Open XDR

cloud detection and response

Product Review: Stellar Cyber Open XDR Platform

Originally posted in Almost every vendor, from email gateway companies to developers of threat intelligence platforms, is positioning themselves as an XDR player. But unfortunately, the noise around XDR makes it harder for buyers to find solutions that might be right for them or, more importantly, avoid ones that don’t meet their needs. Stellar Cyber […]

Product Review: Stellar Cyber Open XDR Platform Read More »

Network traffic analysis

MSSP Alert Live Recap

I’m sure, like most people reading this blog, the past two-plus years for me were mainly spent in front of my computer, talking with my colleagues, customers, and prospects over Zoom (or your video conferencing provider of choice). So when the opportunity to attend the MSSP Alert Live event in Washington, DC came my way, I hopped

MSSP Alert Live Recap Read More »

SIEM security

When and how to bring in an MSSP to help your lean security team

Over the past few weeks, I have written several blogs about the lean security team. As you can tell, I am a fan of these types of teams as they take on the burden of keeping an organization secure with limited resources and budgets but somehow get the job done. One of the main reasons

When and how to bring in an MSSP to help your lean security team Read More »

SIEM tools

If layered security is the cake, Open XDR is the frosting

The anchor of Enterprise Security is popularly known as a “Defense in Depth” architecture. The Defense in Depth (DID) is a classic defensive concept used in the military that found acceptance in the Infosec community in the early 2000s. The Infosec implementation/version of DID has evolved to address the threats as the threat landscape progressed

If layered security is the cake, Open XDR is the frosting Read More »

XDR

September Product Update: How I Spent My Summer Vacation:

The Stellar Cyber September Product Update As summer ends and the kids tearing up your house for the past 12 weeks head back to school, it’s time to let you know what the product team has been up to here at Stellar Cyber. We have made some nice updates to our Open XDR Platform in

September Product Update: How I Spent My Summer Vacation: Read More »

SIEM security

What is a Lean Security Team, and how to know if you are part of one

Recently I wrote a blog about what makes a lean security team tick, however, after I posted, it occurred to me that I probably should have spent a few minutes talking about the different types of security teams we run into and how to determine if you fit into the lean security team category. You

What is a Lean Security Team, and how to know if you are part of one Read More »

Open XDR security

Open XDR vs. SIEM

Introduction: The next generation of security intelligence is here, and it’s called extended detection and response (XDR). XDR is a technology that enables organizations to detect and respond to advanced threats faster, easier and with greater accuracy than ever before. It does this by unifying disparate data sources in one centralized location and providing richer

Open XDR vs. SIEM Read More »

XDR

August Product Update

August Product Update Stellar Cyber continually works to ensure the products we deliver not only meet but exceed the needs of our customers. As hockey legend Wayne Gretsky famously said, “I skate to where the puck is going to be, not where it has been” we also work hard to anticipate the future needs of

August Product Update Read More »

Network detection and response tools

Should you build your own or purchase MDR services — Is Open XDR the answer?

For the last several years, MSP partners have been making a tough decision – should I build cybersecurity within my own business or outsource it?  Until a few years ago, the manual nature of SOC technology and cybersecurity talent made it very difficult to build your own service.  Today there are many new, more robust

Should you build your own or purchase MDR services — Is Open XDR the answer? Read More »

Automated threat hunting

One Year Later: Lessons from the Colonial Pipeline Ransomware Attack

A year has passed since the Colonial Pipeline Ransomware attack that caused Colonial Pipeline to stop service for five days. This attack created a huge fuel shortage for eastern and southern states, and forced Colonial Pipeline to pay a hefty $4.4 million ransom. Ransomware attacks have continued unabated since then, with the most recent ones

One Year Later: Lessons from the Colonial Pipeline Ransomware Attack Read More »

Firewall Traffic Analysis

What Rippling Will Do To HR, XDR Will Do To Security

In this tumultuous software equity market, where corporate valuations are coming back to levels based on fundamentals, one private software company stands out – Rippling. Rippling is an all-in-one HR & IT platform built from the ground up for managing everything related to employees. The key word there is everything – that is the company’s

What Rippling Will Do To HR, XDR Will Do To Security Read More »

Automated threat hunting

Integrating Asset Management into your SOC with Open XDR can be a force multiplier for your business

As an MSSP, being proactive in your approach to cybersecurity is a best practice.  Ensuring that your customers are doing their part to update and patch their systems is critical.  If you can integrate your asset management with your SOC/XDR platform there are huge gains to be realized. Scanning all your customer environments is the

Integrating Asset Management into your SOC with Open XDR can be a force multiplier for your business Read More »

Open XDR security services

Open XDR In the Real World – Q&A With Jon Mayled

In this interview, we capture real-world experience and recommendations from an enterprise that implemented Stellar Cyber’s Open XDR platform. We talked with Jon Mayled, International IT and Security Director at PlastiPak Packaging, Inc., about what he learned during his implementation.   SC: What is required to implement a successful XDR program? JM: Although I recommend

Open XDR In the Real World – Q&A With Jon Mayled Read More »

Endpoint detection and response tools

Keys to a Successful XDR Implementation

Cybersecurity protection lives on data from sensors and systems throughout the organization’s infrastructure. But data without any background or context only creates irrelevant noise that frustrates and distracts analysts. Without an integrated platform to correlate all that data, security teams become buried in an overwhelming amount of false alerts.  XDR is specifically designed to incorporate

Keys to a Successful XDR Implementation Read More »

SOC platform

Cybersecurity Infrastructure Needs a New Model

Cybersecurity systems are ripe for disruption. Over the years, individual tools have proliferated, each with its own data format, causing a deluge of disparate data. Also, there is a global shortage of skilled cybersecurity analysts who can evaluate that data (and they are very expensive if you can find them). Finally, and hackers are getting

Cybersecurity Infrastructure Needs a New Model Read More »

Network detection and response

Going SOCless

According to the FBI, the number of cyberattacks reported to their Cyber Division is up 400 percent compared to pre-pandemic levels, and attacks are getting worse. From financial sites to healthcare sites to government sites to supply chain industries, no one is safe from these attacks. The traditional defense against these threats is the Security

Going SOCless Read More »

NDR platform

Changming Liu, Stellar Cyber: hackers target remote workers to obtain access to corporate networks

With the pandemic and the stay-at-home orders that came with it, hackers started increasingly attempting to exploit the situation and damage businesses that operate remotely. When it comes to enterprises, it is common to cut corners in terms of cybersecurity as not many are aware of the consequences. In reality, there are various cyber threats,

Changming Liu, Stellar Cyber: hackers target remote workers to obtain access to corporate networks Read More »

SIEM platform

Technical Approach To Universal EDR

For security vendors and those in the XDR market specifically, there is an architectural axis of build vs. integrate. On one end, you have “Build / Acquire Everything” – vendors that are vertically integrated and want to be an enterprise’s entire security stack. On the other end, you have “Integrate with Everything” – vendors that

Technical Approach To Universal EDR Read More »

Scroll to Top