Open XDR

Network detection and response tools

The Pipeline Attack – Is Log Analysis Enough for Cybersecurity?

Many MSSP’s use SIEMs and other log management/aggregation/analysis solutions for cybersecurity visibility, but is log analysis enough? We’re hearing more and more about holistic security solutions like XDR platforms that claim to cover the entire attack surface, especially because the latest pipeline attack reinforced the compound nature of today’s sophisticated multi-stage cyberattacks. The attackers admitted […]

The Pipeline Attack – Is Log Analysis Enough for Cybersecurity? Read More »

Open XDR Platform

The Case for Open XDR – X Means Everything

The current model for cybersecurity is broken. It consists of acquiring and deploying a lot of stand-alone tools, each with its own console, to analyze logs or traffic and detect anomalies that could be threats. In this model, it’s up to each security analyst to communicate with other analysts to determine whether each tool’s individual

The Case for Open XDR – X Means Everything Read More »

Network detection and response

Alerts, Events, Incidents: Where Should Your Security Team Focus?

As the cybersecurity threat landscape is evolving so is the way we need to look at those threats.  The drumbeat of new breaches is continuous. If you read the news, you would be led to believe that there is only one major tactic the attackers leverage in an INCIDENT against their targets. That is simply

Alerts, Events, Incidents: Where Should Your Security Team Focus? Read More »

SOC platform

XDR Delivers Significant Performance Improvement over SIEM

In every SOC environment, there are two key metrics that demonstrate efficiency and effectiveness: Mean Time to Detection (MTTD) and Mean Time to Remediation (MTTR).  The risk and exposure from any cyber threat can be reduced significantly by improving these metrics.  Stellar Cyber recently completed a study with its MSP and MSSP partners, to determine

XDR Delivers Significant Performance Improvement over SIEM Read More »

Firewall Traffic Analysis

An Integrated TIP for Simplified and Efficient Security Operations

Cybersecurity platforms are only as intelligent as the data provided to them, and every security organization wants to leverage as much data as possible. This typically includes subscribing to one or more threat intelligence feeds from third-party organizations. As an open platform with a mission to integrate all important security data and tools, Stellar Cyber’s

An Integrated TIP for Simplified and Efficient Security Operations Read More »

XDR

How to leverage Open XDR as a strategic advantage for MSP and MSSP partners

Stellar Cyber built the original Open XDR platform. It provides tool consolidation, improved SOC performance, and significantly reduces the critical metrics of MTTD and MTTR.  This is accomplished through ML-based detections, automated threat hunting, integrated threat intelligence feeds to speed analysis, and automated response capabilities.  For our MSP and MSSP partners, it has proven to help

How to leverage Open XDR as a strategic advantage for MSP and MSSP partners Read More »

Automated threat hunting

With Stellar Cyber’s Open XDR, No EDR is an Island

Stellar Cyber’s Open XDR platform is about giving customers a choice in security tools, and this extends to EDR systems as well as NGFW, vulnerability management, identity management, SOAR and other solutions. EDR has been in the news lately because some EDR vendors have acquired log management companies to flesh out a solution for the

With Stellar Cyber’s Open XDR, No EDR is an Island Read More »

Open XDR security services

Cyberthreats Go Sideways

The cyber threats are going sideways. Here I’m not talking about Sideways, the 2004 movie starring Paul Giamatti and Thomas Hayden Church that made Pinot Noir famous while the pair traveled through Santa Barbara County wine country in seven days. Rather, I’m talking about cyberattacks that work through lateral movement through your network infrastructure. No

Cyberthreats Go Sideways Read More »

Endpoint detection and response tools

Was SUNBURST really a Zero-day attack?

Most companies affected by the SolarWinds attack learned about it from the Department of Homeland Security. Wouldn’t it have been better for them to have learned from their MSP/MSSP before DHS came calling? With Stellar Cyber, you would have known right away. The reason this breach was so successful was that the attackers leveraged a

Was SUNBURST really a Zero-day attack? Read More »

SOC platform

Interview With Changming Liu by Safety Detectives

Changming Liu, CEO and Co-Founder of Stellar Cyber, did us the honor of sitting down for an interview with Aviva Zacks of Safety Detectives. He told her how his company is riding the XDR wave. Safety Detectives: What motivated you to start Stellar Cyber? Changming Liu: I co-founded Stellar Cyber in 2015 with our VP

Interview With Changming Liu by Safety Detectives Read More »

Network detection and response

Managed Security Providers driving profitable MDR services with Stellar Cyber Open-XDR Platform

Extending managed detection and response across your customers entire attack surface with one comprehensive platform MSPs and MSSPs represent a fast-growing segment of Stellar Cyber’s customer base. We see organizations large and small moving to managed security services, so today you’re a key route to market. The Stellar Cyber platform has been built from the

Managed Security Providers driving profitable MDR services with Stellar Cyber Open-XDR Platform Read More »

NDR platform

IUWorld Cybersecurity Governance, Risk & Compliance

Part II: User and Entity Behavior Management (10-minute discussion & demo) Jeff: Welcome to the 2nd Episode of IUWorld Thought Leadership Series in Cybersecurity GRC – Governance Risk & Compliance. A big welcome to all of you who have joined us in this webinar. 1st of all, let me introduce the team. My name is Jeff

IUWorld Cybersecurity Governance, Risk & Compliance Read More »

SIEM platform

IUWorld Cybersecurity Governance, Risk & Compliance

Part I: Demystifying Cyber Health and Cyber Threat Hunting  JEFF: Welcome to Cloud Expo, can you please help explain what cyber threat hunting is? SNEHAL: Jeff, thanks for hosting us. First let’s talk to what a cyber threat is -– someone is trying to take your data by breaking into your critical digital systems.

IUWorld Cybersecurity Governance, Risk & Compliance Read More »

SIEM alternatives

Leverage the tools and telemetry you trust

The industry is at a pivotal point. With the pandemic driving up work-from-home and forcing hybrid work environments as well as many applications moving to the cloud, cybersecurity professionals are challenging best practices and once-thought foundational assumptions. Is a platform with tightly integrated native capabilities the right foundation for the future security instead of siloed

Leverage the tools and telemetry you trust Read More »

Scroll to Top