CAPABILITIES
Threat Intelligence
How It Works
The result? Stellar Cyber security software — an open, application-based extended detection and response (XDR) platform. Security analysts focus on real IT security threats, allowing them to respond in minutes rather than hours or days.
Key Features
Multiple Feeds Included
Stellar Cyber’s TIP automatically aggregates multiple commercial, open-source, and government threat-intelligence feeds together with the ones from Stellar Cyber security research or those shared amongst deployments. Examples of included feeds are Proofpoint, DHS, OTX, OpenPhish and PhishTank. Feeds are prioritized based on security research so security data is only enriched once after threat intelligence aggregation.
Bring Your Own Feed
If Stellar Cyber does not have certain threat intelligence critical for your mission, you can integrate additional feeds directly into the platform with standards like STIX/TAXII. The added threat intelligence is contained to your deployment only.
Near Real-Time
The latest threat intelligence updates from all sources are automatically and constantly distributed to all Stellar Cyber deployments.
Near Real-Time
All included threat intelligence feeds and the Threat Intelligence Platform itself are provided at no additional cost.
Automatic
The Threat Intelligence Platform is always working in the background without any administrative overhead. It continuously collects, aggregates, prioritizes, and distributes feeds, and enriches data with them.
It’s Your Turn to
See. Know. Act.
Stellar Cyber unifies your stack, automates response, and connects you with trusted partners—giving you clarity, control, and measurable results.