The Custom Collector API: Seamless Metadata Collection

Lumu's new custom collector allows seamless network metadata collection from third-party tools for better, faster compromise assessment.

Network metadata collection is a crucial part of Lumu’s Continuous Compromise Assessment. We know that your infrastructure is unique and we are always looking for new ways to make this process as quick and simple as possible for your unique reality. 

Your organization may already be using defense solutions such as Endpoint Detection and Response (EDR) or network monitoring tools as part of their pipelines to centralize their logs. In such cases, integrating these third-party solutions through a collector for Lumu can be appropriate.

Introducing the Custom Collector API

Lumu provides the option to deploy Custom Collectors to seamlessly send your network metadata captured from third-party solutions via our API, while layering real-time Continuous Compromise Assessment.

The Custom Collector API from Lumu redirects metadata collected by third parties to Lumu for processing

Benefits of the Custom Collector API

  • Seamless integration with your current infrastructure
  • Frictionless network metadata collection
  • Ability to work alongside other collection options such as Virtual Appliances or Lumu Agents

How can I get more information regarding this API?

If you want to learn more about the Custom Collector API you will find our documentation useful. Here we explain how to manage the collector, work with grouping rules, and the API’s specifications. If you have any questions you can contact our support team at [email protected].

How do I gain access to the Custom Collector API?

If you are a Lumu Insights customer, you are in luck! This capability is included in your current subscription. You can start enjoying the benefits of this API, by clicking here

If you are a Lumu Free customer, we invite you to upgrade your account to access this feature, additional correlation capability, and overall better compromise detection. You can request your upgrade here.

Subscribe to Our Blog

Get the latest cybersecurity articles and insights straight from the experts.

Share this post

RELATED POSTS