• Support
  • Contact Us
Stellar Cyber
  • Platform
    • Overview
    • Platform Tour
    • How It Works
    • Stellar Cyber for Enterprises
    • Stellar Cyber for MSSPs
    • Before and After Stellar Cyber
    • What is Open XDR
  • Industries
    • Manufacturing
    • Government
    • Higher Education
    • Financial Services
  • Services
    • Overview
    • Customer Enablement
    • Stellar Cyber Academy
    • Customer Success
    • Customer Support
  • Pricing
  • Resources
    • Library
    • Blogs
    • Case Studies
    • Data Sheets
    • Ebooks
    • Research Reports
    • Use Case Videos
    • Podcasts
    • Whitepapers
    • Webinars
  • Partners
    • Become A MSSPs Partner
    • Become A Channel Partner
    • Become A Technology Partner
    • Open XDR Marketplace
    • Partner Portal
  • Company
    • About Us
    • Our History
    • Events
    • Press Coverage
    • News Releases
    • Customer Testimonials
    • Careers
    • Contact Us
  • Request A Demo
  • Platform
    • Overview
    • Platform Tour
    • How It Works
    • Stellar Cyber for Enterprises
    • Stellar Cyber for MSSPs
    • Before and After Stellar Cyber
    • What is Open XDR
  • Industries
    • Manufacturing
    • Government
    • Higher Education
    • Financial Services
  • Services
    • Overview
    • Customer Enablement
    • Stellar Cyber Academy
    • Customer Success
    • Customer Support
  • Pricing
  • Resources
    • Library
    • Blogs
    • Case Studies
    • Data Sheets
    • Ebooks
    • Research Reports
    • Use Case Videos
    • Podcasts
    • Whitepapers
    • Webinars
  • Partners
    • Become A MSSPs Partner
    • Become A Channel Partner
    • Become A Technology Partner
    • Open XDR Marketplace
    • Partner Portal
  • Company
    • About Us
    • Our History
    • Events
    • Press Coverage
    • News Releases
    • Customer Testimonials
    • Careers
    • Contact Us
  • Request A Demo
January 20, 2020January 20, 2020

Stellar Cyber Partners with Check Point Software Technologies to Provide Automated Orchestration, Visibility and Response

Leverages Check Point’s Open Platform for Security APIs to bring automated threat detection and response to Check Point users

SANTA CLARA, Calif., January 20, 2020 — Security provider Stellar Cyber, with the first Open-XDR security application platform, today announced that it has joined Check Point Software’s Technology Partner program in the Management category. Leveraging Check Point’s Open Platform for Security APIs, Stellar Cyber’s Starlight Open-XDR platform can now deliver automated responses to security incidents by commanding Check Point solutions to block ports or perform other protective measures.

Through this partnership, Stellar Cyber’s Starlight can analyze Check Point logs, correlate incidents to identify threats, and automatically trigger responses through Check Point solutions. This automated capability ensures that security analysts can dramatically reduce alert fatigue as firewalls typically have thousands of alerts per day, Starlight’s automation examines logs and looks for anomalies that are inefficient to examine manually. This combination of capabilities allows analysts to:

  • Gain context for alerts: FW/IDS data is fused with contextual information such as geolocation, IP/URL reputation, user, endpoint and domain registrar information and more to gain better context for alerts generated by the firewall.
  • Eliminate alert fatigue: Focus on actionable security events that matter vs. the millions of alerts generated by firewalls. Advanced machine learning algorithms determine what events are normal noise vs. high-fidelity anomalies.
  • Audit firewall policies: Clean up firewall policies and eliminate unused and unneeded policies by machine learning identifying commonly used vs. unused policies that are configured on your firewalls.
  • Identify sequences of events: Leverage automatic correlation to identify events seen on the firewall that lead to other events seen on endpoint and cloud applications to get a better understanding of a breach timeline.
  • Take automated action:  Leverage integrated security orchestration and response (SOAR) to take automated action such as automatically blocking a malicious actor on the firewall or disabling an infected user within the enterprise.

“Check Point’s Infinity Architecture and Stellar Cyber’s Starlight Open-XDR platform will provide stronger automation and artificial intelligence capabilities to our joint customers,” said Jason Min, Head of Business Development at Check Point Software Technologies. Through our partnership, we are excited to deliver superior threat prevention and simplified security across all environments.”

“Check Point is a leader in cyber security and Stellar Cyber complements their solutions by automating threat detection and response,” said Ilker Simsir, Principal Product Manager at Stellar Cyber. “Through this partnership, the integration enables our resellers and go-to-market partners to deliver additional value to Check Point customers by adding XDR thinking and advanced detection capabilities like machine learning to their existing investment.”
 

Helpful Stellar Cyber links

  •  Blogs
  • Case Studies
  •  Product Tour
  • Open-XDR  Ecosystem Integrations


About Stellar Cyber
Stellar Cyber makes Starlight, the only comprehensive security platform providing maximum protection of applications and data wherever they reside and automatically responding to attacks wherever they occur. Starlight tightly integrates dozens of security applications from an App Store and presents results in an intuitive dashboard to supercharge analyst productivity by slashing attack response times to seconds or minutes. Starlight deploys easily on premises, in public clouds or with service providers. Stellar Cyber is based in Silicon Valley and is backed by Valley Capital Partners, Northern Light Venture Capital, SIG and other investors. For more information, visit https://stellarcyber.ai. 

 

Contact:
Charlie Rubin
Story PR
510-908-3356
charlie@storypr.com

END

Portfolio navigation

Previous
Next

Categories

  • AI-driven security
  • Alliances Events
  • Application Security
  • Apps
  • Artificial Intelligence
  • Breach Detection
  • Case Studies
  • Case Studies – MSSP
  • Cloud
  • Cloud Security
  • Compliment SIEM
  • Core Capabilities – Datasheets
  • Core Technologies – Datasheets
  • CxO Insyte Events
  • Cyberattacks
  • Cybercriminals
  • Cybersecurity
  • Data Breaches
  • Data Collection
  • Data Storage
  • Deployment Models – Datasheets
  • Ebook – Whitepaper
  • EDR – Endpoint detection and response
  • EDR Alerts
  • Email
  • Endpoint
  • Enterprise Events
  • Identity
  • IT technology
  • Kill Chain
  • Machine Learning
  • MSSP
  • MSSP Events
  • NDR
  • Network
  • Network Security
  • Network Traffic Analysis
  • NG-SIEM
  • Open XDR
  • Open XDR Platform
  • Open XDR Summit Event
  • Podcast
  • Ransomware attacks
  • Security Operations Center (SOC)
  • security technology
  • SIEM
  • SIEM technology
  • SOC
  • SOCless
  • Uncategorized
  • University
  • Vulnerability
  • Webinar – Architecture
  • Webinar – Business Models
  • Webinar – General
  • Webinar – Upcoming
  • Whitepapers
  • XDR
  • XDR Adoption
  • XDR Solutions

Archives

FOR ENTERPRISE

  • Replace SIEM
  • Complement SIEM
  • Deploy NDR
  • Turn EDR Into XDR
  • Next Gen SOC

CAPABILITIES

  • Next Gen SIEM
  • Universal EDR
  • Automated Threat Hunting
  • Automated Response
  • Threat Intelligence

PARTNERS

  • Become a MSSP Partner
  • Become a Channel Partner
  • Become a Technology Partner
  • Open XDR Ecosystem
  • Partner Portal

Resources

  • Blogs
  • Case Studies
  • Data Sheets
  • eBooks
  • Use Case Videos
  • Podcasts
  • Webinars
  • Whitepapers

Company

  • Who We Are
  • Our History
  • Reduce Insurance Costs
  • Events
  • Media Kit
  • News Releases
  • Press Coverage
  • Customer Testimonials
  • Careers
  • Contact Us

For MSSP

  • Increase Revenue and Margin
  • Sell SOC-as-a-Service
  • Sell MDR-as-a-Service
  • Grow Market With Universal EDR

TECHNOLOGIES

  • Sensors
  • Interflow
  • Data Lake
  • AI Engine
  • XDR Kill Chain
  • Deployment

NETWORK

  • Network Traffic Analysis (NTA)
  • Firewall Traffic Analysis (FTA)
  • Data Streaming
  • Security Across Clouds
  • Automated SOC
  • Securing Containers
  • User Entity Behavior Analytics
  • Cloud Detection Response
  • NTA / NDR+ with ML-powered IDS

REPORTING

  • Log Management Use Cases
  • Compliance and reporting

FOR INFRASTRUCTURE

  • Integrating Existing Infrastructure
  • How Interflow Works
  • Collection Engines
  • Multi Tenant Security Platform
  • Data Processing Engine
Stellar Cyber
© 2023 Stellar Cyber All Rights Reserved | 2590 N First St Suite 360 San Jose, CA 95131
X
See Stellar Cyber
Upcoming Events!
Cookies on Stellar
We use cookies for a number of reasons, such as keeping Stellar Cyber websites reliable and secure, personalising content and ads, providing social media features and to analyse how our sites are used. Read More
AcceptReject
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT