Stellar Cyber's family of sensors and agents provides pervasive data collection in any environment

Pervasive Data Ingestion

Sensors and Agents Datasheet

Stellar Cyber’s Sensors & Agents – See the Whole Picture with Pervasive Visibility
Download Datasheet

Starlight operates wherever applications and data reside, including on-premises, public cloud or with service providers.

  • Network Sensors: collect data from physical
    or virtual switches
  • Security Sensors: collect data from physical
    or virtual switches
  • Agent Sensors: collect data running on Linux and Windows servers including traffic, commands, processes, file and application information. These sensors operate on Windows 98 and up, Ubuntu, CoreOS, Debian and Red Hat
  • Container Sensors: collect data from, and operate inside Docker environments
  • Deception Sensors: act as honeypots within your environment and operate on VMware, KVM, Hyper-V and VirtualBox
  • Connectors ensure visibility into Software-as-a-Service applications or service provider environments including: AWS Cloudtrail, Office365, G-Suite, OKTA, vulnerability scanners, Active Directory and SNMP

Key Features

  • Distributed, intelligent, lightweight sensors deliver pervasive coverage, eliminating all network blind spots.
  • Collection, inspection, and correlation of data from many data sources including network, server, applications, events from security devices such as FW/IDS, and threat feeds.
  • Starlight’s distributed architecture supports a broad range of detections at every phase of the cyber kill chain.
  • With automated analysis, alert fatigue and false alarms are effectively eliminated.
  • Starlight’s data processor supports both real-time and historic analysis and detection.
  • Get a 360° view of the attack surface on critical assets.