Technical

The Custom Collector API: Seamless Metadata Collection

Network metadata collection is a crucial part of Lumu’s Continuous Compromise Assessment. We know that your infrastructure is unique and we are always looking for new ways to make this process as quick and simple as possible for your unique reality. 

Your organization may already be using defense solutions such as Endpoint Detection and Response (EDR) or network monitoring tools as part of their pipelines to centralize their logs. In such cases, integrating these third-party solutions through a collector for Lumu can be appropriate.

Introducing the Custom Collector API

Lumu provides the option to deploy Custom Collectors to seamlessly send your network metadata captured from third-party solutions via our API, while layering real-time Continuous Compromise Assessment.

Benefits of the Custom Collector API

  • Seamless integration with your current infrastructure
  • Frictionless network metadata collection
  • Ability to work alongside other collection options such as Virtual Appliances or Lumu Agents

How can I get more information regarding this API?

If you want to learn more about the Custom Collector API you will find our documentation useful. Here we explain how to manage the collector, work with grouping rules, and the API’s specifications. If you have any questions you can contact our support team at support@lumu.io.

How do I gain access to the Custom Collector API?

If you are a Lumu Insights customer, you are in luck! This capability is included in your current subscription. You can start enjoying the benefits of this API, by clicking here

If you are a Lumu Free customer, we invite you to upgrade your account to access this feature, additional correlation capability, and overall better compromise detection. You can request your upgrade here.

Recent Posts

  • Stories

Cybersecurity Trends 2025 and Beyond: Navigating AI-Driven Evasion Techniques and Autonomous Threats for Resilient Defense

Reading Time: 3 minsAs we move into 2025, AI-driven evasion and autonomous threats will redefine…

10 hours ago
  • Trends

CISA Reveals How 12 Ransomware Gangs are Bypassing EDRs

Reading Time: 7 minsEndpoint Detection and Response (EDR) has a critical role in most companies’…

3 weeks ago
  • Trends

Does Infostealer Malware Have US Organizations Under Siege?

Reading Time: 5 minsLumu’s Compromise Report for 2024 uncovers surprising information about how infostealer malware…

4 weeks ago
  • Trends

Lumu Compromise Report 2024: 2 Essential Tips for MSPs to Protect Clients

Reading Time: 4 minsFor MSPs to proactively protect their clients they need good intelligence, such…

1 month ago
  • Technical

The Hidden Pitfalls of Deep Packet Inspection

Reading Time: 6 minsExplore DPI's limitations in network security and discover how Lumu’s cloud-native, metadata-driven…

1 month ago
  • Trends

3 Cybersecurity Trends From the Lumu Compromise Report 2024

Reading Time: 3 minsLumu’s new Compromise Report 2024 reveals the greatest current cybersecurity trends and…

2 months ago