• Support
  • Contact Us
Stellar Cyber
  • Platform
    • Overview
    • Platform Tour
    • How It Works
    • Stellar Cyber for Enterprises
    • Stellar Cyber for MSSPs
    • Before and After Stellar Cyber
    • What is Open XDR
  • Industries
    • Manufacturing
    • Government
    • Higher Education
    • Financial Services
  • Services
    • Overview
    • Customer Enablement
    • Stellar Cyber Academy
    • Customer Success
  • Pricing
  • Resources
    • Library
    • Blogs
    • Case Studies
    • Data Sheets
    • Ebooks
    • Research Reports
    • Use Case Videos
    • Podcasts
    • Whitepapers
    • Webinars
  • Partners
    • MSSPs
    • Become A Channel Partner
    • Become A Technology Partner
    • Open XDR Marketplace
    • Partner Portal
  • Company
    • About Us
    • Our History
    • Events
    • Press Coverage
    • News Releases
    • Customer Testimonials
    • Careers
    • Contact Us
  • Request A Demo
  • Platform
    • Overview
    • Platform Tour
    • How It Works
    • Stellar Cyber for Enterprises
    • Stellar Cyber for MSSPs
    • Before and After Stellar Cyber
    • What is Open XDR
  • Industries
    • Manufacturing
    • Government
    • Higher Education
    • Financial Services
  • Services
    • Overview
    • Customer Enablement
    • Stellar Cyber Academy
    • Customer Success
  • Pricing
  • Resources
    • Library
    • Blogs
    • Case Studies
    • Data Sheets
    • Ebooks
    • Research Reports
    • Use Case Videos
    • Podcasts
    • Whitepapers
    • Webinars
  • Partners
    • MSSPs
    • Become A Channel Partner
    • Become A Technology Partner
    • Open XDR Marketplace
    • Partner Portal
  • Company
    • About Us
    • Our History
    • Events
    • Press Coverage
    • News Releases
    • Customer Testimonials
    • Careers
    • Contact Us
  • Request A Demo
June 27, 2019November 14, 2019

Stellar Cyber Integrates with Amazon Web Services Traffic Mirroring to Provide Unified Security Analytics to Cloud Workloads

Validates company’s vision to help customers gain pervasive visibility, perform automation and response

Silicon Valley, CA, June 27, 2019 —

BOSTON–(BUSINESS WIRE)–AWS re-Inforce 2019 — Stellar Cyber, a Silicon Valley-based security analytics provider, today announced that its Starlight platform can immediately integrate with Amazon’s newly released VPC traffic mirroring, allowing Starlight customers to get raw traffic logs from AWS environments, then utilize its advanced machine learning and AI to detect, alert, and respond to anomalous behaviors. The RFC 7438 VXLAN capabilities that make this integration possible have been part of the company’s offerings since 2017. AWS’ new traffic mirroring validates Stellar Cyber’s vision around pervasive visibility across public, private and hybrid cloud workloads.

@StellarCyberai can immediately integrate with Amazon Web Services traffic monitoring to provide unified security analytics to cloud workloads. Its Starlight platform helps customers gain pervasive visibility, perform automation and response.

Tweet this

When traditional traffic mirroring was not feasible, Stellar Cyber’s Starlight was the first AI-based security analytics platform to enable VXLAN capabilities to capture traffic from virtual, physical and cloud environments. For more than two years, the Starlight platform has utilized VXLAN technology to gain visibility across cloud workloads to detect and respond to threats within the AWS and other VXLAN-capable environments.

Stellar Cyber’s customers have been able to gain security visibility and automation in AWS to give them a better understanding of what is actually happening in their cloud. “Visibility and automation have always been part of the holy grail for security practitioners,” said David Barton, CISO of Stellar Cyber. “The announcement from AWS confirms our established strategy of using VXLAN to provide that visibility, and Starlight to perform automation and response.”

With Starlight’s pervasive data collection, coupled with advanced data handling and machine learning, Stellar Cyber customers have multiple ways to detect anomalous behavior attacks across the Lockheed Martin cyber kill-chain. With defense-in-depth methodologies, an attack missed in one stage of the kill chain will be caught by Starlight in another stage.

According to a recent survey by the SANS Institute, 31 percent of responding organizations experienced unauthorized access to cloud environments or cloud assets by outsiders this year. This number is likely even higher as most of those companies didn’t have the visibility needed to detect that access. As cloud adoption rates continue to rise, this problem will only escalate.

“With tools such as Starlight, security teams have the visibility they need to collect the right data, detect anomalous behaviors, investigate and threat hunt those anomalies, and ultimately respond in automated ways to stop those threats,” said John Peterson, Chief Product Officer of Stellar Cyber.

