This article shows a brief overview of the collectors you can use to incorporate Lumu into your security operation. For detailed information, consult the documentation link included in each collector description, or consult our
deployment and integration guide.
At Lumu, Public Gateways are how we define the network’s public IP addresses which are used to forward traffic to other networks or the internet. Consult our
Gateway documentation on using gateways to associate traffic from your organization to Lumu.
The Lumu Virtual Appliance is a virtualized machine that enables collecting network metadata from your entire enterprise and forwards it to the Lumu cloud with the lowest impact on the network operation. For more details, consult our
Lumu VA documentation.
The Lumu VA offers the option to create
VA Collectors, a seamless way to integrate network metadata (firewall, proxies, etc.), as well as send your DNS logs through the VA instead of the VA built-in resolver.
The Lumu Agent is an endpoint software program provided by Lumu installed on a user's machine and enables the monitoring of remote devices no matter where they are. Lumu Agents run silently while intentionally collecting network metadata to be analyzed by Lumu to measure compromise in real time. For more information, consult our
Lumu Agent documentation.
The Lumu Custom Collectors API allows posting network metadata captured from third-party platforms/services/appliances to Lumu for real-time and Continuous Compromise Assessment. It can also be used as an alternative for greater visibility in cases where the enterprise network restricts the use of Virtual Appliances. For more details, consult the
Custom Collectors API documentation.