User Entity Behavior
Analytics (UEBA)
Gain Full Visibility and Control Across Your Environment
Unify logs, network traffic, endpoint telemetry, and cloud signals in a
single, correlated view. Eliminate data silos, accelerate threat detection,
and streamline investigation by bringing all your security telemetry
nto one AI-powered interface — so your team can see more, respond
faster, and reduce risk across IT and OT environments.
With 360-degree Visibility — Automatically Discover
New Assets, Profile Users, Identify Their Behavior & Risk
Comprehensive Asset Inventory and Advanced User Analytics:
- Dynamically discover assets across networks, endpoints and cloud environments through open extended detection and response Open XDR.
- Constantly discover assets from a variety of sources – sensors, logs, host information or 3rd party applications.
- Uniquely identify assets with either host names, MAC addresses or IP addresses.
- Automatically collect and fuse user-relevant data from multiple data sources across security infrastructure, delivering on the idea of Open XDR.
- Enable sophisticated behavioral analytics through machine learning.
- Detect bad behaviors without any rules or signatures.
- Discover and provide asset/user relationships
- Complement the detections with other security capabilities on the platform
Entity Analytics - Beyond SIEM Security
- Assigns a risk score based on observed security events and asset risk profile
- Provides a centralized risk-level view of all assets–network security, cloud security and IT security
- Correlates asset information with user, threat, location and vulnerability data through Open XDR
- Provides a kill chain view of security events for each asset
- Offers a panoramic view of lateral movement of attacks around an asset across security infrastructure
- Enables flexible searching or filtering of assets in various ways such as CVEs
- Tags each security event with asset ID
User Centric View
- Provides full visibility of users’ activities and threats anywhere across IT security, including SIEM tools
- Tracks threats by user rather than by threat type
- Associates a user with a risk score for easy identification of risky users
- Security analysis is easy through tightly integrated security applications such as malware detection
What Customers & Analysts Say.

"Sportscar Performance XDR for a Family Sedan Budget!"
"The platform’s AI delivers a complete view of security events across our clients’ global infrastructure under one pane of glass"
"Stellar Cyber delivers built-in Network Detection & Response (NDR), Next Gen SIEM and Automated Response"

“Stellar Cyber is the most
cost-effective way to adopt
AI and XDR”
"Users can enhance their favorite EDR tools with full integration into an XDR platform, obtaining greater visibility."

"Stellar Cyber reduced our analysis expenses and enabled us to kill threats far more quickly."
Key Features
Detect User Anomaly Behaviors That SIEM Tools Miss
The UEBA App in Stellar Cyber’s Open XDR platform collects and fuses user-relevant data from a variety of data sources across security infrastructure such as SIEM tools, network traffic, Active Directory logs, and applications like Office 365. It applies sophisticated behavioral security analysis through machine learning. It baselines users’ typical behaviors in order to detect their anomalous activities. It can rapidly detect bad behaviors without the need to write any rules or signatures. Combined with other relevant security events detected with many tightly-integrated security applications such as malware detection, the UBA App can quickly detect malicious users or compromised users
Advanced Asset Management Beyond SIEM Security Thinking
Drive a holistic view and bring together IT security, network security and cloud security. Stellar Cyber’s UEBA automatically and continually discovers and inventories all assets across networks, clients and cloud environments by collecting information from many different sources such as network traffic, logs, endpoints, vulnerability scan results, etc. It provides a unified view of all assets by host name, user, location, device type, manufacturer and many more identifiers. It allows the user to prioritize assets by assigning value to assets, and to group assets by assigning tags. It identifies and alerts analysts to unauthorized assets in a network.
Response at Your
Discretion
Stellar Cyber’s NDR application supports both automatic and manual responses. It can directly block attacks by dropping suspicious traffic on NGFW, disabling affected users on Active Directory, containing compromised endpoints via EDR, or any actions through Restful APIs or flexible scripts. Stellar Cyber’s NDR also supports integration with other SOARs like Phantom, Demisto, Swimlane and more. Powerful Google-like search can quickly nail down the security event. The rich context of the assets allows the asset under investigation to be quickly identified and located.
See Critical Events Through User
Behavior Analysis
UEBA provides a holistic view of all users activities, abnormal behaviors, security events and the associated security risk. Rather than focusing on malware delivery events or data ex-filtration events, for example, the UEBA capability provides a global view of user activity. And, as an integrated security toolkit and by fusing data from variety of sources, the Stellar Cyber platform works with other apps to easily enable analysts to cross-check events to elevate a given user’s risk score.