About Cabling Installation & Maintenance

Our mission: Bringing practical business and technical intelligence to today's structured cabling professionals

For more than 30 years, Cabling Installation & Maintenance has provided useful, practical information to professionals responsible for the specification, design, installation and management of structured cabling systems serving enterprise, data center and other environments. These professionals are challenged to stay informed of constantly evolving standards, system-design and installation approaches, product and system capabilities, technologies, as well as applications that rely on high-performance structured cabling systems. Our editors synthesize these complex issues into multiple information products. This portfolio of information products provides concrete detail that improves the efficiency of day-to-day operations, and equips cabling professionals with the perspective that enables strategic planning for networks’ optimum long-term performance.

Throughout our annual magazine, weekly email newsletters and 24/7/365 website, Cabling Installation & Maintenance digs into the essential topics our audience focuses on.

  • Design, Installation and Testing: We explain the bottom-up design of cabling systems, from case histories of actual projects to solutions for specific problems or aspects of the design process. We also look at specific installations using a case-history approach to highlight challenging problems, solutions and unique features. Additionally, we examine evolving test-and-measurement technologies and techniques designed to address the standards-governed and practical-use performance requirements of cabling systems.
  • Technology: We evaluate product innovations and technology trends as they impact a particular product class through interviews with manufacturers, installers and users, as well as contributed articles from subject-matter experts.
  • Data Center: Cabling Installation & Maintenance takes an in-depth look at design and installation workmanship issues as well as the unique technology being deployed specifically for data centers.
  • Physical Security: Focusing on the areas in which security and IT—and the infrastructure for both—interlock and overlap, we pay specific attention to Internet Protocol’s influence over the development of security applications.
  • Standards: Tracking the activities of North American and international standards-making organizations, we provide updates on specifications that are in-progress, looking forward to how they will affect cabling-system design and installation. We also produce articles explaining the practical aspects of designing and installing cabling systems in accordance with the specifications of established standards.

Cabling Installation & Maintenance is published by Endeavor Business Media, a division of EndeavorB2B.

Contact Cabling Installation & Maintenance

Editorial

Patrick McLaughlin

Serena Aburahma

Advertising and Sponsorship Sales

Peter Fretty - Vice President, Market Leader

Tim Carli - Business Development Manager

Brayden Hudspeth - Sales Development Representative

Subscriptions and Memberships

Subscribe to our newsletters and manage your subscriptions

Feedback/Problems

Send a message to our general in-box

 

Stellar Cyber Delivers Built-In Identity Threat Detection & Response (ITDR) to Combat Credential-Based Attacks in Real Time

Showcasing new ITDR capabilities at Black Hat Las Vegas, Stellar Cyber platform’s embedded ITDR eliminates threats, slashes response time, and brings identity security into a unified SecOps platform.

Stellar Cyber, the security illumination company, today announced the advanced development of its Identity Threat Detection & Response (ITDR) capabilities, fully embedded into its open, unified, AI-driven SecOps platform. ITDR marks a critical step forward on the journey to a human-augmented autonomous SOC, empowering security teams with identity-centric visibility and control—without requiring yet another tool or console.

Identity is the new perimeter of attack in cybersecurity: According to Verizon’s 2024 DBIR, 70% of breaches began with compromised credentials, and SecurityToday.com reports that 22% of confirmed breaches in 2025 originated from account compromise, making identity-based threats the most prevalent and persistent attack vector facing organizations today.

Common Use Cases Driving the Need for ITDR

Identity credentials are a primary attack surface in today’s threat landscape. To combat this growing threat, more organizations are turning to ITDR to help detect and mitigate credential-based attacks. Common use cases where ITDR plays a critical role include:

  • Compromised User Accounts: Detecting unusual access patterns or privilege misuse that may indicate lateral movement or credential abuse.
  • Account Takeover via Impossible Travel: Identifying login anomalies, such as geographically impossible access attempts, that signal potential account compromise.
  • Insider Data Exfiltration: Monitoring privileged user behavior to flag large or unusual data transfers that may suggest malicious insider activity.

As identity continues to dominate the threat landscape, Stellar Cyber places it at the core of threat detections for security operations. By correlating identity signals with endpoint, network, and cloud telemetry, Stellar Cyber enables customers to see bad actors coming early, know how to defend, and act decisively—all within a single unified console.

“Identity is today’s battleground,” said Aimei Wei, Founder and CTO of Stellar Cyber. “We built ITDR into the core of our platform to give customers the full identity context they need—fused with all their other security data—to stop credential-based attacks in real time and move closer to autonomous response.”

Key Capabilities: Identity-Centric Detection, Response, and Resilience

Stellar Cyber ITDR transforms identity security from reactive to proactive with:

  • Unified Identity Visibility – Ingests identity data from your identity tools, either on-prem or SaaS, like Active Directory, Entra ID, Okta, and more—no agents, no add-ons.
  • AI-Powered Detection – Multi-Layer AI™ and UEBA flag both stealthy and brute force tactics like ATO, MFA abuse, privilege escalation, brute force login, and lateral movement, etc.
  • Real-Time Identity Risk Scoring – Continuously evaluates users, service accounts, and machine identities to spotlight top risks.
  • Seamless Correlation – Identity threats are automatically integrated into case timelines with endpoint, network, and cloud context.
  • Instant Remediation – Analysts or automated playbooks can disable accounts, expire sessions, and isolate hosts with one click or automatically via pre-built playbooks.
  • Audit-Ready Dashboards – Prebuilt reports aligned to PCI-DSS, HIPAA, ISO 27001, and other compliance frameworks.

“Our customers are done with tool sprawl,” said Subo Guha, SVP of Products at Stellar Cyber. “They want outcomes—not another product to manage identity threats. ITDR is a key integral component in delivering on our vision of a human-augmented autonomous SOC: real-time identity defense built into the same platform they already trust.”

Why Customers Choose Stellar Cyber ITDR

  • No Extra Console – Built into the Open XDR platform under a single platform. You get all the enhancement of our Open XDR platform.
  • Day-One Value – Deploys in under an hour, baselines identity behavior in 24 hours, and surfaces actionable threats immediately.
  • Hybrid-Ready – Secures identities across SaaS, cloud, and on-prem environments.
  • Vendor-Agnostic – Works with Microsoft Entra ID, Google, Okta, CrowdStrike, Zscaler, and many others—no rip-and-replace required.
  • Unified detection and response - ITDR is unified into Stellar Cyber platform so you not only identify identity based threats but with powerful AI layered capabilities easily correlate all threats into cases and all identity threat movements. This in addition to the automation for response allows quick resolution of any attack.

Resources

  • See us at Black Hat, secure your demo time now
  • Read the blog here
  • Explore the solution – Visit the ITDR Page

About Stellar Cyber

Stellar Cyber is the security illumination company. By shining a bright light on the darkest corners of security operations, Stellar Cyber empowers organizations to see incoming attacks, know how to fight them, and act decisively—protecting what matters most. Stellar Cyber’s award-winning open security operations platform includes AI-driven SIEM, NDR, Open XDR, and Multi-Layer AI™—all under a single license. Trusted by ⅓ of the top 250 MSSPs and over 14,000 customers worldwide, Stellar Cyber is helping organizations everywhere take the next step toward a human-augmented autonomous SOC. Learn more at https://stellarcyber.ai.

Contacts

Stock Quote API & Stock News API supplied by www.cloudquote.io
Quotes delayed at least 20 minutes.
By accessing this page, you agree to the following
Privacy Policy and Terms Of Service.