Why and how long do you store the metadata?
Lumu stores your processed network metadata traffic for Playback™ capabilities, meaning we can compare and match every new indicator of compromise against stored metadata for every customer we are protecting.
With regard to incident metadata, 45 days’ metadata is stored for Lumu Free accounts, while 1 and 2 years of incident metadata storage is included with Lumu Insights and Lumu Defender accounts respectively.
Related Articles
What is the difference between Lumu Free, Lumu Insights and Lumu Defender?
Lumu Free offers a starting point for understanding your compromise level. It is always free and provides network-level visibility of confirmed IoCs (Indicators of Compromise) and retains incident data for 45 days. With Lumu Insights you can ...
What is Lumu Insights?
Your network traffic is your ground zero for illuminating threats and adversaries. Using existing network data sources, Lumu Insights continuously assesses the entire enterprise to determine the level of compromise. Implementing Lumu’s patent-pending ...
How does Lumu measure compromise in real time?
Lumu systematically collects, normalizes, and analyzes a wide range of network metadata, including DNS, Net flows, Proxy, Firewall Access Logs, Inbox and Email Intelligence. The level of visibility that only these data sources provide, allows us to ...
What is the source of your threat intelligence?
We have partnerships with over 70 leading threat intelligence providers. We also offer you the ability to Bring Your Own Threat Intelligence (BYOTI™), through which we can ingest additional IoCs into Lumu’s Illumination Process, using formatting ...
How does Lumu compare to a DNS firewall?
Lumu and DNS firewalls are different technologies, designed with different purposes in mind. For starters, Lumu is a technology that was built from the ground up with a single objective: help to measure and understand your unique compromise level in ...