Because Stellar Cyber's Open XDR is application-based, it detects suspicious traffic that other security tools are missing, improving MTTI over 8x

The Right Data, Better Analysis

  • Collect the right metadata from more than 4,000 network applications
  • Build context for all security data through enrichment of any data source
  • Actionable, searchable and exportable Interflow™ record tracks ingestion, reduction, enrichment and correlation of each event
  • Pervasive visibility across physical, virtual, container, public cloud and service providers
  • Comprehensive user interface that follows the kill chain

Protect & Resolve

  • Real-time analysis of security infrastructure through leveraging both supervised and unsupervised machine learning (ML) for advanced detection without signatures
  • Combined functionality includes advanced analysis (ML) with signature-based IDS, advanced persistent threat (APT) and malware detection
  • Anywhere detection and response (XDR) means tight integration with end-point detection and response (EDR) systems
  • Trigger automatic responses directly or through SOAR integration

- Network Traffic Analysis (NTA) Application 3-minute overview

Open XDR Security Platform

Reveal Hidden Attacks On Premises, Edge and Cloud
Download Datasheet

Our Testimonials

“We needed a cutting-edge solution for our team to better protect EBSCO’s very diverse portfolio of businesses globally. The Starlight platform brings together… More >>

– John Graham, Global CISO, EBSCO

Key Features

Lock Beyond Packets

Look Beyond Packets

Network traffic analysis (NTA) is gaining popularity because it is the first line of defense for threat detection and response. It addresses the labor/false alert data challenge by enabling security staff to weed out low- or no-value data in network packets, to better qualify and funnel alarms with threat intelligence and/or advanced analytics, and to reduce data storage. Read More >>

Starlight’s NTA application helps get the data right and helps drive an anywhere detection and response (XDR) thinking. Collect, analyze and store metadata from network traffic at scale by dramatically reducing the data volume while providing ample evidence for advanced detection and forensics analysis. The integrated and advanced deep-packet inspection (DPI) engine can identify 4,000+ network applications, extract metadata from these applications, and reassemble files. The right amount of metadata, including DNS domain names, URLs, SQL queries, etc. are extracted. Stellar Cyber’s Interflow™ enriches the metadata with information from a variety of sources including DHCP/DNS traffic, logs for host names and domain names, identity provider (IDP) such as Active Directory or Okta for usernames, Threat Intelligence, Geolocations, and vulnerability scan results.

Pervasive visibility of lateral malware movement throughout the network is critical. In addition to monitoring north/south traffic that crosses the enterprise perimeter, Starlight monitors east/west communications and/or cloud-based applications through strategically placed physical or virtual network sensors or agents/containers on servers. << Show Less

Detection that Scales

Detection that Scales

Stellar Cyber is a distributed detection system with multiple processing stages to improve system performance and scalability. Starlight begins performing necessary detections such port scan, DNS tunneling, and Flooding at the data collection stage. The integrated intrusion detection system (IDS) pre-processes network traffic before machine learning to predictably produce high-fidelity alerts. Read More >>

Stellar Cyber’s NTA application delivers real-time detection and threat hunting/investigation across security infrastructure through a data lake with searchable indexed big data. Stellar Cyber performs real-time and historic analysis by leveraging both supervised and unsupervised machine learning for advanced detection without signatures. Each integrated Starlight detection is purpose built with the right supervised or unsupervised machine learning model for its use case, rather than one model such as unsupervised machine learning algorithms for all detections. Stellar Cyber’s security researchers and data scientists constantly tune the machine learning model for more detections and improvement of existing detections.

Stellar Cyber’s user interface allows the end user to help tune the machine learning model as well, by labeling the event via thumbing up or thumbing down a specific ML-driven detection result. And all integrated Starlight applications, including both NTA and EDR, are aligned to the cyber kill chain, driving up productivity and reducing training time. << Show Less

Response at Your Discretion

Response at Your Discretion

Stellar Cyber’s NTA application supports both automatic and manual responses and can directly block attacks by disabling attacking IP addresses or disabling affected users. Starlight’s NTA app supports integration with SOARs like Photon and Demisto. Read More >>

Stellar Cyber has built-in case management so security analysts can collaborate to resolve security incidents as well as a very powerful reporting and alerting engine with both pre-canned reports for compliance and customizable reports tailored to individual requirements.

Thinking proactively, Starlight has a powerful automated threat hunting application built-in. For example, when a login such as SSH/RDP/FTP from an unexpected country and/or unexpected time window is detected, an alert or a block action can be automatically triggered. << Show Less