Search
Close this search box.

Collection Engines

Stellar Cyber's family of sensors, collectors and forwarders provides 360
degree visibility through data collection in any environment

Stellar Cyber covers the entire IT infrastructure to ensure open extended detection and response
(Open XDR), including on-premises, public cloud or with service providers.
Stellar Cyber’s family of sensors, collectors and forwarders provides 360 degree visibility through data collection in any environment

Stellar Cyber covers the entire IT infrastructure to ensure open extended detection and response (Open XDR), including on-premises, public cloud or with service providers.

Stellar Cyber's family of sensors, collectors and forwarders provides 360 degree visibility

Open XDR Security Platform
High-speed high-fidelity threat detection across the entire attack surface
Sensors Datasheet
Stellar Cyber’s Sensors – See the Whole Picture with 360 Degree Visibility

Key Features

EDR Software

Network Sensors

Collect rich metadata out of 4,000+ network applications with a powerful and customizable Deep Packet Inspection (DPI) Engine. Physical network sensors can be used for south/north traffic from physical switches and virtual network sensors can be used in virtual environment for east/west traffic from virtual switches.

cloud detection and response

Security Sensors

Detect network intrusion and malware downloads from network traffic. A security sensor can be deployed in the same device as a network sensor or a different device or even different location from network sensors.

Open XDR

Server Sensors

Collect and correlate data on Linux and Windows servers including network traffic, commands, processes, file and application information. These sensors operate on Windows 2003 and up, various Linux Distros including Ubuntu, CoreOS, Debian and Red Hat

Endpoint detection and response tools

Connectors

Ensure visibility into Software-as-a-Service applications or service provider environments including: AWS Cloudtrail, Office365, G-Suite, OKTA, vulnerability scanners, Active Directory, EDR, SNMP, etc

register.svg

Log Forwarder

Collect, aggregate, parse and normalize logs from hundreds of security applications. It supports various format including standard log format, CEF format, etc.

Features:

Scroll to Top