What is Continuous Compromise Assessment?

What is Continuous Compromise Assessment?

Lumu’s Continuous Compromise Assessment is a patent-pending model that enables organizations to measure their unique compromise levels, using their own network metadata. This model allows you to identify when, where, and how your infrastructure is communicating with adversaries. Learn more about Continuous Compromise Assessment in our getting started documentation.

For a more in-depth look at Lumu’s path to Continuous Compromise Assessment, check out our whitepaper.

        • Related Articles

        • What does Lumu do?

          This is a brief comparison between what Lumu offers versus the capabilities Lumu may work with, but does not directly offer: Do Don’t Continuous Compromise Assessment Network Performance Analysis Implement “Assume you are Compromised” Strategy ...
        • What is Lumu Insights?

          Your network traffic is your ground zero for illuminating threats and adversaries. Using existing network data sources, Lumu Insights continuously assesses the entire enterprise to determine the level of compromise. Implementing Lumu’s patent-pending ...
        • How does Lumu measure compromise in real time?

          Lumu systematically collects, normalizes, and analyzes a wide range of network metadata, including DNS, Net flows, Proxy, Firewall Access Logs, Inbox and Spambox. The level of visibility that only these data sources provide, allows us to understand ...
        • How do you know what is (and isn't) a malicious domain or IP?

          Our Illumination Process uses extensive threat intelligence of known and confirmed compromises. We also apply proprietary Artificial Intelligence and Machine Learning technology and deep correlation analysis that allows us to conclude when there is a ...
        • I am worried about privacy, is Lumu able to see all the data that goes through my network?

          We only see network metadata, which means that we do not see any confidential information like passwords. The information that we see are IPs and hostnames. All other information is discarded. To run Continuous Compromise Assessment, we do not need ...