Overview

Thank you for taking the time and resources to allow Stellar Cyber to prove value and concept of the Starlight Open-xDR solution. We are confident that it will solve many of the problems that you and other security professionals face in today’s complex environments and that Starlight will significantly enhance your IT security program.

This document outlines the basic steps of a Starlight POC and is designed as a worksheet for use in developing and recording milestones and to track criteria of success. The following agenda can be used for you to prepare in advance for the topics to be reviewed during each of the sessions.

- How Stellar Cyber’s Interflow Works

Stellar Cyber processes the right data creating an actionable, searchable and exportable record — called Interflow. Interflow normalizes security data shared between integrated applications and third-party tools.

Open XDR Security Platform

Reveal Hidden Attacks On Premises, Edge and Cloud
Download Datasheet

Interflow™ Datasheet

Interflow™ – Designed to build actionable records
with rich context for any set of related security events.
Download Datasheet

Agenda

01
Kickoff Meeting
  1. Gather and record business and technical requirements
  2. Define success criteria
  3. Capture scope (See Scope Section)
    1. Discuss deployment options (on-premises, cloud, hybrid)
    2. Determine data Ingestion Rate
    3. Review locations and logistics (shipping of appliances, sensors)
  4. Understand and record timelines and schedules
  5. Address miscellaneous concerns or questions
02
Session 2
  1. Install and configure
    1. Data Processor
    2. Security Sensor (if applicable)
    3. Network Sensor(s)
    4. Agent(s)
    5. Connector(s)
  2. Insure proper data flow and collections
03
Scalable Breach Detection

Our intelligent data collectors are purely software-based, with extremely low memory footprints and computing requirements. They can perform local detection of threat events, instantaneous layer 7 application identification with just one packet, as well as correlation locally. Our big data processor’s carefully-crafted intelligence identifies threats during data ingestion and post data storage by leveraging the right machine models. This provides unprecedented scale and enables deployments in anything from autonomous machines to global public clouds.

04
High Fidelity Alerts

Stellar Cyber data processor uses automation to cut through the noise and deliver only high-quality, high-confidence, actionable alerts. Using Multi-Level Machine-Learning (ML-ML), the system applies cascaded threat models to the rich data from collectors and intelligence feeds. The system is self learning, boosting the productivity and efficiency of security analysts in both real-time breach detection and historical forensic analysis.

Integrations

Fastest Time To Detect

The industry average to detect a major cyber breach is about 200 days and carries an average cost of $6 million dollars to identify a breach. According to industry reports, it has been found that 53% of the breaches were discovered by an external source. Stellar Cyber’s anywhere detection and response (XDR) platform delivers unique data collection techniques and automation reduces the time to detect a breach from months to minutes which ultimately reduces the cost to identify a breach from millions of dollars to hundreds of dollars in human costs.

Want to learn more?

We invite you to take a self guided tour of the
Starlight user interface.