional

Continue reading

SIEM toolsSIEM tools
Podcast July 22, 2020October 4, 2022

Opportunities for women in the cybersecurity.

Opportunities for women in the cybersecurity. TechBlogWriter interview of Aimei Wei Listen the Audio
Network traffic analysis applicationNetwork traffic analysis application
AI-driven security, Artificial Intelligence, Cyberattacks, Cybercriminals, Cybersecurity, Data Collection, XDR July 17, 2020October 4, 2022

What Is Cybersecurity?

Cybersecurity is in the news a lot, and typically in a bad way. We learn about Cybersecurity through well-publicized cyberattacks on major

Continue reading

Network traffic analysis applicationNetwork traffic analysis application
AI-driven security, Artificial Intelligence, Cyberattacks, Cybercriminals, Cybersecurity, Data Collection, XDR July 16, 2020October 4, 2022

Cybersecurity Challenges and Solutions

Cybersecurity is the art and science of protecting computer systems and networks from the theft of electronic data, damage to hardware or

Continue reading

firewall traffic analysis applicationfirewall traffic analysis application
AI-driven security, Artificial Intelligence, Cybersecurity, Data Collection, XDR July 9, 2020October 4, 2022

A Conversation about the New Wave of Cybersecurity

Its time, again, to change the conversation in cybersecurity. It’s neither data-driven nor AI-driven cybersecurity, which you might have heard

Continue reading

security analysissecurity analysis
Podcast May 27, 2020October 4, 2022

Meet Stellar Cyber and the Open-XDR Security Platform

Meet Stellar Cyber and the Open-XDR Security Platform. Cybercrime Magazine interview of Steve Garrison Listen the Audio
Open XDR PlatformOpen XDR Platform
Artificial Intelligence, Data Collection, XDR May 12, 2020October 4, 2022

Why are leading market research firms so excited about XDR?

Q&A with CEO and Co-Founder Changming Liu   Q. Why do you think people including CISOs and analysts are so excited by XDR? Ans: SIEMs

Continue reading

Security softwareSecurity software
Artificial Intelligence, Breach Detection, Data Collection, Uncategorized, XDR April 20, 2020October 4, 2022

Big companies are not immune to Ransomware!

CISO At Large David Barton, Chief Information Security Officer, brings to Stellar Cyber more than 20 years of experience in security leadership

Continue reading

Posts navigation

Older posts

FOR ENTERPRISE

  • Replace SIEM
  • Complement SIEM
  • Deploy NDR
  • Turn EDR Into XDR
  • Next Gen SOC

CAPABILITIES

  • Next Gen SIEM
  • Universal EDR
  • Automated Threat Hunting
  • Automated Response
  • Threat Intelligence

PARTNERS

  • Become a MSSP Partner
  • Become a Channel Partner
  • Become a Technology Partner
  • Open XDR Ecosystem
  • Partner Portal

Resources

  • Blogs
  • Case Studies
  • Data Sheets
  • eBooks
  • Use Case Videos
  • Podcasts
  • Webinars
  • Whitepapers

Company

  • Who We Are
  • Our History
  • Reduce Insurance Costs
  • Events
  • Media Kit
  • News Releases
  • Press Coverage
  • Customer Testimonials
  • Careers
  • Contact Us

For MSSP

  • Increase Revenue and Margin
  • Sell SOC-as-a-Service
  • Sell MDR-as-a-Service
  • Grow Market With Universal EDR

TECHNOLOGIES

  • Sensors
  • Interflow
  • Data Lake
  • AI Engine
  • XDR Kill Chain
  • Deployment

NETWORK

  • Network Traffic Analysis (NTA)
  • Firewall Traffic Analysis (FTA)
  • Data Streaming
  • Security Across Clouds
  • Automated SOC
  • Securing Containers
  • User Entity Behavior Analytics
  • Cloud Detection Response
  • NTA / NDR+ with ML-powered IDS

REPORTING

  • Log Management Use Cases
  • Compliance and reporting

FOR INFRASTRUCTURE

  • Integrating Existing Infrastructure
  • How Interflow Works
  • Collection Engines
  • Multi Tenant Security Platform
  • Data Processing Engine
Stellar Cyber
© 2023 Stellar Cyber All Rights Reserved | 2590 N First St Suite 360 San Jose, CA 95131
X
See Stellar Cyber
Upcoming Events!
Cookies on Stellar
We use cookies for a number of reasons, such as keeping Stellar Cyber websites reliable and secure, personalising content and ads, providing social media features and to analyse how our sites are used. Read More
AcceptReject
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT