Prevent Breaches with Powerful CyberStash's Network Detection and Response Platform
CyberStash’s Network Detection and Response (NDR) platform delivers continuous network visibility, intelligent threat detection, and rapid incident response to help organisations prevent breaches before they cause business impact. The Network Detection and Response system monitors all network activity in real time, identifies malicious behaviour, and provides actionable insights that enable faster response and long-term resilience.

Ultimate Protection and Maximum Throughout
Block attacks at line speeds of up to 10 Gbps. Protect on-premises and in-cloud workloads against inbound attacks that target exposed services. Protect outbound DNS and IP traffic to prevent attacks in their track.
- Significant Attack Surface Reduction
- Out-of-Box Emerging Threat Protection
- Vendor Agnostic Threat-Intelligence and Tactical Blocking
- Real-Time Adversary Behavior and ML Detection
- Continuous Response and Incident Containment

Predictive intelligence must be automated, real-time, and actionable. That’s what you get with CyberStash’s Network Detection and Response.

It must be used effectively and efficiently to support your organisation in operating with a lower risk profile. By actively blocking known sources of attack, Eclipse.NDR transforms threat intelligence into real-time defence. As a result, your team can minimise exposure, automate response, and stay one step ahead of adversaries. In addition, by preventing repeat incidents and streamlining investigation workflows, organisations using Eclipse.NDR reduce operational overhead and improve overall resilience.
Minimize Exposure with Network Detection and Response
Protect Exposed Services with Network Detection and Response
Protect Users and Systems with Network Detection and Response
How does Network Detection and Response (NDR) work?
Eclipse.NDR uses threat intelligence to defend organizations against cyber attacks. At any given time, the Internet hosts millions of IP addresses and domains with links to malicious cyber activity. All of us are connected to a global network; none of us works in isolation, and we all face similar threats from adversarial sources that do not discriminate when deciding who to target.
CyberStash’s Network Detection and Response Platform leverages the collective threat intelligence gathered globally to detect and block known and emerging threats in real time and reduce an organization’s exposure to the staggering number of potential attackers.
What you get with NDR
Defensive Power of Network Detection and Response
Eclipse.NDR uses a staggering number of high-quality threat-intelligent indicators, risk-based policies, GEO-fencing, and ASN-fencing, to significantly reduce an organization’s exposure to most sources of attacks. CyberStash Network Detection and Response Platform transforms threat intelligence into a real-time defense capability that reduces your exposure to cyber attacks.
How we do it?
Eclipse.NDR aligns with the following framework for operationalising Cyber Threat Intelligence using Network Detection and Response (NDR)
• Multiple types of threat intelligence including IP reputation blocklists, malicious domains and high-risk Autonomous Systems Numbers (ASNs)
- Multiple threat aggregation and consolidation into a single feed
- An open platform that easily integrates threat intelligence with standards like STIX/TAXII
- Analytics to drive advanced intelligence and threat detection
- Threat feeds dynamically updated in real-time
- Automated emerging threat protection
- Automated risk-based policy application at line-speed
- Pivot, hunt for, and investigate suspicious traffic
- Block previously unknown threats and unwanted traffic
- Advanced network-centric threat detection
Out-of-box- Threat Intelligence for Network Detection and Response
Eclipse.NDR integrated with the following commercial threat intelligence providers. It comes out-of-the-box with millions of indicators and allows organizations to add their own intelligence feeds:
Well-Fed Threat Intelligence
Well-Fed threat intelligence is generated by charting attackers to see where they actually live so you have the latest information to protect yourself. Approximately one million malicious domains are monitored every hour and are curated and whitelisted to ensure that you have reliable information you need to protect yourself from cybercriminals. This includes Sinkhole IP Feed, DGA Feeds, and MaldomainML which is a feed based on proprietary machine learning and analytical methods of DNS telemetry developed in Bambenek Labs
Intel 471 Threat Intelligence
Threat Intelligence is derived from across 14 countries to provide near real-time coverage of threat actors and malware activity. Intel 471’s Malware Feed consists of Malware IP Indicators possessing high confidence, timely and rich context curated from Intel 471’s industry leading access in the cybercriminal underground. Types of malware covered are banking trojans, infostealers, loaders, spambots, and ransomware
Proofpoint ET Intelligence™
Proofpoint ET Intelligence provides actionable, up-to-the-minute IP and Domain reputation feeds
Domaintools Malicious Domain Block Lists
Malware Patrol Threat Intelligence
Malware Patrol specializes in real-time threat intelligence that protects users and enterprises in over 175 countries against cyber attacks. The highly refined and continuously updated indicators identify compromised machines, botnets, command and control (C2) servers, malware, ransomware, cryptominers, DGA infrastructure, phishing, DNS over HTTPs (DoH) resolvers, and Tor exit nodes.
