Stellar Cyber Starlight Appliance Starlight Appliance is a high performance software & hardware appliance that serves as a Unified Security Analytics Platform for SOC teams and security analysts. Starlight gives security analysts the ability to collect data, detect security events, investigate and respond to them, all within a single appliance. The appliance delivers predictable data […]
Starlight Appliance is a high performance software & hardware appliance that serves as a Unified Security Analytics Platform for SOC teams and security analysts. Starlight gives security analysts the ability to collect data, detect security events, investigate and respond to them, all within a single appliance. The appliance delivers predictable data ingestion and processing performance due to its custom hardware and software design & surpasses that of any off the shelf comodity x86 server hardware. In order to detect cyber threats within your network you need lots of data, you need big data and to process big data you need to have a big compute platform.
Starlight is a high performance software & hardware appliance that serves as a Unified Security Analytics Platform for SOC teams and security analysts. Starlight gives security analysts the ability to collect data, detect security events, investigate and respond to them, all within a single appliance. The appliance delivers predictable data ingestion and processing performance due to its custom hardware and software design & surpasses that of any off the shelf commodity x86 server hardware. In order to detect cyber threats within your network you need lots of data, you need big data and to process big data you need to have a big compute platform.
Why do I need so much power? Detecting cyber threats is extremely complicated as observed by the known industry average of 200 days to detect a cyber breach. This is largely due to the inability of humans to efficiently search through large amounts of data in short periods of time. The Starlight 200A acts like a virtual security analyst and performs the complex and repetitive tasks that humans grow tired of performing in a matter of minutes. These complex tasks leverage algorithms and machine learning to reduce the time to detect a breach from months down to minutes. To do this you need massive amounts of memory, compute and lightning fast I/O. Top top it all off, if there is ever a need for more performance, simply attach another appliance as the architecture supports clustering
How it works Starlight, works by deploying sensors, agents and log forwarders on the network, servers, containers, physical & virtual hosts. The sensors & agents transform raw data into Interflow records and sends them to a centralized data processor & data lake, that deduplicates, correlates, enriches, indexes and stores the data that it receives. Once this data is received, it then runs complex analytics on the dataset to identify high fidelity breach events. Starlight has built-in analytics that leverage machine learning, ML-IDS, Malware Sandboxes and other technologies to identify threats, eliminate alert noise and improve the accuracy of detecting critical security events. With this methodology organizations can gain human work force efficiencies by augmenting security operations teams with big data analytics & artificial intelligence. Starlight is the only product that has detections across the entire kill chain without reliance on other products.
Key Software Features