Technical

eWeek Review: Lumu Illuminates the Current Threat Landscape

Table of Contents

In a recent eWEEK article, veteran IT product reviewer Frank J. Ohlhorst gave Lumu Insights a hands-on review and declared that it ‘has made fighting cyber threats with actionable intelligence a work of IT art’. The visibility and insights offered by Lumu, while sitting quietly on the perimeter, were singled out. Ohlhorst’s Lumu Insights review concludes that such products will become critical to cyber operations.

Highlights From eWeek’s Lumu Insights Review

  • “In practice, Lumu Insights sits quietly on the network perimeter, and along with the endpoint agents, gathers and analyzes data.”
  • “Lumu’s novel approach to collecting metadata enables the platform to take a deeper look into network operations across network metadata and provide the context that threat hunters need to be effective in their roles.”
  • The platform also offers advanced capabilities, such as attack pattern recognition, network traffic grouping and drill-down capabilities, two years of data retention, the ability to ingest existing threat intelligence, playback capabilities, and customizable reports.”
  • “The real power of the platform comes in the form of what it does with that data and how it creates insights in real time.”
  • “The platform allows administrators to focus on compromise assessment and track compromised assets, while also giving actionable insights to administrators, which in turn amounts to full network visibility from the perspective of what is at risk.”
  • “What’s more, the platform offers playback capabilities, where administrators can step through recorded network activity to better understand exactly what happened during a breach or attack”

Conclusion

Ohlhorst considers that Lumu focuses on delivering network visibility. In a world of increasing dwell times, ever-evolving threats, and novel compromises, organizations need to take threat hunting and remediation more seriously. The review concludes that Lumu Insights can give businesses the upper hand in this fight.

Learn how Lumu can help you operate cybersecurity proficiently.

To sign up for Lumu Free, or to upgrade your account to Lumu Insights, visit the Lumu  portal.

Recent Posts

  • Blog

Detecting Cyberattacks Hidden via Anonymization

Reading Time: 4 minsDetecting and stopping attacks using anonymization techniques can give your team the…

5 days ago
  • Blog

Advisory Alert: PowerSchool Data Breach

Reading Time: 4 minsThe December 2024 breach of a student information software solution for K-12…

6 days ago
  • Blog

Lumu & the MSP Community: 2024 in Review

Reading Time: 4 minsLumu has worked hand-in-hand with MSPs throughout a year that consolidated the…

1 month ago
  • Blog

Reflecting on 2024: Lumu’s Innovations in SecOps

Reading Time: 5 minsLumu’s 2024 SecOps advancements focus on automation and smarter threat detection, with…

1 month ago
  • Attacks

Lumu’s Detection & Response to a Real-World DNS Tunneling Attack

Reading Time: 7 minsThis is the story of a serious DNS tunneling attack on a…

1 month ago
  • Events

Cybersecurity Insights for MSPs: Lessons from IT Nation Connect 2024

Reading Time: 4 minsDiscover the top insights from Lumu’s pre-conference workshop at IT Nation Connect,…

2 months ago