Technical

The Custom Collector API: Seamless Metadata Collection

Network metadata collection is a crucial part of Lumu’s Continuous Compromise Assessment. We know that your infrastructure is unique and we are always looking for new ways to make this process as quick and simple as possible for your unique reality. 

Your organization may already be using defense solutions such as Endpoint Detection and Response (EDR) or network monitoring tools as part of their pipelines to centralize their logs. In such cases, integrating these third-party solutions through a collector for Lumu can be appropriate.

Introducing the Custom Collector API

Lumu provides the option to deploy Custom Collectors to seamlessly send your network metadata captured from third-party solutions via our API, while layering real-time Continuous Compromise Assessment.

Benefits of the Custom Collector API

  • Seamless integration with your current infrastructure
  • Frictionless network metadata collection
  • Ability to work alongside other collection options such as Virtual Appliances or Lumu Agents

How can I get more information regarding this API?

If you want to learn more about the Custom Collector API you will find our documentation useful. Here we explain how to manage the collector, work with grouping rules, and the API’s specifications. If you have any questions you can contact our support team at support@lumu.io.

How do I gain access to the Custom Collector API?

If you are a Lumu Insights customer, you are in luck! This capability is included in your current subscription. You can start enjoying the benefits of this API, by clicking here

If you are a Lumu Free customer, we invite you to upgrade your account to access this feature, additional correlation capability, and overall better compromise detection. You can request your upgrade here.

Recent Posts

  • Blog

Lumu & the MSP Community: 2024 in Review

Reading Time: 4 minsLumu has worked hand-in-hand with MSPs throughout a year that consolidated the…

4 days ago
  • Blog

Reflecting on 2024: Lumu’s Innovations in SecOps

Reading Time: 5 minsLumu’s 2024 SecOps advancements focus on automation and smarter threat detection, with…

6 days ago
  • Attacks

Lumu’s Detection & Response to a Real-World DNS Tunneling Attack

Reading Time: 7 minsThis is the story of a serious DNS tunneling attack on a…

1 week ago
  • Events

Cybersecurity Insights for MSPs: Lessons from IT Nation Connect 2024

Reading Time: 4 minsDiscover the top insights from Lumu’s pre-conference workshop at IT Nation Connect,…

4 weeks ago
  • Stories

Cybersecurity Trends 2025 and Beyond: Navigating AI-Driven Evasion Techniques and Autonomous Threats for Resilient Defense

Reading Time: 2 minsAs we move into 2025, AI-driven evasion and autonomous threats will redefine…

1 month ago
  • Trends

CISA Reveals How 12 Ransomware Gangs are Bypassing EDRs

Reading Time: 7 minsEndpoint Detection and Response (EDR) has a critical role in most companies’…

2 months ago