loader image
Close
  • Support
  • Contact Us
Stellar Cyber
  • Platform
    • Overview
    • Platform Tour
    • How It Works
    • Network Detection & Response
    • Stellar Cyber for Enterprises
    • Stellar Cyber for MSSPs
    • Before and After Stellar Cyber
    • Stellar Cyber Vs the Competition
    • Platform Integration
    • What is Open XDR
  • Industries
    • Manufacturing
    • Government
    • Higher Education
    • Financial Services
  • Services
    • Overview
    • Customer Enablement
    • Stellar Cyber Academy
    • Customer Success
    • Customer Support
  • Pricing
  • Resources
    • Library
    • Blogs
    • Case Studies
    • Data Sheets
    • eBooks
    • Infographics
    • Research Reports
    • Use Case Videos
    • Podcasts
    • Whitepapers
    • Webinars
  • Partners
    • Become A MSSPs Partner
    • Become A Channel Partner
    • Become A Technology Partner
    • Open XDR Marketplace
    • Partner Portal
  • Company
    • About Us
    • Our History
    • Media Kit
    • Events
    • Press Coverage
    • News Releases
    • Customer Testimonials
    • Careers
    • Contact Us
  • Request A Demo
  • Platform
    • Overview
    • Platform Tour
    • How It Works
    • Network Detection & Response
    • Stellar Cyber for Enterprises
    • Stellar Cyber for MSSPs
    • Before and After Stellar Cyber
    • Stellar Cyber Vs the Competition
    • Platform Integration
    • What is Open XDR
  • Industries
    • Manufacturing
    • Government
    • Higher Education
    • Financial Services
  • Services
    • Overview
    • Customer Enablement
    • Stellar Cyber Academy
    • Customer Success
    • Customer Support
  • Pricing
  • Resources
    • Library
    • Blogs
    • Case Studies
    • Data Sheets
    • eBooks
    • Infographics
    • Research Reports
    • Use Case Videos
    • Podcasts
    • Whitepapers
    • Webinars
  • Partners
    • Become A MSSPs Partner
    • Become A Channel Partner
    • Become A Technology Partner
    • Open XDR Marketplace
    • Partner Portal
  • Company
    • About Us
    • Our History
    • Media Kit
    • Events
    • Press Coverage
    • News Releases
    • Customer Testimonials
    • Careers
    • Contact Us
  • Request A Demo
August 2, 2021September 12, 2021

Stellar Cyber and BlackBerry Partner to Deliver AI-Powered, End-to-End Security

Pioneers in Bringing AI to Endpoint Security and Security Operations Platforms Deliver Unified Solution

Santa Clara, CA, August 2, 2021 — Stellar Cyber, the leading next-generation security operations platform, announced today that it has partnered with BlackBerry to accelerate adoption of AI-powered security solutions for enterprises and managed security service providers (MSSPs). Both companies are pioneers in using AI and machine learning to eliminate signatures and manual scripts from security solutions, and they are going to market together as a catalyst for AI-based security adoption worldwide by offering an integrated solution that combines BlackBerry’s prevention-first AI-driven Unified Endpoint Security offerings with Stellar Cyber’s security operations platform.

BlackBerry has redefined what an endpoint protection solution can and should do for  organizations by utilizing an AI-driven, prevention-first approach. Stellar Cyber pioneered adding AI to the security operations environments, helping to eliminate manual rule creation and management. By joining together in the marketplace, they offer enterprises and MSSPs higher efficiency, a lower rate of false positives, and significantly better protection against today’s multi-layered cyberattacks.

“Artificial intelligence is the only way to make sense of the deluge of data and  the increasingly complex attacks in today’s cybersecurity landscape. Leveraging Cylance AI, BlackBerry® Protect and BlackBerry® Optics can detect and prevent known and unknown attacks before they can execute,” said Alex Willis, vice president of Global Sales Engineering at BlackBerry. “By partnering with Stellar, a leader that is bringing AI to the security operations center (SOC) solution space, we expect to speed up our entry into that market.” 

“BlackBerry is a leader in cyberattack prevention, and Stellar Cyber complements their solutions by automating threat detection and response,” said Sam Jones, VP of Product Management at Stellar Cyber. “Through this partnership, our resellers and go-to-market partners can deliver additional value to BlackBerry customers by adding advanced security operations center capabilities to their existing investments.”

Resources:

  • Stellar Cyber security operations platform
  • Stellar Cyber case studies
  • Stellar Cyber blogs

About Stellar Cyber:
Stellar Cyber’s security operations platform is powered by Open XDR, which delivers Everything Detection and Response by ingesting data from all tools, automatically correlating alerts into incidents across the entire attack surface, delivering fewer and higher-fidelity incidents, and responding to threats automatically through AI and machine learning. Our XDR Kill Chain™, fully compatible with the MITRE ATT&CK framework, is designed to characterize every aspect of modern attacks while remaining intuitive to understand. This reduces enterprise risk through early and precise identification and remediation of all attack activities while slashing costs, retaining investments in existing tools and accelerating analyst productivity. Typically, our platform delivers a 8X improvement in MTTD and an 20X improvement in MTTR. The company is based in Silicon Valley. For more information, contact https://stellarcyber.ai.

 

###

 

Stellar Cyber Contact:
Charlie Rubin
Story PR
+1 510-908-3356
charlie@storypr.com 

END

Portfolio navigation

Previous
Next

Categories

  • AI-driven security
  • Alliances Events
  • Application Security
  • Apps
  • Artificial Intelligence
  • Breach Detection
  • Case Studies
  • Case Studies – MSSP
  • Cloud
  • Cloud Security
  • Compliment SIEM
  • Core Capabilities – Datasheets
  • Core Technologies – Datasheets
  • CxO Insyte Events
  • Cyberattacks
  • Cybercriminals
  • Cybersecurity
  • Data Breaches
  • Data Collection
  • Data Storage
  • Deployment Models – Datasheets
  • Ebook – Whitepaper
  • EDR – Endpoint detection and response
  • EDR Alerts
  • Email
  • Endpoint
  • Enterprise Events
  • Identity
  • IT technology
  • Kill Chain
  • Machine Learning
  • MSSP
  • MSSP Events
  • NDR
  • Network
  • Network Security
  • Network Traffic Analysis
  • NG-SIEM
  • Open XDR
  • Open XDR Platform
  • Open XDR Summit Event
  • Podcast
  • Ransomware attacks
  • Security Operations Center (SOC)
  • security technology
  • SIEM
  • SIEM technology
  • SOC
  • SOCless
  • Uncategorized
  • University
  • Vulnerability
  • Webinar – Architecture
  • Webinar – Business Models
  • Webinar – General
  • Webinar – Upcoming
  • Whitepapers
  • XDR
  • XDR Adoption
  • XDR Solutions

Archives

FOR ENTERPRISE

  • Replace SIEM
  • Complement SIEM
  • Deploy NDR
  • Turn EDR Into XDR
  • Next Gen SOC

CAPABILITIES

  • Next Gen SIEM
  • Network Detection & Response (NDR)
  • Universal EDR
  • Automated Threat Hunting
  • Automated Response
  • Threat Intelligence

PARTNERS

  • Become a MSSP Partner
  • Become a Channel Partner
  • Become a Technology Partner
  • Open XDR Ecosystem
  • Partner Portal

Resources

  • Blogs
  • Case Studies
  • Data Sheets
  • eBooks
  • Use Case Videos
  • Podcasts
  • Webinars
  • Whitepapers

Company

  • Who We Are
  • Our History
  • Events
  • Media Kit
  • News Releases
  • Press Coverage
  • Customer Testimonials
  • Careers
  • Contact Us

For MSSP

  • Increase Revenue and Margin
  • Sell SOC-as-a-Service
  • Sell MDR-as-a-Service
  • Grow Market With Universal EDR

TECHNOLOGIES

  • Sensors
  • Interflow
  • Data Lake
  • AI Engine
  • XDR Kill Chain
  • Deployment

NETWORK

  • Network Traffic Analysis (NTA)
  • Firewall Traffic Analysis (FTA)
  • Data Streaming
  • Security Across Clouds
  • Automated SOC
  • Securing Containers
  • User Entity Behavior Analytics
  • Cloud Detection Response
  • NTA / NDR+ with ML-powered IDS

REPORTING

  • Log Management Use Cases
  • Compliance and reporting

FOR INFRASTRUCTURE

  • Integrating Existing Infrastructure
  • How Interflow Works
  • Collection Engines
  • Multi Tenant Security Platform
  • Data Processing Engine
Stellar Cyber
© 2023 Stellar Cyber All Rights Reserved | 2590 N First St Suite 360 San Jose, CA 95131
X
See Stellar Cyber
Upcoming Events!
Cookies on Stellar
We use cookies for a number of reasons, such as keeping Stellar Cyber websites reliable and secure, personalising content and ads, providing social media features and to analyse how our sites are used. Read More
AcceptReject
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT