Lumu Customers’ Top 5 Aha! Moments

Introducing Lumu to potential customers is always a rewarding experience. Customer Engagement Specialist Crystle-Day Villanueva frequently gets to show Lumu to prospective clients. We asked her what they find to be the top 5 pleasantly surprising features.

Leveraging Network Metadata

Customers love that Lumu makes use of metadata. It’s something every organization produces, but doesn’t make use proper use of.  Unlocking the value of metadata from a wide range of sourcesincluding DNS, Network Flows, Proxy logs, Firewall Logs and spammeans Lumu can assess compromise continuously without being resource-intensive. The elegance of the solution is clear to see.

Metadata collected by Lumu

Straightforward Portal

Lumu was designed with the end-user in mind. In a world where the skills and time of cybersecurity analysts are in huge demand, our portal demands less of either. With its intuitive navigation, no special training is required. Even the newest inductees to the world of cybersecurity can see how the Lumu portal immediately shows value.

The Lumu portal being presented on a tablet

Providing Context on Compromises

When most solutions identify a compromise, the question ‘What’s next?’ is left hanging in the air. With Lumu, customers can see the information needed for answering that question at speed. Each compromise is contextualized with visualizations that reveal its behavior patterns as well as internal and external resources that highlight the severity of the threat

The Compromise Context section of the Lumu Portal

Organized Gateways

With lumu you can group your network traffic gateways into different labels. Each label can represent a department, geographic region or office, as makes the most sense for your unique network infrastructure. Being able to take special care of critical assets or assign certain users to different areas is clearly transformative.

Spambox Is a Game Changer

One customer said: “I can’t believe I was only blocking spam, when it offers so much intel.” Blocking Spam is good, but analyzing it is better. Lumu correlates spam metadata with other threat sources to clearly show users how their organization is being targeted, who the attackers are, and how successful they are.

The Spambox section of the Lumu Portal

If you would like to join a live training session on how to take advantage of the intelligence provided by the Lumu portal, sign up for a free session in English or Spanish.

Share this post

Share on facebook
Share on twitter
Share on linkedin
Share on whatsapp
Share on email

RELATED POSTS

Julian Brown

Life@Lumu: The Illumination Summit Team

LIfe@Lumu gives you an insight into what it’s like to be an Illuminator. After the success of the most recent Illumination Summit, we sat down with the team that made it happen.