Collectors of Network Metadata - Lumu Portal

Collectors and Integrations

Lumu simplifies Continuous Compromise Assessment by consolidating its management, reporting, and related contextual intelligence within a single portal. Security teams no longer need to chase down data from multiple network monitoring tools.
Lumu offers a variety of collector options for sending your network metadata. Depending on your needs and how you want to integrate Lumu into your infrastructure, you can choose a combination of collectors to cover all your enterprise perimeters.
Variety of collectors available at LumuVariety of collectors available at Lumu
In this section of the Lumu Portal, you can manage the available collector types such as Gateways, Virtual Appliances, Agents, and API.

This article shows a brief overview of the collectors you can use to incorporate Lumu into your security operation. For detailed information, consult the documentation link included in each collector description, or consult our deployment and integration guide.

Note: some features, such as end-point level visibility, Custom Collectors and Integrations are only available for Lumu PRO subscriptions, consult our website for more details.

Gateways

At Lumu, Public Gateways are how we define the network’s public IP addresses, which are used to forward traffic to other networks or the internet. Consult our Gateway documentation on using gateways to associate traffic from your organization to Lumu.

Gateways Management - Lumu PortalGateways Management

Virtual Appliances and VA Collectors

The Lumu Virtual Appliance is a virtualized machine that enables collecting network metadata from your entire enterprise and forwards it to the Lumu cloud with the lowest impact on the network operation. For more details, consult our Lumu VA documentation.

Virtual Appliances management - Lumu PortalVirtual Appliances management

The Lumu VA offers the option to create VA Collectors, a seamless way to integrate network metadata (firewall, proxies, etc.), as well as send your DNS logs through the VA instead of the VA built-in resolver.

Agents

The Lumu Agent is an endpoint software program provided by Lumu installed on a user's machine and enables the monitoring of remote devices no matter where they are. Lumu Agents run silently while intentionally collecting network metadata to be analyzed by Lumu to measure compromise in real time. For more information, consult our Lumu Agent documentation.

Agent management - Lumu PortalLumu Agent management
For organizations with a remote workforce, Lumu has the option to implement the Continuous Compromise Assessment concept for remote workers using VPN (Virtual Private Network) or SDP (Software Defined Perimeter) technologies as well. For detailed guidance, consult our documentation.

Custom Collectors API

The Lumu Custom Collectors API allows posting network metadata captured from third-party platforms/services/appliances to Lumu for real-time and Continuous Compromise Assessment. It can also be used as an alternative for greater visibility in cases where the enterprise network restricts the use of Virtual Appliances. For more details, consult the Custom Collectors API documentation.

Custom Collectors API management - Lumu PortalCustom Collectors API management

Integrations

This section of the Lumu Portal allow customers to easily setup Lumu to feed confirmed compromise instances into any third-party tool for automated mitigation and remediation. Take advantage of our vendor-agnostic integrations to send Lumu’s confirmed compromise instances to any third-party tool for automated mitigation and remediation.
In the Integrations' section of the Lumu Portal, you can find the “API” area for custom integrations and the “Apps” area for out-of-the-box integrations for easy deploy and management. For more details, consult the Integration's documentation.
Integrations managementIntegrations management

Know more about the Lumu Portal:
  1. Incidents
  2. Compromise Overview
  3. Labels
  4. Lumu Email
        • Related Articles

        • Lumu Portal

          Lumu simplifies Continuous Compromise Assessment by consolidating its management, reporting, and related contextual intelligence within a single portal. Security teams no longer need to chase down data from multiple network monitoring tools. The Lumu ...
        • How to configure SSO in the Lumu Portal using Okta

          Single Sign-on (SSO) allows you to log in to the Lumu portal through Identity Providers using their current credentials. Instead of requiring users to manage multiple usernames and passwords, SSO allows you to log in to multiple applications using ...
        • Lumu Email Intelligence

          Lumu simplifies Continuous Compromise Assessment by consolidating its management, reporting, and related contextual intelligence within a single portal. Security teams no longer need to chase down data from multiple network monitoring tools. In this ...
        • Lumu Portal Two-Factor Authentication

          The Lumu Portal offers secure login alternatives through the use of two-factor authentication (2FA), in this case, One-time Password (OTP) on top of your account password. You can use the Authenticator app you prefer, such as Google Authenticator and ...
        • How to configure SSO in the Lumu Portal using Thales (Safenet Trusted Access)

          Prerequisites Before you can configure Single Sign-On (SSO) integration with the Lumu Portal using Thales, ensure that you have the following: Administrator access to your Thales account. Lumu Support has provided you with the necessary instructions ...