Why and how long does Lumu store the metadata?

Why and how long do you store the metadata?

Lumu stores your processed network metadata traffic for Playback™ capabilities, meaning we can compare and match every new indicator of compromise against stored metadata for every customer we are protecting.

With regard to incident metadata, 45 days’ metadata is stored for Lumu Free accounts, while 1 and 2 years of incident metadata storage is included with Lumu Insights and Lumu Defender accounts respectively.

To know more about our illumination options, visit Lumu Offerings.

        • Related Articles

        • What is the difference between Lumu Free, Lumu Insights and Lumu Defender?

          Lumu Free offers a starting point for understanding your compromise level. It is always free and provides network-level visibility of confirmed IoCs (Indicators of Compromise) and retains incident data for 45 days. With Lumu Insights you can ...
        • What is Lumu Insights?

          Your network traffic is your ground zero for illuminating threats and adversaries. Using existing network data sources, Lumu Insights continuously assesses the entire enterprise to determine the level of compromise. Implementing Lumu’s patent-pending ...
        • How does Lumu measure compromise in real time?

          Lumu systematically collects, normalizes, and analyzes a wide range of network metadata, including DNS, Net flows, Proxy, Firewall Access Logs, and Spambox. The level of visibility that only these data sources provide, allows us to understand the ...
        • How is the network metadata collected?

          You may use Lumu’s public DNS as forwarders on your internal DNS Servers. Lumu also provides virtual appliances, cloud collectors, agents, spambox and custom collectors (API) to cover your hybrid environments. Consult our deployment documentation for ...
        • What is the source of your threat intelligence?

          We have partnerships with over 70 leading threat intelligence providers. We also offer you the ability to Bring Your Own Threat Intelligence (BYOTI™), through which we can ingest additional IoCs into Lumu’s Illumination Process. Learn more about the ...