Contact Us

Highlighted items are required

Stella options

Stella functionality is available via four independent modules – Discovery, Compliance, Configuration and Monitoring, which are orchestrated by Stella Central to create a horizontally integrated control platform to provide independent network visibility,  configuration management and risk identification.

Stella
Discovery

Know the exact equipment on your network to identify or remediate risk, be that EOL, misconfigured or non-approved equipment.

Stella
Compliance

Always be confident that your properties are 100% compliant with your network standards.

Stella
Configuration

When your networks are configured in strict accordance with your standards from the start, your risk profile is lower and your 3rd party vendor onboarding is streamlined.

Stella
Monitoring

Stella Monitoring leverages an approved configuration to maximise network uptime and ensure continuous adherence to your exact standards.

Stella
Central

In full implementation, Stella Central is your single network operating platform, allowing you to automatically discover, audit, configure, manage, and document your portfolio of networks.

Stella Security

Security is a principal concern at Stella, so we take a multi-layered approach to security for the Stella Relay.

The Stella Relay is a single-purpose device

The Stella Relay is built specifically as simple jumping points for securely accessing your network with no additional functionality. Each Relay is provisioned with unique credentials and can only be used with the target network.

All access to the Stella Relay is over encrypted links

Each Stella Relay calls home and connects to a secure network using unique credentials via encrypted VPN links and wait for instructions. Instructions and all results are transported using SSH connections over the VPN tunnel.

All Stella Relays are isolated

Stella Relay can only access the Stella VPN servers and are not accessible outside of the VPN link. Communication between Stella devices is blocked and actively monitored.

The Stella Relay doesn't keep your data

All Stella Relays use encryption and temporary storage to ensure your data is secure. Stella Relays purge details such as the configuration of your network, compliance tests, and logs after each round of testing, ready for the next run.

Humans need not apply

The Stella Relay can only be accessed by our automation platform.

Independently Verified

Bright Star (the owner of Stella) is SOC 2 compliant with semi-annual reviews documented in our Trust Center. Also, independent security specialists CyberCX perform comprehensive penetration-testing of Stella software and Relay hardware twice per year.

Built on the shoulders of giants

Like almost every software product, Stella is built on best-of-breed technologies that includes large and mature open-source software projects such as Linux, SSH, Python, Ansible, and OpenVPN.

Supply-chain security is monitored

We automatically monitor the projects and libraries incorporated into Stella to ensure that all security updates are implemented as soon as possible.

Which means, with Stella your attack surface is minimal and resides in AWS best practice security protocols.

Secure by design

Stella does not hold personal or financial information. All services have a minimal attack surface protected by AWS managed services and configured to AWS best practices.