Stellar Cyber’s new Starlight™ 3.1, the first Unified Security Analytics Platform that leverages artificial intelligence (AI) and machine learning (ML) for automated threat hunting and advanced breach detection, enables businesses to not only rapidly detect and contain emerging threats, but also to reap significant savings in time, costs, and human capital. Now, security professionals who have long struggled with cyber defense activities like manual threat detection and extreme firewall noise have a solution.

About Stellar Cyber

Stellar Cyber, a Silicon Valley-based security analytics company, is the creator of Starlight, a unified security analytics platform designed to be the SOC Command Center for pervasive data collection, breach detection, investigation and response (CDIR). The company’s customers are mid-tier and large enterprises and service providers building managed detection and response services for those who don’t have in house incident responders. Starlight allows organizations to automatically detect and thwart attacks on their critical data systems before damage is done or data is lost and deploys easily in any computing and network environment. Stellar Cyber is backed by Valley Capital Partners, Northern Light Venture Capital, Digital Hearts and other investors. Learn more at https://stellarcyber.ai.

Contacts

SKC, Inc.
Mary Placido
mary@skc-pr.com 
(415) 218.3627

Sharon Y. Sim
sharon@skc-pr.com 
(415) 420-1889

Business Wire Release

END

Portfolio navigation

Previous
Next

Categories

  • AI-driven security
  • Alliances Events
  • Application Security
  • Apps
  • Artificial Intelligence
  • Breach Detection
  • Case Studies
  • Case Studies – MSSP
  • Cloud
  • Cloud Security
  • Compliment SIEM
  • Core Capabilities – Datasheets
  • Core Technologies – Datasheets
  • CxO Insyte Events
  • Cyberattacks
  • Cybercriminals
  • Cybersecurity
  • Data Breaches
  • Data Collection
  • Data Storage
  • Deployment Models – Datasheets
  • Ebook – Whitepaper
  • EDR – Endpoint detection and response
  • EDR Alerts
  • Email
  • Endpoint
  • Enterprise Events
  • Identity
  • IT technology
  • Kill Chain
  • Machine Learning
  • MSSP
  • MSSP Events
  • NDR
  • Network
  • Network Security
  • Network Traffic Analysis
  • NG-SIEM
  • Open XDR
  • Open XDR Platform
  • Open XDR Summit Event
  • Podcast
  • Ransomware attacks
  • Security Operations Center (SOC)
  • security technology
  • SIEM
  • SIEM technology
  • SOC
  • SOCless
  • Uncategorized
  • University
  • Vulnerability
  • Webinar – Architecture
  • Webinar – Business Models
  • Webinar – General
  • Webinar – Upcoming
  • Whitepapers
  • XDR
  • XDR Adoption
  • XDR Solutions

Archives

FOR ENTERPRISE

  • Replace SIEM
  • Complement SIEM
  • Deploy NDR
  • Turn EDR Into XDR
  • Next Gen SOC

CAPABILITIES

  • NG SIEM
  • Universal EDR
  • Automated Threat Hunting
  • Automated Response
  • Threat Intelligence

PARTNERS

  • Become a MSSP Partner
  • Become a Channel Partner
  • Become a Technology Partner
  • Open XDR Ecosystem
  • Partner Portal

Resources

  • Blogs
  • Case Studies
  • Data Sheets
  • eBooks
  • Use Case Videos
  • Podcasts
  • Webinars
  • Whitepapers

Company

  • Who We Are
  • Our History
  • Reduce Insurance Costs
  • Events
  • Media Kit
  • News Releases
  • Press Coverage
  • Customer Testimonials
  • Careers
  • Contact Us

For MSSP

  • Increase Revenue and Margin
  • Sell SOC-as-a-Service
  • Sell MDR-as-a-Service
  • Grow Market With Universal EDR

TECHNOLOGIES

  • Sensors
  • Interflow
  • Data Lake
  • AI Engine
  • XDR Kill Chain
  • Deployment

NETWORK

  • Network Traffic Analysis (NTA)
  • Firewall Traffic Analysis (FTA)
  • Data Streaming
  • Security Across Clouds
  • Automated SOC
  • Securing Containers
  • User Entity Behavior Analytics
  • Cloud Detection Response
  • NTA / NDR+ with ML-powered IDS

REPORTING

  • Log Management Use Cases
  • Compliance and reporting

FOR INFRASTRUCTURE

  • Integrating Existing Infrastructure
  • How Interflow Works
  • Collection Engines
  • Multi Tenant Security Platform
  • Data Processing Engine
Stellar Cyber
© 2023 Stellar Cyber All Rights Reserved | 2590 N First St Suite 360 San Jose, CA 95131
X
See Stellar Cyber
Upcoming Events!
Cookies on Stellar
We use cookies for a number of reasons, such as keeping Stellar Cyber websites reliable and secure, personalising content and ads, providing social media features and to analyse how our sites are used. Read More
AcceptReject
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT