Securing Infrastructure On Premises, Edge and Cloud
Stellar Cyber’s Starlight is the world’s first open detection/response (Open-XDR) platform, connecting the dots throughout the entire security infrastructure and automatically responding to attacks wherever they occur. Starlight integrates dozens of security applications from an App Store and presents results in an intuitive dashboard to supercharge analyst productivity.
Starlight's GUI is aligned with the kill chain
- Starlight eliminates blind spots through its unique set of data collectors that include agent sensors, network sensors, security sensors and deception sensors.
- These sensors can be deployed as software, hardware appliances or virtual appliances and can be collected from any environment.
- The sensors collect packets, files & logs and transforms the data collected into a proprietary Interflow™ data set that is reduced and fused data.
- Once data has been collected, reduced and given context, Starlight runs advanced machine learning algorithms on the new and improved data set in order to detect higher fidelity security events.
- With this methodology of getting the data set right before applying detection techniques, Starlight solves the age-old problem of garbage in, garbage out.
- Security Analysts benefit with this approach by chasing down less false alarms.
- Starlight’s Interflow data is the foundation for security investigation and threat hunting.
- Because Interflow fuses contextual data into packet and log records, security analysts have a single record that can be looked at when trying to prove that a detection is accurate and actionable.
- When looking for evidence for security detections, analysts no longer have to mentally try and stitch together data from packets and logs make sense of things.
- Starlight delivers a variety of response actions once security events have been detected.
- The system can generate email or slack alerts, send PDF reports, submit data to SOAR tools such as Demisto and Phantom Cyber and even manually or automatically instructing firewalls to take appropriate response actions
- Actions include blocking an IP address or redirecting a user to a captive portal for further authentication.