Collection Engines

Stellar Cyber's family of sensors, collectors and forwarders provides 360 degree visibility through data collection in any environment

Stellar Cyber covers the entire IT infrastructure to ensure open extended detection and response (Open XDR), including on-premises, public cloud or with service providers.

Stellar Cyber's family of sensors, collectors and forwarders provides 360 degree visibility through data collection in any environment

Stellar Cyber covers the entire IT infrastructure to ensure open extended detection and response (Open XDR), including on-premises, public cloud or with service providers.

Stellar Cyber's family of sensors, collectors and forwarders provides 360 degree visibility

Open XDR Security Platform

High-speed high-fidelity threat detection
across the entire attack surface

Sensors Datasheet

Stellar Cyber’s Sensors – See the Whole Picture with 360 Degree Visibility

Key Features

wifi

Network Sensors

Collect rich metadata out of 4,000+ network applications with a powerful and customizable Deep Packet Inspection (DPI) Engine. Physical network sensors can be used for south/north traffic from physical switches and virtual network sensors can be used in virtual environment for east/west traffic from virtual switches.

data-security

Security Sensors

Detect network intrusion and malware downloads from network traffic. A security sensor can be deployed in the same device as a network sensor or a different device or even different location from network sensors.

servers

Server Sensors

Collect and correlate data on Linux and Windows servers including network traffic, commands, processes, file and application information. These sensors operate on Windows 2003 and up, various Linux Distros including Ubuntu, CoreOS, Debian and Red Hat

Container-sensor

Container Sensors

Collect data from, and operate inside Docker environments to monitor communications among Containers. Container Sensors themselves are containers.

deception-sensor

Deception Sensor

Act as honeypots within your environment and operate on VMware, KVM, Hyper-V and VirtualBox. Like Linux agent sensor, it collects various data including network traffic, commands, processes, file and application information.

network

Connectors

Ensure visibility into Software-as-a-Service applications or service provider environments including: AWS Cloudtrail, Office365, G-Suite, OKTA, vulnerability scanners, Active Directory, EDR, SNMP, etc

log-file-format

Log Forwarder

Collect, aggregate, parse and normalize logs from hundreds of security applications. It supports various format including standard log format, CEF format, etc.

Features:

  • Distributed, intelligent, lightweight sensors deliver 360 degree  coverage, eliminating all network blind spots.
  • Collection, inspection, and correlation of data from many data sources including network, server, applications, events from security devices such as FW/IDS, and threat feeds.
  • Stellar Cyber’s distributed architecture supports a broad range of detections at every phase of the cyber kill chain.
  • With automated analysis, alert fatigue and false alarms are effectively eliminated.
  • Stellar Cyber’s data processor supports both real-time and historic analysis and detection.
  • Get a 360° view of the attack surface on critical assets with extended detection and response (XDR).