• BrightTalk
  • Support
  • Contact Us
Stellar Cyber
X
  • Platform
    • Overview
    • Open XDR for Enterprises
    • Open XDR for MSSPs
    • Stand Alone Products
      • Stellar Cyber NDR
    • Platform Tour
      • Case Management
    • How It Works
    • Before and After Stellar Cyber
    • Competitive Overview
      • AlienVault
      • Exabeam
      • Darktrace
      • IBM QRadar
      • Microsoft Sentinel
      • Securonix
      • Splunk
    • Platform Integrations
    • What is Open XDR
  • Industries
    • Manufacturing
    • Government
    • Higher Education
    • Financial Services
  • Use Cases
    • Use Cases Overview
    • Automating Incident Response
    • Compromised Credentials
    • Insider Threat
    • Lateral Movement
    • Malware
    • OT Security
    • Phishing
    • Ransomware
    • Securing Multi-Cloud Environments
    • Security Stack Consolidation
  • Learn
    • What is NDR?
    • What is SIEM?
  • Services
    • Overview
    • Ignite Enablement
    • Stellar Cyber Academy
    • Customer Success
    • Customer Support
  • Pricing
  • Resources
    • Library
    • Blogs
    • Case Studies
    • Data Sheets
    • eBooks
    • Infographics
    • Research Reports
    • Use Case Videos
    • Podcasts
    • Whitepapers
    • On-Demand Webinars
  • Partners
    • Become A MSSP Partner
    • Become A Channel Partner
    • Become A Technology Partner
    • Open XDR Marketplace
    • Partner Portal
  • Company
    • About Us
    • Our History
    • Media Kit
    • Events
    • Press Coverage
    • News Releases
    • University Program
    • Customer Testimonials
    • Careers
    • Contact Us
  • Request A Demo
  • Platform
    • Overview
    • Open XDR for Enterprises
    • Open XDR for MSSPs
    • Stand Alone Products
      • Stellar Cyber NDR
    • Platform Tour
      • Case Management
    • How It Works
    • Before and After Stellar Cyber
    • Competitive Overview
      • AlienVault
      • Exabeam
      • Darktrace
      • IBM QRadar
      • Microsoft Sentinel
      • Securonix
      • Splunk
    • Platform Integrations
    • What is Open XDR
  • Industries
    • Manufacturing
    • Government
    • Higher Education
    • Financial Services
  • Use Cases
    • Use Cases Overview
    • Automating Incident Response
    • Compromised Credentials
    • Insider Threat
    • Lateral Movement
    • Malware
    • OT Security
    • Phishing
    • Ransomware
    • Securing Multi-Cloud Environments
    • Security Stack Consolidation
  • Learn
    • What is NDR?
    • What is SIEM?
  • Services
    • Overview
    • Ignite Enablement
    • Stellar Cyber Academy
    • Customer Success
    • Customer Support
  • Pricing
  • Resources
    • Library
    • Blogs
    • Case Studies
    • Data Sheets
    • eBooks
    • Infographics
    • Research Reports
    • Use Case Videos
    • Podcasts
    • Whitepapers
    • On-Demand Webinars
  • Partners
    • Become A MSSP Partner
    • Become A Channel Partner
    • Become A Technology Partner
    • Open XDR Marketplace
    • Partner Portal
  • Company
    • About Us
    • Our History
    • Media Kit
    • Events
    • Press Coverage
    • News Releases
    • University Program
    • Customer Testimonials
    • Careers
    • Contact Us
  • Request A Demo
April 4, 2023April 4, 2023

NTT DATA Global Solutions Chooses Stellar Cyber’s Open XDR Security Platform to Enhance SOC

NTT DATA Global Solutions Leverages Stellar Cyber’s Automated Correlation and Detection to Improve Internal SOC

Tokyo, Japan, April 4, 2023 — Stellar Cyber, the innovator of Open XDR, announced today that NTT DATA Global Solutions Corporation (NTT DATA GSL, Location: Chuo-ku, Tokyo, Japan, President: Motonobu Isoya) has adopted Stellar Cyber Open XDR platform, powered by AI, to detect and respond to cyberattacks.  

