Lumu simplifies Continuous Compromise Assessment by consolidating its management, reporting, and related contextual intelligence within a single portal. Security teams no longer need to chase down data from multiple network monitoring tools.
Lumu offers a variety of collector options for sending your network metadata. Depending on your needs and how you want to integrate Lumu into your infrastructure, you can choose a combination of collectors to cover all your enterprise perimeters.
In this section of the Lumu Portal, you can manage the available collector types such as Agents, Virtual Appliances, Gateways and custom API collectors.
This article shows a brief overview of the collectors you can use to incorporate Lumu into your security operation. For detailed information on each collector, consult the documentation link included in each collector description, or consult our deployment and integration guide.
Note that some features, such as end-point level visibility, Custom Collectors and Integrations are only available for paid Lumu subscriptions, consult our website for more details [Add link].
The Lumu Agent is an endpoint software program provided by Lumu installed on a user's machine and enables the monitoring of remote devices no matter where they are. Lumu Agents run silently while intentionally collecting network metadata to be analyzed by Lumu to measure compromise in real time. For more information, consult our Lumu Agent documentation
For organizations with a remote workforce, Lumu has the option to implement the Continuous Compromise Assessment concept for remote workers using VPN (Virtual Private Network) or SDP (Software Defined Perimeter) technologies as well. For detailed guidance, consult VPN and SDP Configuration.
Each Log Forwarder can handle up to five metadata collectors. Lumu has a constantly growing list of supported vendors. To learn more about Log Forwarders, how to use them, and supported technologies, please consult the Log Forwarder documentation.
This section of the Lumu Portal allows customers to easily setup Lumu to feed confirmed compromise instances into any third-party tool for automated mitigation and remediation.
Here, you will find two options, API and Apps.
API refers to the Lumu Defender API, a powerful interface that allows Lumu to bring Continuous Compromise Assessment to any third-party vendor.
Apps refers to one of Lumu’s most powerful tools, Out-of-the-Box Integrations. These are integrations that are ready to communicate with the most popular cybersecurity vendors, enabling Lumu to operate as an essential part of any cybersecurity stack with just a couple of clicks.
For more details, consult our documentation on Integrations.
Explore more about the Lumu Portal: