Lumu Comes in Different Forms
Lumu FreeNo credit card required |
Most Popular Insights$6 $4.80 $3.84 $3.07 $2.46 $1.97 0 1,000 Assets+
Learn more about what constitutes an asset here.
Number of assets:
Need more information? |
Defender$9 $7.20 $5.76 $4.61 $3.69 $2.95 0 1,000 Assets+
Learn more about what constitutes an asset here.
Number of assets:
Need more information? |
|
Open FREE Account | Start Now | Start Now | |
Metadata Collection | |||
Metadata Collection | |||
DNS Ingestion | |||
DNS Ingestion | |||
Firewall Access Logs | |||
Firewall Access Logs | |||
Proxy Access Logs | |||
Proxy Access Logs | |||
Spambox | |||
Spambox | |||
Netflow | |||
Netflow | |||
Data Collection via API (aka Custom Collector) | |||
Data Collection via API (aka Custom Collector) | One | Unlimited | Unlimited |
Agent for Remote Workers | |||
Agent for Remote Workers | |||
Data Collectors | |||
Data Collectors | Two | Unlimited Virtual Appliances | Unlimited Virtual Appliances |
Cloud Collector | |||
Cloud Collector | |||
Strategic Compromise Intelligence | |||
Strategic Compromise Intelligence | |||
Confirmed Compromise Visibility | |||
Confirmed Compromise Visibility | Network-level Visibility
Allows you to detect if your infrastructure is compromised and identify adversarial activity. This is the first step towards reaching a zero-compromise status.
|
Asset-level Visibility
Gives you richer context on compromise distribution with exact identification of compromised assets and adversarial IoCs.
|
Asset-level Visibility
Gives you richer context on compromise distribution withexact identification of compromised assets, adversarial IoCs, and automated response capabilities.
|
Compromise Context | |||
Compromise Context | Limited | Unlimited | Unlimited |
Compromise Activity & Distribution | |||
Compromise Activity & Distribution | Limited | Unlimited | Unlimited |
Network Traffic Grouping | |||
Network Traffic Grouping | |||
Business Priority | |||
Business Priority | |||
Incident Management | |||
Incident Management | |||
Bring Your Own Threat Intelligence | |||
Bring Your Own Threat Intelligence | |||
Incident Retention | |||
Incident Retention | 45 days | 1 year | 2 years |
Integrations | |||
Integrations | |||
Out-of-the-Box Data Collection | |||
Out-of-the-Box Data Collection | |||
Out-of-the-Box SecOps | |||
Out-of-the-Box SecOps | |||
Out-of-the-Box Response | |||
Out-of-the-Box Response | |||
Response via API | |||
Response via API | |||
Training & Support | |||
Training & Support | |||
Lumu Academy | |||
Lumu Academy | |||
Technical Support | |||
Technical Support | Email Support | Email & Telephone Support 9-5 ET, M-F. | Email & Telephone Support 9-5 ET, M-F. |
Advanced Features | |||
Advanced Features | |||
Single Sign-on | |||
Single Sign-on | |||
Playback | |||
Playback | |||
STIX Module | |||
STIX Module | |||
Lumu-to-SIEM Alert Integrations | |||
Lumu-to-SIEM Alert Integrations |
Contact Sales
Have questions about pricing or plans? Fill out the form and a sales representative will be in touch shortly.