Ratings and Reviews 1 Rating

Total
ease
features
design
support

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • SOCRadar Extended Threat Intelligence Reviews & Ratings
    104 Ratings
    Company Website
  • Safetica Reviews & Ratings
    409 Ratings
    Company Website
  • ManageEngine ADAudit Plus Reviews & Ratings
    516 Ratings
    Company Website
  • Graylog Reviews & Ratings
    411 Ratings
    Company Website
  • Adaptive Security Reviews & Ratings
    87 Ratings
    Company Website
  • DriveLock Reviews & Ratings
    1 Rating
    Company Website
  • Wiz Reviews & Ratings
    1,446 Ratings
    Company Website
  • ManageEngine EventLog Analyzer Reviews & Ratings
    208 Ratings
    Company Website
  • ManageEngine Log360 Reviews & Ratings
    163 Ratings
    Company Website
  • Blumira Reviews & Ratings
    150 Ratings
    Company Website

What is Stellar Cyber?

Stellar Cyber uniquely positions itself as the only security operations platform that provides swift and precise threat detection along with automated responses across diverse environments, such as on-premises systems, public clouds, hybrid configurations, and SaaS infrastructures. This leading-edge security software significantly boosts the efficiency of security operations, enabling analysts to mitigate threats in mere minutes, a stark contrast to the conventional duration of days or even weeks. By integrating data from a broad spectrum of well-established cybersecurity tools alongside its inherent functionalities, the platform adeptly correlates this data and delivers actionable insights through an intuitive interface. This feature effectively alleviates the frequent challenges of tool fatigue and information overload faced by security analysts, all while lowering operational costs. Users benefit from the ability to stream logs and connect to APIs, providing a holistic view of their security landscape. Moreover, with integrations that promote automated responses, Stellar Cyber guarantees a streamlined security management experience. Its open architecture design ensures compatibility across various enterprise environments, thereby reinforcing its status as an essential component in cybersecurity operations. Consequently, this flexibility makes Stellar Cyber an attractive option for organizations aiming to optimize their security protocols and improve their overall threat response capabilities. In an era where cyber threats are increasingly sophisticated, leveraging such a comprehensive platform is not just advantageous, but essential.

What is Centaurus?

A constellation is a deployed cluster that comprises a primary server, known as the alpha, along with a range of 5 to 19 auditor servers operated by various organizations or business entities, each of which publicly authenticates its identity using a standard Stellar ed25519 public key. The stability of the organizations involved and their public keys, which are not expected to change often, makes it beneficial to incorporate these public keys into client software for straightforward signature verification on the client side. Funds that are gathered from clients are stored in a singular Stellar account called the vault, which is protected by an M-of-N multi-signature framework; here, N denotes the total number of independent servers within the constellation, while M is defined as the majority of votes plus one, requiring more than 50% of the signatures. For any withdrawal to be carried out, the majority of signatures from the quorum participants must be obtained, a procedure that is bolstered by the Stellar ledger's inherent integrity. Transactions, including payments and trades, are confirmed almost instantly, achieving finality within five seconds, thereby facilitating a swift and secure financial ecosystem. This synergy of advanced technology and governance structures establishes a resilient foundation for asset management within the constellation, promoting trust and efficiency among participating entities. The clarity in the operational framework and security measures ensures that participants can confidently engage in transactions knowing their assets are well-protected.

Media

Media

Integrations Supported

7AI
Amazon Web Services (AWS)
Aurora Endpoint Security
Barracuda Spam Firewall
Carbon Black EDR
Check Point IPS
Check Point Infinity
Check Point Quantum Next Generation Firewalls (NGFW)
CrowdStrike Falcon
F5 BIG-IP Advanced WAF
Gigamon
Microsoft Azure
Mindflow
Rapid7 MDR
SentinelOne Singularity
SonicWall Next Generation Firewall
Sophos Firewall
Stellar
Tenable One
VirtualArmour

Integrations Supported

7AI
Amazon Web Services (AWS)
Aurora Endpoint Security
Barracuda Spam Firewall
Carbon Black EDR
Check Point IPS
Check Point Infinity
Check Point Quantum Next Generation Firewalls (NGFW)
CrowdStrike Falcon
F5 BIG-IP Advanced WAF
Gigamon
Microsoft Azure
Mindflow
Rapid7 MDR
SentinelOne Singularity
SonicWall Next Generation Firewall
Sophos Firewall
Stellar
Tenable One
VirtualArmour

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Stellar Cyber

Date Founded

2015

Company Location

United States

Company Website

stellarcyber.ai/

Company Facts

Organization Name

Centaurus

Company Website

github.com/centaurus-project/centaurus

Categories and Features

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

SIEM

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Categories and Features

Popular Alternatives

Popular Alternatives

Constellation TMS Reviews & Ratings

Constellation TMS

TranzAct Technologies
CrowdStrike Falcon Reviews & Ratings

CrowdStrike Falcon

CrowdStrike
Innspark Reviews & Ratings

Innspark

Innspark Solutions Private Limited