Posts

Showing posts from February, 2023

Open XDR – Central correlation of all cybersecurity events

Image
Reduce business risk with early and accurate identification and remediation of all attack activity while reducing costs, maintaining investments in existing tools, and accelerating analyst productivity. Open XDR: Overall view and alerting of all potential attacks on the IT landscape In order to successfully protect a company from cyber attacks, a large number of different  IT security solutions  are used today – often from different manufacturers. As a result, the various cybersecurity tools do not communicate with each other and data silos arise. As a result, those responsible for IT security lose track of the individual systems and weaken the existing protection concept. In many cases, the knowledge of a cyber attack does not come at all or comes too late. The resulting damage has already been done and has serious consequences. In day-to-day operations, those responsible for IT security have to embark on a tedious search for the related events of a cyber attack – an almost i...

One of These Things is not Like the Others

Image
  By nature, humans are wired to avoid undue risks. While there are always exceptions to the rules, by and large when given the choice between the known and unknown, the typical person one will choose the known even though the choice might only deliver a marginally positive result. It is this natural bias towards the known/safe choices that can make it difficult for companies offering new and innovative solutions to gain a foothold in any market. This is certainly true in the cybersecurity industry, so when you find your up-and-coming company highlighted as one of CRN’s  “10 Hot XDR Security Companies You Should Watch”  right along with some of the biggest players in the market it is worth taking a minute to enjoy it. In the short write up Mr. Alspach notes how  Stellar Cyber  is “challenging many of the cybersecurity giants in the  XDR  space” by offering hundreds of  “turnkey”  integrations as well as AI to power detections. We couldn’t agr...

Earning Trust As A Cybersecurity Vendor

Image
  Practitioners, executives, and investors know the stakes for cybersecurity are incredibly high and will only get higher. Ransomware locking up mission-critical devices in Oil & Gas or Healthcare, disruption causing standstills in Logistics, and identity theft rising due to your data being leaked ten times over. The story in global cybersecurity that I spend a lot of time thinking about right now is not a doomsday or  Creative Destruction  narrative, it is that there are a lot of great solutions out there ready for the task at hand. The challenge is getting them implemented at a global scale, in a relevant timeframe. The greatest inhibitor to the required scale and speed of adoption in my experience is  trust  or lack thereof. Taking a step back, the amount of dependence enterprises put on their cybersecurity vendors is astonishing. IT and cybersecurity within the enterprise can be human-engineered mayhem with near-infinite permutations; a vendor getting on...

What’s the Deal with Open XDR

Image
  Managers of MSSP  cybersecurity  teams face many challenges, including the growing number and complexity of threats, tight budgets, a shortage of security analysts, and overworked teams who are frustrated by high volumes of alerts. Analyst teams have struggled for years with the philosophy of using a dozen or more discrete  security tools  to hunt for and resolve threats, but it’s not working. The challenges seem to grow each year. And these challenges impact business growth and margin! The philosophy behind  XDR (eXtended Detection and Response)  is different. Rather than seating analysts at separate consoles that detect small parts of security problems and leaving it to humans to correlate the data,  XDR platforms  consolidate inputs from all those tools, correlate the data, and display it on one screen, making it easier to see and handle incidents occurring anywhere across the attack surface. Further, XDR platforms typically incorporate ...

The New-Look Stellar Cyber

Image
  As a  cybersecurity  vendor, making a great product or service that solves a big problem is our goal. If we do our job right, we will help security teams better protect their environments and grow our business. Now, a million variables play into a company’s ability to grow. While many are directly related to the product offering, such as: Is our product user-friendly enough?  Do we have all the required features to solve the problem?  Are we priced correctly compared to the value we deliver?   Many other variables that impact success might have nothing to do with the products themselves. One of the most essential factors in the success of any product, and its company, is the ability to effectively communicate what the product can deliver for the buyer. In other words, why should the buyer care? With so many cybersecurity vendors in the market today, getting your message across to potential buyers in an effective, memorable way is no easy undertaking....