Launching Starbase: A New Open-Source Contribution from JupiterOne

by

I started JupiterOne with two strong core beliefs that shape how to address the technical challenges I was facing and overall battles in the cybersecurity industry as a whole. First, I believe to win cybersecurity battles, we must work together openly as a community to make products that are accessible to organizations of all sizes, not just the well-funded enterprises that can afford them. Second, I believe we must modernize by taking an engineering-based approach to building security products with the developer experience in mind.

These core beliefs led us to build a true data-driven platform that prioritizes robust APIs, a flexible query language, strong developer tooling, and an immense investment in open-source (we currently have over 130 public projects on GitHub). We also decided to offer a community tier version of the JupiterOne platform available to anyone, free of cost, forever.

Today, we extend upon our promise to further our investment into open-source with the launch of the new Starbase project that unifies all of JupiterOne's open-source integrations into one place, backed by the Neo4j graph database, to make graph-based security analysis available to everyone. To learn how to get started with Starbase today, I invite you to read this blog from our engineering team and take a look at this short video introduction:

 

Security is complex, especially for an organization or security professional that is starting to build a security program from scratch. Attack surfaces are growing exponentially as organizations embark on their digital transformation journey. The explosive growth of cyber assets, or digital resources that require security protection against vulnerabilities, outpaces employees 500 to 1. Cyber assets aren't just IP addresses and devices, but all resources from cloud infrastructure, traditional and SaaS applications, code, networks, data, user identities and access—every single element in digital operations counts.

Security must embrace this complexity and break through the noise. It begins with understanding your assets and learning why asset relationships matter. A graph-based approach to cyber asset management and analysis gives you the power to truly understand the structure of your cyber infrastructure and digital operations. This structural awareness enables you to identify gaps and unknown risks, reduce incident response time, add context to cloud security, prioritize vulnerability remediation, continuously monitor controls, and automate compliance.

Security is a basic right. The more accessible we make effective security technology available in the hands of security practitioners, developers, researchers, and students, the stronger that technology will grow and ultimately, the safer our community will become.

Erkang Zheng
Erkang Zheng

I founded JupiterOne because I envision a world where decisions are made on facts, not fear; teams are fulfilled, not frustrated; breaches are improbable, not inevitable. Security is a basic right.

We are building a cloud-native software platform at JupiterOne to deliver knowledge, transparency and confidence to every digital operation in every organization, large or small.

I am the Founder and CEO of JupiterOne, and also a cybersecurity practitioner  with 20+ years experience across IAM, pen testing, IR, data, app, and cloud security. An engineer by trade, entrepreneur at heart, I am passionate about technology and solving real-world challenges. Former CISO, security leader at IBM and Fidelity Investments, I hold five patents and multiple industry certifications.

Keep Reading

Proactive IAM Security: Transforming Identity Security with Actionable Insights | Okta Integration with JupiterOne
December 19, 2024
Blog
Unlocking Proactive Security: How Okta and JupiterOne Elevate IAM Insights

Unlock proactive IAM security with Okta and JupiterOne, gaining real-time insights, enforcing least privilege, and reducing risks in dynamic cloud environments.

Transitioning from Vulnerability Management to Exposure Management | JupiterOne
December 13, 2024
Blog
Transitioning from Vulnerability Management to Exposure Management with JupiterOne

Explore Gartner's latest report on Exposure Management and learn how your organization can prioritize vulnerabilities and minimize exposures.

The Ultimate CAASM Guide for 2025 | JupiterOne
November 20, 2024
Blog
The Ultimate CAASM Guide for 2025

Discover how Cyber Asset Attack Surface Management (CAASM) is providing enhanced visibility of internal and external assets in 2025.

15 Mar 2022
Blog
One line headline, one line headline

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud eiut.

15 Mar 2022
Blog
One line headline, one line headline

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud eiut.

15 Mar 2022
Blog
One line headline, one line headline

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud eiut.