What is the difference between Lumu Free and Lumu Insights?
Lumu Free offers a starting point for understanding your compromise by level providing limited visibility of confirmed IoCs (Indicators of Compromise) as it only processes DNS metadata and retains data for 45 days.
With Lumu Insights you can incorporate Continuous Compromise Assessment into your security operation. This tier allows you to have unlimited Virtual Appliances that serve as collectors of network metadata providing detailed visibility into confirmed IoCs, automatic and real time ingestion of extensive metadata sources: DNS, net flows, access logs, and spam box, up to 2 years of data retention, ability to ingest existing threat intelligence (BYOTI), sophisticated attack pattern recognition and flexible reporting capabilities, as well as Playback(™) capabilities.
What is Continuous Compromise Assessment?
Lumu’s Continuous Compromise Assessment is a patent-pending model that enables organizations to measure their unique compromise levels, using their own network metadata. This model allows you to identify when, where, and how your infrastructure is ...
What is Lumu Insights?
Your network traffic is your ground zero for illuminating threats and adversaries. Using existing network data sources, Lumu Insights continuously assesses the entire enterprise to determine the level of compromise. Implementing Lumu’s patent-pending ...
I have Lumu Free, how can I get the Spambox feature?
If you are a Lumu Free customer, the ability to ingest and analyze spambox metadata can be enabled as an add-on or you can upgrade to Lumu Insights, which offers you additional correlation capabilities, and overall better compromise detection. To ...
I have Lumu Free, how can I get the Agent as an add-on?
If you are a Lumu Free customer, the ability to deploy agents can be enabled as an add-on or you can upgrade to Lumu Insights, which offers you additional correlation capabilities, and overall better compromise detection. To request the Lumu Agent ...
How does Lumu measure compromise in real time?
Lumu systematically collects, normalizes, and analyzes a wide range of network metadata, including DNS, Net flows, Proxy, Firewall Access Logs, and Spambox. The level of visibility that only these data sources provide, allows us to understand the ...