• Support
  • Contact Us
Stellar Cyber
  • Use Cases
    • Log Management
    • Next Gen SIEM
    • Intelligent Next Gen SOC
    • Asset Management
    • Network Security
    • 360 Degree Visibility
    • Automated SOC
    • Security Across Clouds
    • Securing Containers
  • MSSPs
    • Increase Revenue and Margin
    • Sell SOC-as-a-Service
    • Sell MDR-as-a-Service
  • Products

    Platform

    • Open XDR – the Intelligent Next Gen Security Operations Platform
    • Product Tour
    • Collection Engines
    • Deployment Models
    • Integrations

    Built in Capabilities

    • Next Gen SIEM (NG SIEM)
    • User Entity Behavior Analytics (UEBA)
    • Network Detection Response (NDR)
    • Cloud Detection Response (CDR)
    • Automated Threat Hunting (ATH)
    • Firewall Traffic Analysis (FTA)
    • Data Streaming (DS)

    Technology

    • Single Unified Data Lake
    • Data Processing Engine
    • AI Engine
    • How Interflow Works
    • Multi-tiered Multi-tenant Security
    open xdr integrated application

  • Partners
    • Become A Channel Partner
    • Become A MSSP Partner
    • Become A Technology Partner
    • Open XDR Ecosystem
    • Partner Portal
  • Resources
    • Case Studies
    • Webinars
    • Podcasts
    • Blogs
    • Use Case Videos
    • Events
  • Company
    • Who We Are
    • Our Take On Cybersecurity
    • Our History
    • Our Media Kit
    • News Releases
    • Press Coverage
    • Customer Testimonials
    • Careers
    • Contact Us
  • Request a Demo
  • Use Cases
    • Log Management
    • Next Gen SIEM
    • Intelligent Next Gen SOC
    • Asset Management
    • Network Security
    • 360 Degree Visibility
    • Automated SOC
    • Security Across Clouds
    • Securing Containers
  • MSSPs
    • Increase Revenue and Margin
    • Sell SOC-as-a-Service
    • Sell MDR-as-a-Service
  • Products

    Platform

    • Open XDR – the Intelligent Next Gen Security Operations Platform
    • Product Tour
    • Collection Engines
    • Deployment Models
    • Integrations

    Built in Capabilities

    • Next Gen SIEM (NG SIEM)
    • User Entity Behavior Analytics (UEBA)
    • Network Detection Response (NDR)
    • Cloud Detection Response (CDR)
    • Automated Threat Hunting (ATH)
    • Firewall Traffic Analysis (FTA)
    • Data Streaming (DS)

    Technology

    • Single Unified Data Lake
    • Data Processing Engine
    • AI Engine
    • How Interflow Works
    • Multi-tiered Multi-tenant Security
    open xdr integrated application

  • Partners
    • Become A Channel Partner
    • Become A MSSP Partner
    • Become A Technology Partner
    • Open XDR Ecosystem
    • Partner Portal
  • Resources
    • Case Studies
    • Webinars
    • Podcasts
    • Blogs
    • Use Case Videos
    • Events
  • Company
    • Who We Are
    • Our Take On Cybersecurity
    • Our History
    • Our Media Kit
    • News Releases
    • Press Coverage
    • Customer Testimonials
    • Careers
    • Contact Us
  • Request a Demo
November 21, 2019November 21, 2019

Stellar Cyber Leverages App Store Thinking with New Threat-Hunting App Library

New application supercharges analyst productivity by eliminating the need to write hunting rules, build investigation widgets and dashboards

Silicon Valley, CA, November 21, 2019 — Security provider Stellar Cyber, with the first Open-XDR security platform, today announced its new Threat-Hunting App Library, which eliminates an analyst’s need to use custom queries in order to search for cyber threats or create custom widgets and dashboards to make sense of the data under investigation. The library, a collection of threat-hunting apps and their automated execution in the company’s Starlight platform, enable less-skilled security analysts to automatically hunt for threats at endpoints, in the network, or in the cloud with a few mouse clicks. With automation, it reduces the detection time from impossible to possible and from months to minutes.

As cyber threats multiply, companies face a shortage of highly skilled security analysts who can write complex queries to track down threats. Even these analysts can spend hours querying network logs to begin searching for threats. In contrast, Stellar Cyber’s Threat-Hunting App Libraryincludes a pre-built library of ever-increasing (currently at 30+) threat-hunting techniques for DNS analysis, Office365, Sophos and many other threat vectors, so even less-skilled security analysts can effectively track down threats in minutes rather than hours by picking the right app and leveraging Stellar Cyber’s automation and visualization.

“Stellar Cyber’s App Store approach to cybersecurity consolidates dozens of security applications under one intuitive interface,” said Ilker Simsir, Principal Product Manager at Stellar Cyber. “Our Threat-Hunting App further improves analyst productivity by enabling point-and-click threat searches and helps ensure that those threats are found quickly through automation.”

Helpful Stellar Cyber links

  • Blogs
  • Case Studies
  • Product Tour
  • Automated Threat Hunting Application

About Stellar Cyber
Stellar Cyber makes Starlight, the only comprehensive security platform providing maximum protection of applications and data wherever they reside and automatically responding to attacks wherever they occur. Starlight tightly integrates dozens of security applications from an App Store and presents results in an intuitive dashboard to supercharge analyst productivity by slashing attack response times to seconds or minutes. Starlight deploys easily on premises, in public clouds or with service providers. Stellar Cyber is based in Silicon Valley and is backed by Valley Capital Partners, Northern Light Venture Capital, SIG and other investors. For more information, contact https://stellarcyber.ai.

 

Contact:
Charlie Rubin
Story PR
510-908-3356
charlie@storypr.com

END

Portfolio navigation

Previous
Next

Subscribe to Newsletter

Categories

  • AI-driven security
  • Application Security
  • Artificial Intelligence
  • Breach Detection
  • Case Studies
  • Cloud Security
  • CxO Insyte Events
  • Cyberattacks
  • Cybercriminals
  • Cybersecurity
  • Data Collection
  • Data Storage
  • EDR – Endpoint detection and response
  • IT technology
  • MSSP
  • Network Security
  • Network Traffic Analysis
  • Open XDR
  • Podcast
  • security technology
  • SOC
  • Uncategorized
  • XDR

Archives

  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • May 2019
  • March 2018
  • February 2018
  • January 2018
Stellar Cyber
  • Who We Are
  • Product Tour
  • Contact Us
© 2019 Stellar Cyber All Rights Reserved | 4701 Patrick Henry Drive, Building 12, Santa Clara, CA 95054
Cookies on Stellar
We use cookies for a number of reasons, such as keeping Stellar Cyber websites reliable and secure, personalising content and ads, providing social media features and to analyse how our sites are used. Read More
AcceptReject
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Non-necessary

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.

SAVE & ACCEPT