Cyjax Threat Intelligence Feed
The Cyjax Threat Intelligence feed consists of a validated feed
of contextualised IP and domain indicators of compromise
(IOCs) discovered from Cyjax research and across the threat
landscape to allow for additional enrichment and
cross-correlation with other threat information and
intelligence
Webroot Brightcloud® IP
Bright Cloud Dynamic domain threat intelligence feed provides us with 5,000 domains per minute, resulting in intelligence on over 230 million domains per month
Cyberstash Emerging Domains And IP Block Lists
Indicators released by Government advisories and emerging Advanced Persistent Threats (APTs) are added to the CyberStash block list
Bitdefender Threat Intelligence Feed
Bitdefender Labs correlates hundreds of thousands of Indicators of Compromise (IoCs) collected through the Global Protective Network (GPN) protecting hundreds of millions of systems globally and turn data into actionable, real-time insights into the latest threats. The Bitdefender Advanced Threat Intelligence solution consists of unique feeds including:
•Advanced Persistent Threats (APT) Domains – A collection of domains hosting Advanced Persistent Threats Malicious Domains – A collection of domain addresses associated with general malware activities
•Phishing Domains – A collection of domain addresses associated with phishing attacks Open Source Threat Feeds
Eclipse.NDR integrates with leading open-source threat intelligence providers to deliver broader visibility, stronger detection coverage, and proactive protection through its advanced Network Detection and Response capabilities.
- Cisco Talos
- Blocklist.de
- CINS Army List
- Abuse.ch
- DHS CISCP
- Check Point Tor List
- Ransomware Tracker
- State of Missouri SOC
- ZeuSTracker
- Emerging Threats Block Rules
BYO Intel Feeds & Integrations for Network Detection and Response
Eclipse.NDR also integrates with most other commercial and open-source intelligence providers. This effectively gives our clients the unlimited potential to expand their threat intelligence capability. In fact, we have over 50 point-and-click integrations with Threat Intelligence Platforms, SIEMs, SOARs, and other applications
CyberStash combines best-in-class technology, expert analysts, and proven operational processes to deliver its Managed Threat Intelligence Gateway Service. This service transforms global threat intelligence into real-time network defence by actively blocking known adversary infrastructures and emerging malicious domains.
Built on the principles of automation, visibility, and resilience, CyberStash’s approach fuses human expertise with advanced analytics to ensure continuous protection. Through deep integration with trusted open-source and commercial intelligence feeds, the platform empowers organisations to stay ahead of evolving threats while reducing the operational burden on internal teams.
Deployment Options
Powered by eclipse.ndr, the Threat Intelligence Gateway is either deployed in front of your perimeter firewall or behind it. CyberStash works with your team to select the preferred deployment model as part of the solution design. We provide on-premises and Public Clouds deployment options such as AWS and Microsoft Azure
Fortify Your Business with Network Detection and Response
Protecting your business from cyber threats requires a proactive and comprehensive approach. At CyberStash, our Network Detection and Response (NDR) services in Australia are designed to shield your organization from evolving cybersecurity threats. We offer advanced solutions to protect your business from cybersecurity threats in Australia, ensuring that your network is monitored, detected, and defended against potential risks.
Our expertise extends beyond local borders. Whether you need to protect your business against threats in Australia or seek to protect your business from cyber threats globally, CyberStash delivers enterprise-grade NDR solutions tailored to your specific needs. Our global reach allows us to provide unparalleled protection and support, safeguarding your network wherever your operations are based.
Choose CyberStash to ensure robust, responsive security measures that keep your business secure against all types of cyber threats.
Powered by Eclipse.NDR, CyberStash combines best-in-class technology, people, and processes to deliver its Managed Threat Intelligence Gateway Service to organizations who don’t have in-house security staff to manage and monitor the security program.
Threat Management Architecture
As part of our Enterprise and Managed Service Package architecture, CyberStash collects DNS events from the client’s environment and network traffic events from the eclipse.ndr Threat Intelligence Gateway, which is also deployed on client premises. We then securely transport these events to the CyberStash Cloud SIEM, which allows us to provide threat correlation, hunting, investigation and advanced threat detection
Risk-Based Threat
Classification Policies
eclipse.ndr classifies and responds to threats by Threat List Policies, Block List Policies, Country List Policies and ASN List Policies
• Command and Control
• Endpoint Exploits
• Botnet
• Drop Site
• Web Exploits
• Spam
• Scanner
• Advanced Persistent Threat
• Brute Force Password
• TOR / Anonymizer
• Proxy / VPN
• DDOS
• Fraudulent Activity
• Illegal Activity
• Undesirable Activity
• P2P Node
• Online Gaming
• Remote Access Server
Incident Response Management
Our Managed Service Packages include Incident Response Management. This enables our clients to call on the CyberStash security team to respond on their behalf and block an attack by: