Trends

Lumu Customers’ Top 5 Aha! Moments

Introducing Lumu to potential customers is always a rewarding experience. Customer Engagement Specialist Crystle-Day Villanueva frequently gets to show Lumu to prospective clients. We asked her what they find to be the top 5 pleasantly surprising features.

Leveraging Network Metadata

Customers love that Lumu makes use of metadata. It’s something every organization produces, but doesn’t make use proper use of.  Unlocking the value of metadata from a wide range of sourcesincluding DNS, Network Flows, Proxy logs, Firewall Logs and spammeans Lumu can assess compromise continuously without being resource-intensive. The elegance of the solution is clear to see.

Straightforward Portal

Lumu was designed with the end-user in mind. In a world where the skills and time of cybersecurity analysts are in huge demand, our portal demands less of either. With its intuitive navigation, no special training is required. Even the newest inductees to the world of cybersecurity can see how the Lumu portal immediately shows value.

Providing Context on Compromises

When most solutions identify a compromise, the question ‘What’s next?’ is left hanging in the air. With Lumu, customers can see the information needed for answering that question at speed. Each compromise is contextualized with visualizations that reveal its behavior patterns as well as internal and external resources that highlight the severity of the threat

Organized Gateways

With lumu you can group your network traffic gateways into different labels. Each label can represent a department, geographic region or office, as makes the most sense for your unique network infrastructure. Being able to take special care of critical assets or assign certain users to different areas is clearly transformative.

Spambox Is a Game Changer

One customer said: “I can’t believe I was only blocking spam, when it offers so much intel.” Blocking Spam is good, but analyzing it is better. Lumu correlates spam metadata with other threat sources to clearly show users how their organization is being targeted, who the attackers are, and how successful they are.

Experience the Lumu Portal for yourself when you open a Lumu Free account

Recent Posts

  • Blog

Lumu & the MSP Community: 2024 in Review

Reading Time: 4 minsLumu has worked hand-in-hand with MSPs throughout a year that consolidated the…

4 days ago
  • Blog

Reflecting on 2024: Lumu’s Innovations in SecOps

Reading Time: 5 minsLumu’s 2024 SecOps advancements focus on automation and smarter threat detection, with…

6 days ago
  • Attacks

Lumu’s Detection & Response to a Real-World DNS Tunneling Attack

Reading Time: 7 minsThis is the story of a serious DNS tunneling attack on a…

1 week ago
  • Events

Cybersecurity Insights for MSPs: Lessons from IT Nation Connect 2024

Reading Time: 4 minsDiscover the top insights from Lumu’s pre-conference workshop at IT Nation Connect,…

4 weeks ago
  • Stories

Cybersecurity Trends 2025 and Beyond: Navigating AI-Driven Evasion Techniques and Autonomous Threats for Resilient Defense

Reading Time: 2 minsAs we move into 2025, AI-driven evasion and autonomous threats will redefine…

1 month ago
  • Trends

CISA Reveals How 12 Ransomware Gangs are Bypassing EDRs

Reading Time: 7 minsEndpoint Detection and Response (EDR) has a critical role in most companies’…

2 months ago