التكنولوجيا

أجهزة الاستشعار

Monitor what matters most
under the same license

Sensors are used to create visibility where it does not yet exist, or to simplify and consolidate telemetry collection with Stellar Cyber. Capture data from network, assets and containers. All under the same license. Administered from the same platform.

XNUMX˚ Visibility

Native Sensors For XNUMX˚ Visibility

يوفر Stellar Cyber Open XDR platform is designed with an open architecture to integrate with all common أدوات الأمن وتكنولوجيا المعلومات. However, sometimes the tools at an enterprise don't cover the entire attack surface. Stellar Cyber offers native sensor capability under the same license to create visibility where you need it the most. Simple, flexible deployment reduces costs and improves efficiency. Deploy as many sensors as you need.

تطبيق تحليل حركة مرور جدار الحماية

مجسات الشبكة

Collect metadata from physical or virtual switches and aggregate logs. The Network Sensor performs Deep Packet Inspection (DPI) at line-rate speeds to decode payloads and create useful metadata. Additionally, the Network Sensor can function as a log forwarder to simplify integrations.

Deployed as software or via dedicated hardware

أمن الإنترنت

مجسات الأمن

Collect metadata from physical or virtual switches, aggregate logs as well as detect intrusions and malware. The Security Sensor has all the functionality of the Network Sensor, as well as the ability to run signatures and extract files out of packet flows to inspect suspicious files.

Deployed as software or via dedicated hardware

أمن تكنولوجيا المعلومات

مجسات الخادم

Collect data running on Linux and Windows servers including traffic, commands, processes, file and application information. Sensors operate on Windows XNUMX and up, Ubuntu, CoreOS, Debian and Red Hat.

شبكة الأمن

مجسات الحاويات

Collect data from, and operate inside Docker environments.