Network Detection and Response
An automated, predictive, actionable cybersecurity platform that protects your organization by blocking millions of cyber threats in real time.
Ultimate Protection and Maximum Throughout
Block attacks at line speeds of up to 10 Gbps. Protect on-premises and in-cloud workloads against inbound attacks that target exposed services. Protect outbound DNS and IP traffic to prevent attacks in their track.
- Significant Attack Surface Reduction
- Out-of-Box Emerging Threat Protection
- Vendor Agnostic Threat-Intelligence and Tactical Blocking
- Real-Time Adversary Behavior and ML Detection
- Continuous Response and Incident Containment
It must be used effectively and efficiently and support your business to operate with a lower risk profile. By actively blocking known sources of attacks, organizations can use eclipse.ndr to reduce their operational overhead while staying one step ahead of the adversary.
Minimize Exposure
Protect Exposed Services
Protect Users
How we do it?
eclipse.ndr aligns with the following framework for operationalising Cyber Threat Intelligence:• Multiple types of threat intelligence including IP reputation blocklists, malicious domains and high-risk Autonomous Systems Numbers (ASNs)
- Multiple threat aggregation and consolidation into a single feed
- An open platform that easily integrates threat intelligence with standards like STIX/TAXII
- Analytics to drive advanced intelligence and threat detection
- Threat feeds dynamically updated in real-time
- Automated emerging threat protection
- Automated risk-based policy application at line-speed
- Pivot, hunt for, and investigate suspicious traffic
- Block previously unknown threats and unwanted traffic
- Advanced network-centric threat detection
Out-of-box- Threat Intelligence
eclipse.ndr integrated with the following commercial and threat intelligence providers. It comes out-of-the-box with millions of indicators and allows organizations to add their own intelligence feeds:
Well-Fed Threat Intelligence
Well-Fed threat intelligence is generated by charting attackers to see where they actually live so you have the latest information to protect yourself. Approximately one million malicious domains are monitored every hour and are curated and whitelisted to ensure that you have reliable information you need to protect yourself from cybercriminals. This includes Sinkhole IP Feed, DGA Feeds, and MaldomainML which is a feed based on proprietary machine learning and analytical methods of DNS telemetry developed in Bambenek Labs
Intel 471 Threat Intelligence
Threat Intelligence is derived from across 14 countries to provide near real-time coverage of threat actors and malware activity. Intel 471’s Malware Feed consists of Malware IP Indicators possessing high confidence, timely and rich context curated from Intel 471’s industry leading access in the cybercriminal underground. Types of malware covered are banking trojans, infostealers, loaders, spambots, and ransomware
Proofpoint ET Intelligence™
Proofpoint ET Intelligence provides actionable, up-to-the-minute IP and Domain reputation feeds
Domaintools Malicious Domain Block Lists
Malware Patrol Threat Intelligence
Malware Patrol specializes in real-time threat intelligence that protects users and enterprises in over 175 countries against cyber attacks. The highly refined and continuously updated indicators identify compromised machines, botnets, command and control (C2) servers, malware, ransomware, cryptominers, DGA infrastructure, phishing, DNS over HTTPs (DoH) resolvers, and Tor exit nodes.
Cyjax Threat Intelligence Feed
The Cyjax Threat Intelligence feed consists of a validated feed
of contextualised IP and domain indicators of compromise
(IOCs) discovered from Cyjax research and across the threat
landscape to allow for additional enrichment and
cross-correlation with other threat information and
intelligence
Webroot Brightcloud® IP
Bright Cloud Dynamic domain threat intelligence feed provides us with 5,000 domains per minute, resulting in intelligence on over 230 million domains per month
Cyberstash Emerging Domains And IP Block Lists
Indicators released by Government advisories and emerging Advanced Persistent Threats (APTs) are added to the CyberStash block list
Bitdefender Threat Intelligence Feed
Bitdefender Labs correlates hundreds of thousands of Indicators of Compromise (IoCs) collected through the Global Protective Network (GPN) protecting hundreds of millions of systems globally and turn data into actionable, real-time insights into the latest threats. The Bitdefender Advanced Threat Intelligence solution consists of unique feeds including:
•Advanced Persistent Threats (APT) Domains – A collection of domains hosting Advanced Persistent Threats Malicious Domains – A collection of domain addresses associated with general malware activities
•Phishing Domains – A collection of domain addresses associated with phishing attacks Open Source Threat Feeds
eclipse.ndr is integrated with the following open-source threat intelligence providers:
- Cisco Talos
- Blocklist.de
- CINS Army List
- Abuse.ch
- DHS CISCP
- Check Point Tor List
- Ransomware Tracker
- State of Missouri SOC
- ZeuSTracker
- Emerging Threats Block Rules
BYO Intel Feeds & Integrations
eclipse.ndr also integrates with most other commercial and open-source intelligence providers. This effectively gives our clients the unlimited potential to expand their threat intelligence capability. In fact, we have over 50 point-and-click integrations with Threat Intelligence Platforms, SIEMs, SOARs, and other applications
Deployment Options
Powered by eclipse.ndr, the Threat Intelligence Gateway is either deployed in front of your perimeter firewall or behind it. CyberStash works with your team to select the preferred deployment model as part of the solution design. We provide on-premises and Public Clouds deployment options such as AWS and Microsoft Azure
Fortify Your Business with Network Detection and Response
Protecting your business from cyber threats requires a proactive and comprehensive approach. At CyberStash, our Network Detection and Response (NDR) services in Australia are designed to shield your organization from evolving cybersecurity threats. We offer advanced solutions to protect your business from cybersecurity threats in Australia, ensuring that your network is monitored, detected, and defended against potential risks.
Our expertise extends beyond local borders. Whether you need to protect your business against threats in Australia or seek to protect your business from cyber threats globally, CyberStash delivers enterprise-grade NDR solutions tailored to your specific needs. Our global reach allows us to provide unparalleled protection and support, safeguarding your network wherever your operations are based.
Choose CyberStash to ensure robust, responsive security measures that keep your business secure against all types of cyber threats.
Powered by Eclipse.NDR, CyberStash combines best-in-class technology, people, and processes to deliver its Managed Threat Intelligence Gateway Service to organizations who don’t have in-house security staff to manage and monitor the security program.
Threat Management Architecture
As part of our Enterprise and Managed Service Package architecture, CyberStash collects DNS events from the client’s environment and network traffic events from the eclipse.ndr Threat Intelligence Gateway, which is also deployed on client premises. We then securely transport these events to the CyberStash Cloud SIEM, which allows us to provide threat correlation, hunting, investigation and advanced threat detection
Risk-Based Threat
Classification Policies
eclipse.ndr classifies and responds to threats by Threat List Policies, Block List Policies, Country List Policies and ASN List Policies
• Command and Control
• Endpoint Exploits
• Botnet
• Drop Site
• Web Exploits
• Spam
• Scanner
• Advanced Persistent Threat
• Brute Force Password
• TOR / Anonymizer
• Proxy / VPN
• DDOS
• Fraudulent Activity
• Illegal Activity
• Undesirable Activity
• P2P Node
• Online Gaming
• Remote Access Server
Incident Response Management
Our Managed Service Packages include Incident Response Management. This enables our clients to call on the CyberStash security team to respond on their behalf and block an attack by: