Lumu Free Quick Start Guide
Lumu Free is a limited-visibility offering for getting started with the power of Lumu’s Continuous Compromise Assessment™ model. With Lumu Free, you can set up real-time metadata ingestion using Virtual Appliances, Gateways or via Custom Collectors (API).
, Lumu Free does not include a time limit, meaning you can know your compromise level for
as long as you would like
. Check our article
for more details on Lumu subscriptions.
Getting started with cybersecurity projects does NOT have to be a difficult endeavor. Follow these simple steps to set up your network for real-time compromise assessment in minutes:
Open a Lumu Free Account
Create and Configure a Collector
Lumu can be integrated with your infrastructure using different sources of metadata, including DNS queries and packets, Firewall and Proxy logs.
We guide you through
As soon as you open your free account, the Lumu Portal interactive wizard will provide you with further guidance. Following our documentation, you will have your collector deployed in minutes.
You also have the option to take a free short course with video instructions on getting started with Lumu Free in our
After creating and configuring metadata collectors for Lumu, we recommend simulating your first incident.
When you are ready to level up your Lumu experience by having detailed visibility, ingestion of extensive data sources, and more, upgrade to Lumu Insights or Lumu Defender for incorporating Continuous Compromise Assessment into your security operation.
Getting Started with Lumu
This article introduces how Lumu helps you measure and understand your business’s compromise level in real time. If you want to go straight to the deployment documentation, click here. Welcome to Lumu! Lumu Technologies is a breakthrough ...
Take advantage of Lumu Free to understand your compromise level and get visibility into threats, attacks, and adversaries affecting your organization. When greater visibility is desired, you can take advantage of one of the Lumu paid subscriptions: ...
Lumu Deployment and Integration Overview
Throughout this document, we will show you how the features of Lumu can provide you with unprecedented visibility into the adversaries hiding in your network. You will also be able to see how easy it is to incorporate Continuous Compromise ...
Simulate an Incident
Once you have successfully deployed and configured a Collector, and it is already forwarding network metadata from your organization to Lumu, it is time to start seeing Continuous Compromise Assessment™ in action. Lumu processes all collected ...