• Support
  • Contact Us
Stellar Cyber
  • Platform
    • Overview
    • Platform Tour
    • How It Works
    • Stellar Cyber for Enterprises
    • Stellar Cyber for MSSPs
    • Before and After Stellar Cyber
    • What is Open XDR
  • Industries
    • Manufacturing
    • Government
    • Higher Education
    • Financial Services
  • Services
    • Overview
    • Customer Enablement
    • Stellar Cyber Academy
    • Customer Success
  • Pricing
  • Resources
    • Library
    • Blogs
    • Case Studies
    • Data Sheets
    • Ebooks
    • Research Reports
    • Use Case Videos
    • Podcasts
    • Whitepapers
    • Webinars
  • Partners
    • MSSPs
    • Become A Channel Partner
    • Become A Technology Partner
    • Open XDR Marketplace
    • Partner Portal
  • Company
    • About Us
    • Our History
    • Events
    • Press Coverage
    • News Releases
    • Customer Testimonials
    • Careers
    • Contact Us
  • Request A Demo
  • Platform
    • Overview
    • Platform Tour
    • How It Works
    • Stellar Cyber for Enterprises
    • Stellar Cyber for MSSPs
    • Before and After Stellar Cyber
    • What is Open XDR
  • Industries
    • Manufacturing
    • Government
    • Higher Education
    • Financial Services
  • Services
    • Overview
    • Customer Enablement
    • Stellar Cyber Academy
    • Customer Success
  • Pricing
  • Resources
    • Library
    • Blogs
    • Case Studies
    • Data Sheets
    • Ebooks
    • Research Reports
    • Use Case Videos
    • Podcasts
    • Whitepapers
    • Webinars
  • Partners
    • MSSPs
    • Become A Channel Partner
    • Become A Technology Partner
    • Open XDR Marketplace
    • Partner Portal
  • Company
    • About Us
    • Our History
    • Events
    • Press Coverage
    • News Releases
    • Customer Testimonials
    • Careers
    • Contact Us
  • Request A Demo
August 5, 2019August 5, 2019

Stellar Cyber Launches Starlight 3.3 at Black Hat USA 2019

Powerful Data- and AI-Based Security Analytics Solution Could Have Thwarted Capital One Breach

Silicon Valley, CA, August 5, 2019 —

SANTA CLARA, Calif. & LAS VEGAS–(BUSINESS WIRE)–Black Hat USA 2019 — Security analytics provider Stellar Cybertoday announced the launch of Starlight™ 3.3, the first Unified Security Analytics Platform with two industry-first capabilities: AI-based dynamic phishing detection and automated event correlation. Starlight 3.3, debuting at the Black Hat USA 2019conference in Las Vegas this week, leverages data fusion, artificial intelligence (AI) and machine learning (ML) to detect and thwart sophisticated attacks that other systems miss. Serving as a SOC Command Center, this powerful solution could have detected and enabled Capital One to respond to its security breach before 100 million consumers were compromised.

@stellarcyberai unveils Starlight 3.3 at #BlackHat #BHUSA. Powerful data- and AI-driven security analytics platform could have thwarted Capital One breach. Visit our booth #1302 for demo & product giveaway!

Tweet this

“The Capital One data breach – akin to the 2017 Equifax breach – is another painful reminder of the security challenges facing our world today,” said John Peterson, Chief Product Officer of Stellar Cyber. “The proliferation of cyberattacks underscores the urgency and need for our industry to one-up the ‘black hats’ with stronger breach detection approaches. Companies and consumers deserve better. Outdated tactics of manual threat hunting must be replaced by speedier and smarter solutions that combine pervasive data collection, breach detection, investigation, and response (CDIR).”

Stellar Cyber’s flagship product Starlight is a SOC Command Center and an all-in-one security analytics platform. Starlight 3.3’s two industry firsts are:

  • Dynamic Phishing Detection: Starlight 3.3 applies AI and ML to detect phishing based on network traffic behavior and threat intelligence feeds. Often, phishing is the first occurrence that sets off a chain of security events. Current products conduct anti-phishing statically and lack behavioral-based ML phishing detection capability.
  • Automated Event Correlation: Starlight 3.3 also detects anomalous behaviors and automatically makes the connection to determine which security event leads to the next event. Behavioral detection as well as the ability to unify collected data means better detection of anomalous behavior and advanced analysis to deliver high-fidelity, actionable alerts that reduce detection time and effort.

Stellar Cyber at Black Hat USA 2019

Throughout the week at Black Hat USA 2019, Stellar Cyber will host one-on-one briefings and demonstrations, provide complimentary product giveaways, and will also be exhibiting at the Mandalay Bay Convention Center. Below are details of the company’s Black Hat participation:

  • Booth Participation: From August 7 to August 8, Stellar Cyber will be exhibiting at booth #1302. Company executives will show Starlight SOC Command center in action at the booth’s three demo stations.
  • Product Giveaway: Visitors can also take advantage of the company’s complimentary product giveaway and receive Stellar Cyber’s full Starlight product suite for 90 days. The giveaway also comes with complimentary professional services provided by the company’s security engineers and can be used to perform a 90-day security assessment of an organization’s network.
  • One-on-One Briefings: Stellar Cyber will host one-on-one meetings at two suites at the Four Seasons Hotel during Black Hat week. Company executives are on-hand to discuss and shed light on current cybersecurity challenges, AI, ML and Starlight, drawing from decades of security expertise and knowledge.
  • Kick-off of Stellar Cyber’s CISO Advisory Board: Established to share cybersecurity knowledge and enhance Stellar Cyber’s product offerings, CISOs will gather during Black Hat and each quarter thereafter to consult with each other with the goal of helping the broader cybersecurity community. Members include security executives from well-known companies in the financial, aerospace, and hospitality industries.

To learn more about Starlight and its new features, product giveaway, or to schedule a meeting, please click here: https://stellarcyber.ai/contact/

About Stellar Cyber

Stellar Cyber, a Silicon Valley-based security analytics company, is the creator of Starlight, a unified security analytics platform designed to be the SOC Command Center for pervasive data collection, breach detection, investigation and response (CDIR). The company’s customers are mid-tier and large enterprises and service providers building managed detection and response services for those who don’t have in house incident responders. Starlight allows organizations to automatically detect and thwart attacks on their critical data systems before damage is done or data is lost and deploys easily in any computing and network environment. Stellar Cyber is backed by Valley Capital Partners, Northern Light Venture Capital, Digital Hearts and other investors. Learn more at https://stellarcyber.ai.

Contacts

SKC, Inc.
Mary Placido
mary@skc-pr.com 
(415) 218.3627

Sharon Y. Sim
sharon@skc-pr.com 
(415) 420-1889

Original Business Wire Press Release Link

END

Portfolio navigation

Previous
Next

Categories

  • AI-driven security
  • Alliances Events
  • Application Security
  • Apps
  • Artificial Intelligence
  • Breach Detection
  • Case Studies
  • Case Studies – MSSP
  • Cloud
  • Cloud Security
  • Compliment SIEM
  • Core Capabilities – Datasheets
  • Core Technologies – Datasheets
  • CxO Insyte Events
  • Cyberattacks
  • Cybercriminals
  • Cybersecurity
  • Data Breaches
  • Data Collection
  • Data Storage
  • Deployment Models – Datasheets
  • Ebook – Whitepaper
  • EDR – Endpoint detection and response
  • EDR Alerts
  • Email
  • Endpoint
  • Enterprise Events
  • Identity
  • IT technology
  • Kill Chain
  • Machine Learning
  • MSSP
  • MSSP Events
  • NDR
  • Network
  • Network Security
  • Network Traffic Analysis
  • NG-SIEM
  • Open XDR
  • Open XDR Platform
  • Open XDR Summit Event
  • Podcast
  • Ransomware attacks
  • Security Operations Center (SOC)
  • security technology
  • SIEM
  • SIEM technology
  • SOC
  • SOCless
  • Uncategorized
  • University
  • Vulnerability
  • Webinar – Architecture
  • Webinar – Business Models
  • Webinar – General
  • Webinar – Upcoming
  • Whitepapers
  • XDR
  • XDR Adoption
  • XDR Solutions

Archives

FOR ENTERPRISE

  • Replace SIEM
  • Complement SIEM
  • Deploy NDR
  • Turn EDR Into XDR
  • Next Gen SOC

CAPABILITIES

  • NG SIEM
  • Universal EDR
  • Automated Threat Hunting
  • Automated Response
  • Threat Intelligence

PARTNERS

  • Become a MSSP Partner
  • Become a Channel Partner
  • Become a Technology Partner
  • Open XDR Ecosystem
  • Partner Portal

Resources

  • Blogs
  • Case Studies
  • Data Sheets
  • eBooks
  • Use Case Videos
  • Podcasts
  • Webinars
  • Whitepapers

Company

  • Who We Are
  • Our History
  • Reduce Insurance Costs
  • Events
  • Media Kit
  • News Releases
  • Press Coverage
  • Customer Testimonials
  • Careers
  • Contact Us

For MSSP

  • Increase Revenue and Margin
  • Sell SOC-as-a-Service
  • Sell MDR-as-a-Service
  • Grow Market With Universal EDR

TECHNOLOGIES

  • Sensors
  • Interflow
  • Data Lake
  • AI Engine
  • XDR Kill Chain
  • Deployment

NETWORK

  • Network Traffic Analysis (NTA)
  • Firewall Traffic Analysis (FTA)
  • Data Streaming
  • Security Across Clouds
  • Automated SOC
  • Securing Containers
  • User Entity Behavior Analytics
  • Cloud Detection Response
  • NTA / NDR+ with ML-powered IDS

REPORTING

  • Log Management Use Cases
  • Compliance and reporting

FOR INFRASTRUCTURE

  • Integrating Existing Infrastructure
  • How Interflow Works
  • Collection Engines
  • Multi Tenant Security Platform
  • Data Processing Engine
Stellar Cyber
© 2023 Stellar Cyber All Rights Reserved | 2590 N First St Suite 360 San Jose, CA 95131
X
See Stellar Cyber
Upcoming Events!
Cookies on Stellar
We use cookies for a number of reasons, such as keeping Stellar Cyber websites reliable and secure, personalising content and ads, providing social media features and to analyse how our sites are used. Read More
AcceptReject
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT