TECHNOLOGY
XDR Kill Chain™
See everything, detect everything
Older kill chains, like the Lockheed Martin Cyber Kill Chain, are outdated, but newer frameworks like MITRE ATT&CK, while powerful, do not fully characterize attacks in a way that an XDR platform requires. The XDR Kill Chain solves these problems and is purpose-built for XDR.

XDR Malware
XDR Intel
XDR User Behavior Analytics (UBA)
XDR Network Behavior Analytics (NBA)
XDR Endpoint Behavior Analytics (EBA)
XDR Sensor Behavior Analytics (SBA)

Key Features
Map Your Own Alert Types
User-defined Automated Threat Hunting Alerts can be mapped onto the XDR Kill Chain so that organization specific alerts can live alongside out-of-the-box Stellar Cyber Alerts.
Tagging
Stages, tactics, and techniques are often not enough to make the most productive use of a kill chain. The XDR Kill Chain comes with robust tagging functionality built in so analysts can further organize Alerts for prioritization.
Intuitive to
Understand
Five top-level stages wrap dozens of MITRE ATT&CK’s tactics and hundreds of detailed techniques so security analysts can better mentally position Alerts in the broader context of risk and attacks.
Delineates External vs.
Internal Alerts
Alerts that represent activity via external actors vs. internal actors significantly affect prioritization. The XDR Kill Chain tags Alerts accordingly to make it easy to understand context and generate Cases more effectively.