Technical

The Custom Collector API: Seamless Metadata Collection

Network metadata collection is a crucial part of Lumu’s Continuous Compromise Assessment. We know that your infrastructure is unique and we are always looking for new ways to make this process as quick and simple as possible for your unique reality. 

Your organization may already be using defense solutions such as Endpoint Detection and Response (EDR) or network monitoring tools as part of their pipelines to centralize their logs. In such cases, integrating these third-party solutions through a collector for Lumu can be appropriate.

Introducing the Custom Collector API

Lumu provides the option to deploy Custom Collectors to seamlessly send your network metadata captured from third-party solutions via our API, while layering real-time Continuous Compromise Assessment.

Benefits of the Custom Collector API

  • Seamless integration with your current infrastructure
  • Frictionless network metadata collection
  • Ability to work alongside other collection options such as Virtual Appliances or Lumu Agents

How can I get more information regarding this API?

If you want to learn more about the Custom Collector API you will find our documentation useful. Here we explain how to manage the collector, work with grouping rules, and the API’s specifications. If you have any questions you can contact our support team at support@lumu.io.

How do I gain access to the Custom Collector API?

If you are a Lumu Insights customer, you are in luck! This capability is included in your current subscription. You can start enjoying the benefits of this API, by clicking here

If you are a Lumu Free customer, we invite you to upgrade your account to access this feature, additional correlation capability, and overall better compromise detection. You can request your upgrade here.

Recent Posts

  • Trends

What You Must Know about AI-Powered Threats in 2026

Reading Time: 5 minsCybercriminals are using AI today to accelerate attacks through deepfakes, smishing, exploit…

5 days ago
  • Attacks

Advisory: The Instructure (Canvas) Breach and K-12 Supply Chain Security

Reading Time: 4 minsThe ongoing Instructure data ransom attack gives adversaries access to sensitive K-12…

1 week ago
  • Trends

How Chromebook Visibility Strengthens Your School’s Cyber Stack

Reading Time: 6 minsEmpower your school's cyber stack by securing 1:1 Chromebooks. Learn how network…

2 weeks ago
  • Trends

Is Your Supply Chain Exposing Your Organization? 4 Security Case Studies

Reading Time: 7 minsNetwork perimeters are no longer static. They grow and shift with third…

4 weeks ago
  • Attacks

Advisory Alert: Remcos RAT Real-Time Surveillance Platform

Reading Time: 7 minsHow does the 2026 Remcos RAT bypass your security to stream live…

1 month ago
  • Trends

RSAC 2026 Recap: The Dawn of the Agentic Era

Reading Time: 3 minsAs RSAC 2026 concludes, Ricardo Villadiego, CEO of Lumu Technologies, reflects on…

1 month ago