Continuous intelligence, detection, and response

The Stairwell platform

Break free from the blueprint

Organizations are doing everything they can to implement today’s blueprint of must-have security controls. But bad actors have access to the same tools you do, testing their attacks and engineering them to get around the controls currently in place.

Stairwell – the world’s first continuous intelligence, detection, and response platform (CIDR) – redefines the game to give security teams the upper hand.

What Stairwell does

A peek under the hood

Applies “zero trust” to every file

Every executable file in your environment is regarded with zero trust. Stairwell collects everything from your standard .exe to a .lnk, .dll, .bin, and beyond. This builds a virtual evidence locker to help you find malware, previously unknown supply chain vulnerabilities, and more.

Scans your entire environment – past and present

Stairwell continuously scans your environment with pre-built and custom YARA rules to determine where threats are or were lurking in your environment.

Detonates files of interest

Find a file that you think needs a closer look? The moment you start digging into it, Stairwell will begin the detonation process in the background to give you more context.

Discovers malware variants hiding in plain sight

If you found a piece of malware and want to see if there are any variants that got past your EDR, Stairwell automatically finds similar files of interest for your research.

Alerts you to new YARA matches, variants, and more

When there’s a new match against a YARA rule, a new variant is found, or another trigger is set, Stairwell can automatically notify you so you can take a look.

Sends alerts to your favorite cybersecurity tools

We want to complement – not complicate – your current cybersecurity workflow. We have pre-built integrations to help generate alerts, or you can use the Stairwell API to create custom integrations of your own.

The Stairwell difference

Create a new security paradigm

Dramatically improve detection

  • Detect targeted, EDR-evading malware
  • Mitigate supply chain risk through “zero trust” file protection
  • Operate out of sight, out of time, and out of band to prevent testing and evasion

Gain confidence in response

  • Effectively respond to new and previously unknown threats and compromises
  • Enable your analyst team to understand, analyze, and respond quickly
  • Facilitate better and faster future assessments, investigations, and analysis

Reduce costs and time

  • Eliminate unquantifiable losses from unknown past and future malware exposure
  • Reduce the cost of breaches and threat assessments, from millions to minutes
  • Dramatically shorten incident investigation and response times

There’s something for everyone

Stairwell works for the whole team

CISO

Get deep visibility into your organization’s environment.

Quickly identify potential threats.

Gain a proactive “Plan B” for activity that AV and EDR miss.

THREAT HUNTER

Detect malware and variants quickly and easily.

See unpredecented insights into low-prevalence files.

Increase effectiveness in YARA rule scans.

INCIDENT RESPONDER

Understand impact faster.

Extract actual evidence for investigation.

Efficiently archive and re-open your cases.

SOC ANALYST

Triage quicker than before.

Understand the reach of threats with ease.

Regain time for deeper security work.

Questions?

We’ve got answers

How does Stairwell differ from my EDR? Does it offer endpoint protection?

Stairwell is a complement – not a replacement – to your endpoint detection and response (EDR) tool. EDR is built to stop threats as they come in, but it can only catch what it knows.

Stairwell treats every file – good or bad – the same, giving you a look at everything that is or was on your endpoint. It’s constantly enriching your environment with new intel, finding malware that snuck past your EDR because it didn’t know to look for it at the time.

Does Stairwell provide malware protection or stop breaches?

Stairwell is one part of your malware prevention strategy, powering your prevention controls. It generates threat intelligence to show you where malware got past your security controls and how long it’s been there (or how long it was there before it removed itself), but it won’t stop malware from entering your environment. You can then use that information to further strengthen your security posture.

Can Stairwell replace any of my current tools?

Stairwell can replace any malware analysis tools or sandboxes you currently use, and even goes a step beyond what others currently offer – like large-scale automated file ingestion, permanent retention, private environments, integrations, and more.

Can I choose what files Stairwell ingests? Is it just executables?

Stairwell has a file intake filter that you can adjust to include or exclude any file extension you want – executables and beyond.

How does Stairwell handle personally identifiable information (PII)?

The default file intake list includes only file types that rarely have PII – files that contain or compile code, like executables, binaries, and scripts. While you’re able to adjust the file intake to include documents, PDFs, and text files, we do not include them in the default intake filter so that we reduce the amount of PII ingested without user input.

How does file ingestion work?

You have a few options. We have lightweight file forwarders for both Windows and macOS that you can deploy across your environment. You can also choose to have Stairwell ingest files through your EDR. In other instances, you can also upload single files through the Stairwell UI if you have a particular file you’re researching.

Is my environment private?

Each organization using Stairwell has a private environment. The files ingested by Stairwell are not publicly attributable to your organization.

Is Stairwell multi-tenant?

Stairwell is multi-tenant, so MSSPs can manage multiple organizations from within one private environment.