AI-driven security

What’s the Deal with Open XDR

Managers of MSSP cybersecurity teams face many challenges, including the growing number and complexity of threats, tight budgets, a shortage of security analysts, and overworked teams who are frustrated by high volumes of alerts. Analyst teams have struggled for years with the philosophy of using a dozen or more discrete security tools to hunt for […]

What’s the Deal with Open XDR Read More »

Network traffic analysis

The New-Look Stellar Cyber

As a cybersecurity vendor, making a great product or service that solves a big problem is our goal. If we do our job right, we will help security teams better protect their environments and grow our business. Now, a million variables play into a company’s ability to grow. While many are directly related to the

The New-Look Stellar Cyber Read More »

Next Gen SIEM

Guest Blog: A Tale of Two Cyber Vulnerabilities: Why It Makes Sense to Consolidate Managed IT and Security Operations

Written by Patti Hallock, Director of XDR Operations/Engineering at Agio Your security operations are critical, and every decision you make impacts those operations. When you have separate service providers–one for managed IT and another for extended detection & response (XDR)–you run the risk of delayed response and service. Patti Hallock, our Director of XDR Operations

Guest Blog: A Tale of Two Cyber Vulnerabilities: Why It Makes Sense to Consolidate Managed IT and Security Operations Read More »

SIEM security

What is a Lean Security Team, and how to know if you are part of one

Recently I wrote a blog about what makes a lean security team tick, however, after I posted, it occurred to me that I probably should have spent a few minutes talking about the different types of security teams we run into and how to determine if you fit into the lean security team category. You

What is a Lean Security Team, and how to know if you are part of one Read More »

SIEM replacement

Build a new Superpower for your MSSP business!

Providing endpoint security for all your customers is a major challenge. First, it is very rare that partners can deploy an entire endpoint security stack. In many cases, there are servers or other endpoints that do not get covered, or you have customers in the middle of contracts with one EDR provider or another and

Build a new Superpower for your MSSP business! Read More »

Network traffic analysis

When Doing Nothing is Too Expensive

Resource strapped companies trying to put together a comprehensive cybersecurity defense in today’s environment have three key challenges: there’s not enough time, there aren’t enough people, and there isn’t enough money. Most companies look at their monthly spend on security tools, training and headcount and the typical reaction (after the groaning) is to stand pat,

When Doing Nothing is Too Expensive Read More »

XDR

XDR/Open XDR Q&A

What are the most common misconceptions about XDR? One of the common misconceptions is that XDR is automatically the ideal security solution. Point security solution vendors position XDR as the Holy Grail if you are using their product suite. By default, this positioning has limitations, since customers can’t onboard data sources from other vendors and

XDR/Open XDR Q&A Read More »

SIEM security

SIEM, XDR, and the Evolution of Cybersecurity Infrastructure

Security Event and Information Management platforms (SIEMs) collect data from security logs and in doing so are supposed to identify blind spots, reduce noise and alert fatigue, and simplify detection and response to complex cyberattacks. However, SIEMs have not lived up to these promises. Now, the new idea is XDR – what are its advantages,

SIEM, XDR, and the Evolution of Cybersecurity Infrastructure Read More »

XDR

Q&A on Network Detection and Response (NDR)

What is NDR? Today’s network detection and response (NDR) has a long history, evolving out of network security and network traffic analysis (NTA). The historical definition of network security is to use a perimeter firewall and Intrusion Prevention Systems to screen traffic coming into the network, but as IT and security technology have evolved, the

Q&A on Network Detection and Response (NDR) Read More »

Open XDR Platform

Everything about XDR is around Correlations, not Hype

In the last several months the XDR acronym is being used by almost every security product manufacturer.  It is one thing to say that you have it, but the hard work that goes into building the detections takes years.  It is not enough to say that you have a big data platform that you can

Everything about XDR is around Correlations, not Hype Read More »

XDR

Cybersecurity Must Evolve Beyond Compliance: Is Open XDR the Answer?

Today there is no shortage of compliance requirements. There are so many, in fact, that there are billions of dollars spent every year on tools and audits. These regulations have the right goal in mind: protect companies, their intellectual property and their customers. Unfortunately, by the time these laws make it through the government process

Cybersecurity Must Evolve Beyond Compliance: Is Open XDR the Answer? Read More »

SIEM security

Open XDR vs. SIEM

Matching Resources and Business Risk with the Right Solution Gaining visibility and responding to attacks across the entire enterprise infrastructure (endpoints, servers, applications, SaaS, cloud, users, etc.) is a very tall order in today’s cybersecurity environment. Enterprises are forced to create complex security stacks consisting of SIEM, UEBA, SOAR, EDR, NDR, TIP and other tools

Open XDR vs. SIEM Read More »

XDR

Is Extended Detection and Response (XDR) the Ultimate Foundation of Cybersecurity Infrastructure?

Samuel Jones, VP of product management, Stellar Cyber, discusses how SIEMs were supposed to be the ultimate security analytics platform. Still, many users feel they haven’t lived up to their promises.  Now, extended detection and response (XDR)  promises to be the ultimate platform. Should you adopt XDR? What does it mean for your SIEM? Security

Is Extended Detection and Response (XDR) the Ultimate Foundation of Cybersecurity Infrastructure? Read More »

Open XDR Platform

The Case for Open XDR – X Means Everything

The current model for cybersecurity is broken. It consists of acquiring and deploying a lot of stand-alone tools, each with its own console, to analyze logs or traffic and detect anomalies that could be threats. In this model, it’s up to each security analyst to communicate with other analysts to determine whether each tool’s individual

The Case for Open XDR – X Means Everything Read More »

User Behavior Analytics

Improve Security Across the F5 WAF Engine with Better Visibility, Correlation, and Auto-Response

Challenges Most IT organizations have deployed multiple traditional security products and services from multiple vendors—yet they remain vulnerable Enterprises are seeking to optimize their existing investments in critical WAF infrastructure in ways that further reduce risk, increase productivity, and accelerate response times Enterprises prioritize limited security budget only for known security vulnerabilities, thereby creating potential

Improve Security Across the F5 WAF Engine with Better Visibility, Correlation, and Auto-Response Read More »

EDR Software

How Stellar Cyber Addresses Data Storage Pain

Security problems are essentially data problems. For threat detection, investigation and forensic analysis, ideally one would like to collect as much data as they can and store it as long as they want. However, everything has its limitations. For example, the high long-term storage costs, the slow speed of search/query and infrastructure requirements are common

How Stellar Cyber Addresses Data Storage Pain Read More »

Endpoint detection and response tools

SolarWinds SUNBURST Backdoor DGA and Infected Domain Analysis

On December 13 2020, multiple vendors such as FireEye and Microsoft reported emerging threats from a nation-state threat actor who compromised SolarWinds, and trojanized SolarWinds Orion business software updates in order to distribute backdoor malware called SUNBURST. Because of the popularity of SolarWinds, the attacks have affected multiple government agencies and many Fortune 500 companies.

SolarWinds SUNBURST Backdoor DGA and Infected Domain Analysis Read More »

Network detection and response

Managed Security Providers driving profitable MDR services with Stellar Cyber Open-XDR Platform

Extending managed detection and response across your customers entire attack surface with one comprehensive platform MSPs and MSSPs represent a fast-growing segment of Stellar Cyber’s customer base. We see organizations large and small moving to managed security services, so today you’re a key route to market. The Stellar Cyber platform has been built from the

Managed Security Providers driving profitable MDR services with Stellar Cyber Open-XDR Platform Read More »

Scroll to Top