Choose a plan that works for you
Protect your organization based on the number of
connected devices on your network
Select Number of Assets:
Have questions? Click here
Need more information?
For custom plans and pricing, contact a sales representative here.
Subscription Includes:
-
Network-level Visibility Visibility about malicious activity at the network level.
-
45 Days Data Retention Indicates the amount of time incident information is available.
-
5 Metadata Collectors Deploy up to 5 metadata collectors.
Insights
Provides detailed visibility and
context around every threat
Monthly price per asset
Subscription Includes:
-
Endpoint-level Visibility Granular visibility showing endpoints and assets impacted by malicious activity.
-
1 Year of Data Retention Indicates the amount of time incident information is available.
-
Unlimited Metadata Collection Types Deploy as many metadata collectors as you need.
-
Detailed Incident Context and Visualizations Incidents have detailed information surrounding how the attack is impacting your organization and who is
Defender
Respond to threats using
your cyber-stack
Monthly price per asset
Subscription Includes:
-
Endpoint-level Visibility Granular visibility showing endpoints and assets impacted by malicious activity.
-
2 Years of Data Retention Stores data for up to two years to analyze against newly discovered threats - protects against zero-day & newly emerging threats.
-
Unlimited Metadata Collection Types Deploy as many metadata collectors as you need.
-
Incident Response Integrations Deploy response integrations to stop attacks in real time using your existing cyber-stack.
-
Security Operations (SecOps) Integrations SecOps integrations send data from Lumu to existing ticketing platforms and tools.
All subscriptions include unlimited access to the Lumu Portal for team members.
Have questions regarding these plans? Check our FAQ page
What’s included?
Explore all of the features available within each product
Lumu FreeGet FREE Account |
InsightsBuy Now |
DefenderBuy Now |
|
Metadata Collection | |||
Metadata Collection | |||
DNS Ingestion | |||
DNS Ingestion | |||
Firewall Access Logs | |||
Firewall Access Logs | |||
Proxy Access Logs | |||
Proxy Access Logs | |||
Spambox | |||
Spambox | |||
Netflow | |||
Netflow | |||
Data Collection via API (aka Custom Collector) | |||
Data Collection via API (aka Custom Collector) | One | Unlimited | Unlimited |
Agent for Remote Workers | |||
Agent for Remote Workers | |||
Data Collectors | |||
Data Collectors | Two | Unlimited Virtual Appliances | Unlimited Virtual Appliances |
Cloud Collector
Collect metadata from the cloud.
|
|||
Cloud Collector
Collect metadata from the cloud.
|
|||
Strategic Compromise Intelligence | |||
Strategic Compromise Intelligence | |||
Confirmed Compromise Visibility | |||
Confirmed Compromise Visibility |
Network-level Visibility
Allows you to detect if your infrastructure is compromised and identify adversarial activity. This is the first step towards reaching a zero-compromise status.
|
Asset-level Visibility
Gives you richer context on compromise distribution with exact identification of compromised assets and adversarial IoCs.
|
Asset-level Visibility
Gives you richer context on compromise distribution withexact identification of compromised assets, adversarial IoCs, and automated response capabilities.
|
Compromise Context | |||
Compromise Context | Limited | Unlimited | Unlimited |
Compromise Activity & Distribution | |||
Compromise Activity & Distribution | Limited | Unlimited | Unlimited |
Network Traffic Grouping | |||
Network Traffic Grouping | |||
Business Priority | |||
Business Priority | |||
Incident Management | |||
Incident Management | |||
Bring Your Own Threat Intelligence | |||
Bring Your Own Threat Intelligence | |||
Incident Retention | |||
Incident Retention | 45 days | 1 year | 2 years |
Integrations | |||
Integrations | |||
Out-of-the-Box Data Collection | |||
Out-of-the-Box Data Collection | |||
Out-of-the-Box SecOps | |||
Out-of-the-Box SecOps | |||
Out-of-the-Box Response | |||
Out-of-the-Box Response | |||
Response via API | |||
Response via API | |||
Training & Support | |||
Training & Support | |||
Lumu Academy | |||
Lumu Academy | |||
Technical Support | |||
Technical Support | Email Support | Email & Telephone Support | Email & Telephone Support |
Advanced Features | |||
Advanced Features | |||
Single Sign-on | |||
Single Sign-on | |||
Playback
Analyzes metadata from the last two years and protects against zero-day & newly emerging threats.
|
|||
Playback
Analyzes metadata from the last two years and protects against zero-day & newly emerging threats.
|
|||
STIX Module | |||
STIX Module | |||
Lumu-to-SIEM Alert Integrations | |||
Lumu-to-SIEM Alert Integrations | |||
Get FREE Account | Buy Now | Buy Now |
Frequently Asked Questions
What happens after I enter my information and pay online?
After you pay, we will process the payment and update your account settings according to the subscription selected (this can take up to an hour). Once everything is processed you’ll hear from a Lumu representative who can help guide you through the implementation process as needed.
Do I need to enter my credit card to sign up?
If you’re planning on purchasing Lumu Insights or Defender tiers online we will forward you to our online payment platform that will request payment details including a credit card number. You don’t need a credit card for Lumu Free.
What’s an asset?
Any device connected to the network or monitored by Lumu. This includes laptops, servers, cloud environments, IP cameras and IOTs
What’s the difference between monthly and annual plans?
Customers on annual plans prepay monthly tracked users for the entire year and receive a discount for their commitment. The annual plan allows you to purchase assets at a lower rate.
Get Started with Lumu
Contact Sales
Have questions about pricing or plans? Fill out the form and a sales representative will be in touch shortly.