Data Security

Terralogic Adopts Stellar Cyber’s Open XDR Security Platform to Deliver Comprehensive View of Customer Security

Stellar Cyber, the leading security operations platform for MSSPs and innovator of Open XDR, announced today that a top 250 MSSP and technology integrator Terralogic has adopted the Stellar Cyber Open XDR platform to bring new levels of visibility and security to its customers across India.

“We are always seeking new tools that help us deliver world-class security services for our customers,” said Sandeep Vijayaraghavan, VP of Cybersecurity at Terralogic. “The Stellar Cyber Open XDR platform is the first we’ve seen that unifies and correlates data from our various security tools to present a single, comprehensive view of our customers’ security.”

Unlike stand-alone tools that simply capture device logs or protect network endpoints, Stellar Cyber’s Open XDR platform aggregates data inputs from all existing security tools, analyzes it for anomalies, and presents contextual, prioritized security incidents in an intuitive dashboard. For the first time, Stellar Cyber’s platform gives MSSP security professionals a single console to view customers’ entire security profiles and to take quick action when threats are detected.

“We aim to be the leading MSSP in the Indian subcontinent, and for years we have offered a range of cybersecurity services to our customers,” said Renil Komitla, CEO of Terralogic. “Stellar Cyber’s platform gives us a new ability to rise above the competition.”

“When an MSSP has dozens or hundreds of customers, it’s impossible to keep up with cyberattacks in a timely manner using siloed security tools,” said Brian Stoner, VP of the MSSP business unit at Stellar Cyber. “Our automated and intuitive platform helps MSSPs like Terralogic see the big picture and get a true grasp of what’s going on in a network and how to remediate issues.”

About Terralogic
Terralogic is the ideal cyber-expert for the next generation business. We provide intelligent cybersecurity solutions that help customers define the right framework, and our solutions include VAPT, Compromise Assessment, Cloud Security, Threat Hunting, Security Solution Deployment & Incident Management. Since 2008, Terralogic has been rendering futuristic technology services for the forward-looking connected world. Our target centric DNA ensures ahead of the time engineering expertise following client roadmap and business needs. Our services encompass, UI/UX, Digital Transformation, Engineering, SAAS, IT Infrastructure services, MSSP, Cloud and Support Services, not to mention our innovations in the field of Emerging technologies viz IoT, AR/VR, and Data Science. We deep dive into enterprise goals to get to the heart of the criteria, maintaining a macro-view while researching trends and evolving models. Terralogic provides advisory consulting and IT services for Automotive, Communications, Construction, E-commerce, Gaming, Healthcare, Manufacturing, Media & Entertainment, Retail, Travel & Transportation industries.

About Stellar Cyber
Stellar Cyber’s Open XDR platform delivers Everything Detection and Response by ingesting data from all tools, automatically correlating alerts into incidents across the entire attack surface, delivering fewer and higher-fidelity incidents, and responding to threats automatically through AI and machine learning. Our XDR Kill Chain™, fully compatible with the MITRE ATT&CK framework, is designed to characterize every aspect of modern attacks while remaining intuitive to understand. This reduces enterprise risk through early and precise identification and remediation of all attack activities while slashing costs, retaining investments in existing tools and accelerating analyst productivity. Typically, our platform delivers an 8X improvement in MTTD and a 20X improvement in MTTR. The company is based in Silicon Valley.

Spotlight

Other News
Data Security

GuidePoint Security Announces Portfolio of Data Security Governance Services

GuidePoint Security | January 30, 2024

GuidePoint Security, a cybersecurity solutions leader enabling organizations to make smarter decisions and minimize risk, today announced the availability of its Data Security Governance services, which are designed to help customers address the challenges of unstructured data and data sprawl through a proven process and program to meet their unique needs. GuidePoint’s Data Security Governance services consist of policies, standards, and processes leveraging the newest technologies to meet organizations’ data governance goals in both on-prem and cloud environments. Once the right strategy is determined with the customer, GuidePoint Security consultants will review program requirements, assess current policies and controls, perform gap analysis, design and develop/enhance the program, recommend and implement supporting technologies, and create operational processes and metrics. “Whether an organization is just beginning to build their data security governance program or needs help assessing and improving an existing program, our team and service capabilities are built to meet them at their current maturity level,” said Scott Griswold, Practice Director - Security Governance Services, GuidePoint Security. “We work side by side with the customer to conduct the necessary data discovery in their environment and provide tailored recommendations for solutions and processes to ultimately build/improve upon the data security governance program.” GuidePoint’s Data Security Governance Services include: Sensitive Data Cataloging: For organizations just getting started in the process of protecting their sensitive data, GuidePoint offers Data Identification workshops to identify sensitive data types in the environment, including trade secrets, intellectual property, and sensitive business communications. Data Security Governance Program Assessment: For organizations with existing Data Security Governance or Data Protection programs, GuidePoint Security experts will assess the program to identify policy non-compliance, gaps in data protection requirements—whether legal, regulatory, contractual, or business—and program maturity levels. Data Security Governance Program Strategy Development: The GuidePoint team will work with an organization's key stakeholders to design a program strategy aligned with relevant requirements. The outputs of this effort include delivering ongoing sensitive data discovery, automated classification and labeling, the application of required sensitive data protections, restrictions on where sensitive data can be stored and sent, and data retention policy enforcement. Merger and Acquisition Data Identification: This offering provides the ability to identify sensitive data within an M&A target or recent acquisition (including locations, amounts, and access rights) and then perform penetration testing on the storage repositories where that sensitive data exists to determine the risk of data compromise. About GuidePoint Security GuidePoint Security provides trusted cybersecurity expertise, solutions and services that help organizations make better decisions that minimize risk. Our experts act as your trusted advisor to understand your business and challenges, helping you through an evaluation of your cybersecurity posture and ecosystem to expose risks, optimize resources and implement best-fit solutions. GuidePoint’s unmatched expertise has enabled a third of Fortune 500 companies and more than half of the U.S. government cabinet-level agencies to improve their security posture and reduce risk. Learn more at www.guidepointsecurity.com.

Read More