© Lumu Technologies All rights reserved. | Legal information.
Already have an account? Sign in
Sign in
Blocking spam is good, but analyzing it is better. Organizations are generally unaware of what email policies are blocking. By assessing what was in the Email, we can really understand who is trying to attack your organization, how they are trying to do so, and whether they are successful. In addition, you can go back to the network and see which attacks were not blocked by your email security tool.
Lumu and IDPS are different technologies, designed with different purposes in mind. We designed this brief to clarify any questions you may have.
Lumu and EDRs are different technologies, designed with different purposes in mind. We designed this brief to clarify any questions you may have.
Lumu and DNS Firewalls are different technologies, designed with different purposes in mind. We designed this brief to clarify any questions you may have.
Lumu and SIEMs are different technologies, designed with different purposes in mind. We designed this brief to clarify any questions you may have.
Yes, Lumu can illuminate your compromise level no matter where your corporate devices are located. We also offer lightweight desktop agents that can be easily deployed so you can detect adversarial activity from remote devices.
Lumu fits perfectly into any cybersecurity stack. That’s why you have multiple options depending on the devices and tools you have already in place. Generally, the first step is to mitigate the compromise by not allowing the connection to the adversarial infrastructure that Lumu identified, and then eradicate the compromise on the affected asset that can be pinpointed with Lumu as well. In any case, you may find useful our incident response playbooks that offer a step-by-step guide and recommended actions.
Lumu is recognized for its easy cloud-based deployment. Physical appliances are not required to collect network metadata.
We have partnerships with more than 80 threat intelligence providers, including a private alliance with Malware Patrol and VirusTotal. We also offer you the ability to Bring Your Own Threat Intelligence (BYOTI™), which we can ingest into Lumu’s Illumination Process.
Lumu’s Illumination Process™ uses extensive threat intelligence of known indicators of compromise (IoC) and anomalies of interest, we also apply proprietary AI, ML, and deep correlation analysis that allows us to conclude with speed and precision when, and where an adversary is threatening your organization.
Lumu stores metadata for 2 years. This enables us to correlate events from the past to known IoCs
Depending on your tier, there are different methods for collecting metadata through the various IT environments from organizations of any size and complexity.
Your network metadata is the single source of truth regarding your organization’s level of compromise. That’s why Lumu systematically collects, normalizes, and analyzes a wide range of network metadata in real time, including DNS, NetFlow, proxy and firewall access logs, and spambox. These data sources allow us to understand the behavior of your network, which leads to conclusive evidence on your unique compromise level.
Agents are the preferred data collection method for MSPs, however, there are other mechanisms available to cover other deployments. You can learn more about deployment here.
We offer both month to month and yearly commitments. You can see subscription and pricing options with a Lumu for MSP Lite or Lumu MSP account.
MFA is supported by the Lumu portal, you can learn more here.
Yes, the Lumu MSP portal is multi-tenant and multi-view, allowing you to view and manage clients from a single pane of glass. You can switch between client views from a single environment.
An offering that helps MSPs build their MSP cybersecurity practice. This comes with full functionality provided by Lumu for MSPs in a limited quantity as it relates to number of tenants and integrations.
3 tenants with a combined total of 50 endpoints. This version includes 3 integrations per tenant – 1 for data collection, 1 for automated response, and 1 for SecOps.
When you surpass the limit of tenants, endpoints, or integrations included in Lumu for MSPs Lite.
There is no time limit.
Customers on annual plans prepay monthly tracked users for the entire year and receive a discount for their commitment. The annual plan allows you to purchase assets at a lower rate.
Any device connected to the network or monitored by Lumu. This includes laptops, servers, cloud environments, IP cameras and IOTs.
After you pay, we will process the payment and update your account settings according to the subscription selected (this can take up to an hour). Once everything is processed you’ll hear from a Lumu representative who can help guide you through the implementation process as needed.
Yes, Lumu is SOC 2 Type II Compliant.
As Lumu is built to overcome the design issues and problems inherited from legacy solutions, data decryption is not part of what Lumu does. In contrast, Lumu analyzes network metadata only. This metadata typically does not require being decrypted. In addition, since Lumu is a cloud-based solution, the information analyzed is protected by PCI-DSS, HIPAA/HITECH, FedRAMP, GDPR, FIPS 140-2 y NIST 800-171, that helps our customers satisfy compliance requirements for virtually every regulatory agency around the globe. An analogy would be that to identify a terrorist, you wouldn’t need to know the contents of a letter written to a known terrorist leader, merely information written on the envelope.
Since Lumu’s Continuous Compromise Assessment™ only sees network metadata, and no traffic tapping is needed we do not see any confidential information like username, passwords, and the like. The information that we see are IPs, domains, and URLs. Lumu is not interested in knowing the content of communications, we focus only on detecting contacts that should not be happening in the first place. In any case, you can access Lumu’s Privacy Shield certification.
Contact us today to learn how Lumu can transform
your service offerings.