Pentio, a channel partner of Stellar Cyber, provided NTT DATA GSL with Stellar Cyber for AI threat detection and investigation of cyber threats. Using Stellar Cyber, NTT DATA GSL has acquired a system for real-time monitoring and analyzing cyber-attacks occurring widely across the company and the cloud.

“We can analyze, detect, evaluate, and trigger actions 24 hours a day without being bound by experience or subjectivity using the Stellar Cyber Open XDR platform. We use Stellar Cyber for real-time detection of cyber risks. For companies without dedicated administrators, I think the first step in security measures is visualizing the threats with Stellar Cyber.” said Junichiro Baba, IT Strategy & Management Group Manager, Business Strategy Promotion Department of NTT DATA GSL.

“Stellar Cyber provides incredible cyber threat detection. In Japan, only a few companies have introduced XDR, even those with EDR, SIEM, or human services Security Operation Center deployments. Stellar Cyber’s cyber threat detection is effective for Japanese manufacturing manufacturers and online services companies. The adoption by SAP Solution Integrator NTT DATA Global Solutions Corporation is a catalyst for introducing cyber threat detection services in Japan. We look forward to the future as many Japanese companies become interested in this service, ” Haruhiko Hasegawa, CEO of Pentio.

Stellar Cyber automatically detects cyber threats on NTT DATA GSL’s internal network and virtual network networks that are globally connected around the world, as well as security problems on servers, clients, and networks. Stellar Cyber visualizes in five stages, from attack signs to full-scale cyber risk warnings, and provides real-time cyber risk information to administrators.

“I would like to express our sincere gratitude to NTT DATA Global Solutions for adopting our Stellar Cyber Open XDR platform for their internal SOC. Stellar Cyber automates threat detection and response to cyberattacks through AI-driven automation, and it can greatly improve SOC productivity. Stellar Cyber will continue to contribute to promoting cyber security measures for many Japanese companies,” said Makoto Fukumi, Country Manager – Japan of Stellar Cyber. 

Resources:

  • Stel HYPERLINK “https://stellarcyber.ai/product/”l HYPERLINK “https://stellarcyber.ai/product/”ar Cyber security operations platform
  • Stellar HYPERLINK “https://stellarcyber.ai/resources/case-studies/”  HYPERLINK “https://stellarcyber.ai/resources/case-studies/”Cyber case studies
  • Stellar Cyber blogs

 

About NTT DATA Global Solutions:
NTT DATA Global Solutions Corporation was established in July 2012 to respond to the growing demand for system globalization accompanying the global expansion of Japanese companies. Together with the NTT Data Group’s SAP global support system, we will integrate the SAP solutions and business know-how that were dispersed among NTT DATA’s domestic group companies, and support the implementation, maintenance, operation, and expansion development of the SAP® ERP system. As the core company of the SAP business in the NTT DATA Group, we support the strategic business management of companies. For more information, contact https://www.nttdata-gsl.co.jp.

About Pentio:
Pentio Corporation is a provider of ”OneLogin”, a cloud account management SSO service, “SecureW2”, a managed PKI and cloud RADIUS service, “YubiKey”, a PKI device, “Stellar Cyber”, an AI-based automatic detection and analysis service for security attacks, and “Sumo Logic”, a cloud log management security monitoring service.  Pentio offers Smart ID, which specializes in monitoring and handling cloud user keys and authentication and cloud security. For more information, contact https://pentio.com.

About Stellar Cyber:
The Stellar Cyber Open XDR platform delivers comprehensive, unified security without complexity, empowering lean security teams of any skill to successfully secure their environments. With Stellar Cyber, organizations reduce risk with early and precise identification and remediation of threats while slashing costs, retaining investments in existing tools, and improving analyst productivity, delivering a 8X improvement in MTTD and a 20X improvement in MTTR. The company is based in Silicon Valley. For more information, contact https://stellarcyber.ai.

END

Portfolio navigation

Previous
Next

Categories

  • AI-driven security
  • Alliances Events
  • Application Security
  • Apps
  • Artificial Intelligence
  • Breach Detection
  • Case Studies
  • Case Studies – MSSP
  • Cloud
  • Cloud Security
  • Compliment SIEM
  • Core Capabilities – Datasheets
  • Core Technologies – Datasheets
  • CxO Insyte Events
  • Cyberattacks
  • Cybercriminals
  • Cybersecurity
  • Data Breaches
  • Data Collection
  • Data Storage
  • Deployment Models – Datasheets
  • Ebook – Whitepaper
  • EDR – Endpoint detection and response
  • EDR Alerts
  • Email
  • Endpoint
  • Identity
  • In Person – Events Category
  • Internet Of Things
  • IOT Security
  • IT technology
  • Kill Chain
  • Machine Learning
  • MSSP
  • MSSPs
  • NDR
  • Network
  • Network Security
  • Network Traffic Analysis
  • NG-SIEM
  • Open XDR
  • Open XDR Platform
  • Open XDR Summit Event
  • OT Environment
  • OT Security
  • Podcast
  • Ransomware attacks
  • Security Operations Center (SOC)
  • security technology
  • SIEM
  • SIEM technology
  • SOC
  • SOCless
  • Uncategorized
  • University
  • Vulnerability
  • Webinar – General
  • Webinars – Events Category
  • Whitepapers
  • XDR
  • XDR Adoption
  • XDR Solutions

Archives

FOR ENTERPRISE

  • Replace SIEM
  • Complement SIEM
  • Deploy NDR
  • Turn EDR Into XDR
  • Next Gen SOC

CAPABILITIES

  • Next Gen SIEM
  • Network Detection & Response (NDR)
  • Universal EDR
  • Automated Threat Hunting
  • Automated Response
  • Threat Intelligence

PARTNERS

  • Become a MSSP Partner
  • Become a Channel Partner
  • Become a Technology Partner
  • Open XDR Ecosystem
  • Partner Portal

Resources

  • Blogs
  • Case Studies
  • Data Sheets
  • eBooks
  • Use Case Videos
  • Podcasts
  • Webinars
  • Whitepapers

Company

  • Who We Are
  • Our History
  • Events
  • Media Kit
  • News Releases
  • Press Coverage
  • Customer Testimonials
  • Careers
  • Contact Us

For MSSP

  • Increase Revenue and Margin
  • Sell SOC-as-a-Service
  • Sell MDR-as-a-Service
  • Grow Market With Universal EDR

TECHNOLOGIES

  • Sensors
  • Interflow
  • Data Lake
  • AI Engine
  • XDR Kill Chain
  • Deployment

NETWORK

  • Network Traffic Analysis (NTA)
  • Firewall Traffic Analysis (FTA)
  • Data Streaming
  • Security Across Clouds
  • Intelligent NG-SOC Use Cases
  • Automated SOC
  • User Entity Behavior Analytics
  • Cloud Detection Response
  • NTA / NDR+ with ML-powered IDS

USE CASES

  • Use Cases
  • Automating Incident Response
  • Compromised Credentials
  • Insider Threat
  • Lateral Movement
  • Malware
  • OT Security
  • Phishing
  • Ransomware
  • Security Stack Consolidation

FOR INFRASTRUCTURE

  • Integrating Existing Infrastructure
  • How Interflow Works
  • Collection Engines
  • Multi Tenant Security Platform
  • Data Processing Engine

REPORTING

  • Log Management Use Cases
  • Compliance and reporting
Stellar Cyber
© 2023 Stellar Cyber All Rights Reserved | 2590 N First St Suite 360 San Jose, CA 95131
X
Stellar Cyber Listed as a Representative XDR Vendor in Gartner Market Guide for XDR.
Read Now
Cookies on Stellar
We use cookies for a number of reasons, such as keeping Stellar Cyber websites reliable and secure, personalising content and ads, providing social media features and to analyse how our sites are used. Read More
AcceptReject
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT