Network Traffic Analysis (NTA)
As one of the native capabilities of Stellar Cyber's intelligent security operations platform
As one of the native capabilities of Stellar Cyber's intelligent security operations platform
NDR detects suspicious events that other network security tools
are missing, improving MTTI over 8x
The Right Data With Accurate Cybersecurity Analysis
The Right Data With Accurate Cybersecurity Analysis
- Collect the right network security L2-L7 metadata and files for > 4,000 network applications from packets
- Collect traffic data including NGFW logs, and network devices NetFlow and IPFix
- Normalize and enrich the data from many sources to build rich context for accurate security analysis
- Build actionable, searchable and readable Interflow™ records stored in a single, efficient big data lake
- Maintain high data availability through buffering, replication, redundancy, and years of configurable long term storage
- Provide 360 degree visibility for both north/south and east/west traffic, traffic inside public cloud, and traffic between containers
- Apply machine learning, both supervised and unsupervised, and deep learning to analyze Interflow™ records in real time
- Advance signature-based detections with machine learning to improve fidelity.
- Integrate advanced persistent threat (APT) and malware detection to provide a unified detection across the kill chain
- Tightly integrate and correlate with EDR, CDR, Vulnerability scanning, IoC, etc. on a single Open XDR platform
- Trigger automatic responses through direct NGFW, EDR and Active Directory integration, through SOAR integration or through incumbent SIEM systems
- Threat hunting via flexible global text search – manually or through automation
Network Traffic Analysis (NTA) Components
Sensors
Stellar Cyber offers a variety of physical and virtual sensors that package together Deep Packet Inspection (DPI), Machine Learning Intrusion Detection System (ML-IDS) and a malware sandbox for zero-day malware analysis.
Integrations
NDR works smoothly with your existing NGFWs so you can leverage what you already have, while using the sensors to fill coverage gaps.
Data Lake
To correlate risk and threats across every aspect of your network, data has to be aggregated and stored in a central Data Lake. Stellar Cyber’s Data Lake scales with your network so that you can have full coverage.
Threat Intelligence
Stellar Cyber automatically normalizes data and enriches it with multiple built-in Threat Intelligence feeds at no additional cost. Works out of the box, yet allows you to customize with your own feeds if you want.
AI Engine
The scale of modern networks demands AI for automated detection and response. Stellar Cyber ships out-of-the-box with AI-powered detections and correlations for NDR and UEBA so you can get up and running as quickly to detect every type of threat.
Automated Response
Take action automatically, or manually with one-click, straight from the single console of the same Open XDR Platform. Block traffic, contain hosts, disable users and more.
What People Are Saying
Jon Oltsik Senior Principal Analyst and ESG Fellow
Central IT Department University of Zurich
Gartner PeerInsights
Rik Turner Principal Analyst, Infrastructure Solutions
Key Features
Data Beyond Raw
Packets
Network Detection and Response (NDR, or NTA) addresses the labor/false alert data security analysis challenge by enabling IT security staff to weed out low- or no-value data in network packets, to better qualify and funnel alarms with threat intelligence and advanced security analytics, and to reduce data storage.
Stellar Cyber’s NDR application helps get the data right and helps drive extended detection and response (XDR) thinking. Collect, analyze and store metadata from network traffic at scale by dramatically reducing the data volume while providing ample evidence for advanced detection and forensic analysis. The integrated and advanced deep-packet inspection (DPI) engine can identify 4,000+ network applications, extract network security metadata from these applications, and reassemble files. The right amount of metadata, including DNS domain names, URLs, SQL queries, etc. are extracted. Stellar Cyber’s NDR can also take network security information from existing devices like logs from NGFW as well as NetFlow or IPFix. Stellar Cyber’s Interflow enriches the metadata with information from a variety of sources including DHCP/DNS traffic, logs for host names and domain names, identity provider (IDP) such as Active Directory, Office365 or Okta for usernames, Threat Intelligence, Geolocations, and vulnerability scan results. Pervasive visibility of lateral malware movement throughout the network is critical part of IT security. In addition to monitoring north/south traffic that crosses the enterprise perimeter, NDR monitors east/west communications and/or cloud-based applications through strategically-placed physical or virtual network sensors or agents/containers on servers
Detection at
Scale
Stellar Cyber NDR is a distributed cybersecurity system with a family of sensors and a centralized data processor and management system. It also encompasses a distributed detection system with multiple processing stages to improve system performance and scalability. Network security through NDR begins by performing necessary detections such IP/port scan, DNS tunneling, and flooding at the data collection stage.
As an additional benefit of Stellar Cyber’s Open XDR platform, Internet security is enhanced by having an integrated intrusion detection system (IDS) application processes network traffic before machine learning to predictably produce high-fidelity alerts. Stellar Cyber’s NDR application delivers real-time detection and threat hunting/investigation through a data lake with searchable indexed big data. Stellar Cyber performs real-time and historic network security analysis by leveraging both supervised and unsupervised machine learning as well as deep learning for advanced detection without signatures. Each integrated detection is purpose- built with the right machine learning model for its use case, rather than one model for all detections. Stellar Cyber’s security researchers and data scientists constantly tune the models for more detections and improvement of existing detections.
Stellar Cyber’s user interface improves security analysis by enabling analysts’ to tune the machine learning model as well, by labeling the event via thumbing up or thumbing down a specific ML-driven detection result. And all integrated applications, including both NDR and machine learning IDS and malware detection, are aligned to the cyber kill chain, driving up productivity and reducing training time.
Response at Your
Discretion
Stellar Cyber’s NDR application supports both automatic and manual responses. It can directly block attacks by dropping suspicious traffic on NGFW, disabling affected users on Active Directory, containing compromised endpoints via EDR, or any actions through Restful APIs or flexible scripts. Stellar Cyber’s NDR also supports integration with other SOARs like Phantom, Demisto, Swimlane and more.
Designed Around
AI
Sensors, collected data, threat intelligence and data storage technologies all support AI which drives detection and response outcomes.