For starters, Lumu is a technology that was built from the ground up with a single objective: help measure and understand your unique compromise level in real time. This is done via Lumu’s patent-pending
Illumination Process
which systematically collects, normalizes, and analyzes your company’s network metadata, resulting in the identification of enterprise assets in contact with adversarial infrastructure. Simply put, Lumu identifies confirmed compromises.
On the other hand, Gartner defines IDPS as “stand-alone physical and/or virtual appliances that inspect network traffic, either on-premises or in virtualized/public cloud environments. They are often located in the network to inspect traffic that has passed through perimeter security devices, such as firewalls, secure web gateways, and secure email gateways.”
Intrusion Detection System (IDS) is a legacy technology that was created in the early 1980s with the goal of protecting confidential assets from internal users. Over time this technology pivoted to Intrusion Prevention System (IPS) but retained many disadvantages and limitations, including: