• Support
  • Contact Us
Stellar Cyber
  • Use Cases
    • Log Management
    • Next Gen SIEM
    • Intelligent Next Gen SOC
    • Asset Management
    • Network Security
    • 360 Degree Visibility
    • Automated SOC
    • Security Across Clouds
    • Securing Containers
  • MSSPs
    • Increase Revenue and Margin
    • Sell SOC-as-a-Service
    • Sell MDR-as-a-Service
  • Products

    Platform

    • Open XDR – the Intelligent Next Gen Security Operations Platform
    • Product Tour
    • Collection Engines
    • Deployment Models
    • Integrations

    Built in Capabilities

    • Next Gen SIEM (NG SIEM)
    • User Entity Behavior Analytics (UEBA)
    • Network Detection Response (NDR)
    • Cloud Detection Response (CDR)
    • Automated Threat Hunting (ATH)
    • Firewall Traffic Analysis (FTA)
    • Data Streaming (DS)

    Technology

    • Single Unified Data Lake
    • Data Processing Engine
    • AI Engine
    • How Interflow Works
    • Multi-tiered Multi-tenant Security
    open xdr integrated application

  • Partners
    • Become A Channel Partner
    • Become A MSSP Partner
    • Become A Technology Partner
    • Open XDR Ecosystem
    • Partner Portal
  • Resources
    • Case Studies
    • Webinars
    • Podcasts
    • Blogs
    • Use Case Videos
    • Events
  • Company
    • Who We Are
    • Our Take On Cybersecurity
    • Our History
    • Our Media Kit
    • News Releases
    • Press Coverage
    • Customer Testimonials
    • Careers
    • Contact Us
  • Request a Demo
  • Use Cases
    • Log Management
    • Next Gen SIEM
    • Intelligent Next Gen SOC
    • Asset Management
    • Network Security
    • 360 Degree Visibility
    • Automated SOC
    • Security Across Clouds
    • Securing Containers
  • MSSPs
    • Increase Revenue and Margin
    • Sell SOC-as-a-Service
    • Sell MDR-as-a-Service
  • Products

    Platform

    • Open XDR – the Intelligent Next Gen Security Operations Platform
    • Product Tour
    • Collection Engines
    • Deployment Models
    • Integrations

    Built in Capabilities

    • Next Gen SIEM (NG SIEM)
    • User Entity Behavior Analytics (UEBA)
    • Network Detection Response (NDR)
    • Cloud Detection Response (CDR)
    • Automated Threat Hunting (ATH)
    • Firewall Traffic Analysis (FTA)
    • Data Streaming (DS)

    Technology

    • Single Unified Data Lake
    • Data Processing Engine
    • AI Engine
    • How Interflow Works
    • Multi-tiered Multi-tenant Security
    open xdr integrated application

  • Partners
    • Become A Channel Partner
    • Become A MSSP Partner
    • Become A Technology Partner
    • Open XDR Ecosystem
    • Partner Portal
  • Resources
    • Case Studies
    • Webinars
    • Podcasts
    • Blogs
    • Use Case Videos
    • Events
  • Company
    • Who We Are
    • Our Take On Cybersecurity
    • Our History
    • Our Media Kit
    • News Releases
    • Press Coverage
    • Customer Testimonials
    • Careers
    • Contact Us
  • Request a Demo
December 9, 2019December 9, 2019

Stellar Cyber Adds User Behavior Analytics to Security App Store

App provides global view of user behavior to better track threats

SANTA CLARA, Calif, December 9, 2019 — Security provider Stellar Cyber, with the first Open-XDR security platform,today added a User Behavior Analytics (UBA) App to its Security App Store, making it much easier to track threats by specific users. UBA is a hot area of security because it’s easier to identify compromised users and malicious users. It tracks threats by user rather than by threat type, and detects additional anomalous activities of a user with advanced behavioral analytics through machine learning.In contrast, the conventional security platforms force security analysts to manually identify events as belonging to one user or another, lacking a user-centric view.

The UBA App in Stellar Cyber’s Starlight platform collects and fuses user-relaventdata from a variety of data sources such as network traffic, Active Directory logs, and applications like Office365. It applies sophisticated behavioral analytics through machine learning. It baselines users’ typical behavior in order to detect users’ anomalous activities. It can rapidly detects bad behaviors without writing any rules or signatures. With this, coupled with other relevant security events detected with many tightly-integrated security applications such as malware detection, the UBA App can quickly detetct malicious users or compromised users.

UBA gives the holistic view of all users’ activities, abnormal behaviors, security events and the associated security risk.   Rather than focusing on malware delivery events or data exfiltration events, for example, the UBA App provides a global view of user activity. And, as an integrated security toolkit and by fusing data from variety of sources, the Starlight platform works with other apps in its Security App Store to easily enable analysts to cross-check events to elevate a given user’s risk score.

“With conventional products, UBA is a complex and laborious process,” said Ilker Simsir, Principal Product Managerat Stellar Cyber. “Our UBA app makes it much easier to track threats on a per-user basis because it correlates events from throughout the kill chain.”

Helpful Stellar Cyber links

  • Blogs
  • Case Studies
  • Product Tour
  • User Based Analytics Application

About Stellar Cyber

Stellar Cyber makes Starlight, the only comprehensive security platform providing maximum protection of applications and data wherever they reside and automatically responding to attacks wherever they occur. Starlight tightly integrates dozens of security applications from an App Store and presents results in an intuitive dashboard to supercharge analyst productivity by slashing attack response times to seconds or minutes. Starlight deploys easily on premises, in public clouds or with service providers. Stellar Cyber is based in Silicon Valley and is backed by Valley Capital Partners, Northern Light Venture Capital, SIG and other investors. For more information, contact https://stellarcyber.ai.

 

Contact:
Charlie Rubin
Story PR
510-908-3356
charlie@storypr.com

END

Portfolio navigation

Previous
Next

Subscribe to Newsletter

Categories

  • AI-driven security
  • Application Security
  • Artificial Intelligence
  • Breach Detection
  • Case Studies
  • Cloud Security
  • CxO Insyte Events
  • Cyberattacks
  • Cybercriminals
  • Cybersecurity
  • Data Collection
  • Enterprise Events
  • IT technology
  • MSSP
  • MSSP Events
  • Network Security
  • Network Traffic Analysis
  • Open XDR
  • Podcast
  • security technology
  • Uncategorized
  • XDR

Archives

  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • May 2019
  • March 2018
  • February 2018
  • January 2018
Stellar Cyber
  • Who We Are
  • Product Tour
  • Contact Us
© 2019 Stellar Cyber All Rights Reserved | 4701 Patrick Henry Drive, Building 12, Santa Clara, CA 95054
Cookies on Stellar
We use cookies for a number of reasons, such as keeping Stellar Cyber websites reliable and secure, personalising content and ads, providing social media features and to analyse how our sites are used. Read More
AcceptReject
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Non-necessary

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.

X
See Stellar Cyber
Upcoming Events!