Technical

The Custom Collector API: Seamless Metadata Collection

Network metadata collection is a crucial part of Lumu’s Continuous Compromise Assessment. We know that your infrastructure is unique and we are always looking for new ways to make this process as quick and simple as possible for your unique reality. 

Your organization may already be using defense solutions such as Endpoint Detection and Response (EDR) or network monitoring tools as part of their pipelines to centralize their logs. In such cases, integrating these third-party solutions through a collector for Lumu can be appropriate.

Introducing the Custom Collector API

Lumu provides the option to deploy Custom Collectors to seamlessly send your network metadata captured from third-party solutions via our API, while layering real-time Continuous Compromise Assessment.

Benefits of the Custom Collector API

  • Seamless integration with your current infrastructure
  • Frictionless network metadata collection
  • Ability to work alongside other collection options such as Virtual Appliances or Lumu Agents

How can I get more information regarding this API?

If you want to learn more about the Custom Collector API you will find our documentation useful. Here we explain how to manage the collector, work with grouping rules, and the API’s specifications. If you have any questions you can contact our support team at support@lumu.io.

How do I gain access to the Custom Collector API?

If you are a Lumu Insights customer, you are in luck! This capability is included in your current subscription. You can start enjoying the benefits of this API, by clicking here

If you are a Lumu Free customer, we invite you to upgrade your account to access this feature, additional correlation capability, and overall better compromise detection. You can request your upgrade here.

Recent Posts

  • Trends

Introducing Lumu Autopilot: Autonomous Cybersecurity Operations

Reading Time: 5 mins Introducing Lumu Autopilot, the latest innovation that delivers on our promise…

1 week ago
  • Attacks

PAN-OS Firewall Vulnerability Advisory: Perimeter Defense Breakdown

Reading Time: 4 mins The Palo Alto Networks PAN-OS firewall vulnerability exemplifies critical flaws in…

2 weeks ago
  • Attacks

ConnectWise ScreenConnect 23.9.8 Advisory Alert: Tool for Vulnerability Check

Reading Time: 2 mins Efficiently confirm and address ConnectWise ScreenConnect vulnerabilities with our guide and…

2 months ago
  • Attacks

LockBit Takedown: Advisory Alert

Reading Time: 7 mins LockBit takedown news and guidance: arrests made, resilience shown, and future…

2 months ago
  • Trends

The Struggle to Afford SOC Analyst Salaries

Reading Time: 3 mins Explore the challenges faced by a wide range of organizations in…

3 months ago
  • Attacks

Infostealers: The Silent Threat Compromising the World One Password at a Time

Reading Time: 7 mins Explore how Infostealers compromise global security, silently stealing data and offering…

3 months ago