Learn more about Lumu deployment and integration

Lumu Offerings

As described in our Get Started article, all successful attacks have a common denominator: the cybercriminal must use the network.

Lumu covers from simple to complex infrastructures collecting network metadata from your extended perimeter through a variety of collectors such as installed agents, public gateways, API collection, and pre-configured Virtual Appliances that can be deployed on virtual machines or cloud platforms. The collectors then relay the collected data to Lumu for Continuous Compromise Assessment.

Watch the following video and get familiar with the general deployment architecture of Lumu:


Select How to Deploy Lumu

Send your metadata for Continuous Compromise Assessment by Lumu using one or a combination of collectors. The selection of how to implement Lumu depends on your needs and how you want to integrate Lumu into your infrastructure.

Take advantage of Lumu Free for starting to understand your compromise level and to get visibility into threats, attacks, and adversaries affecting your enterprise. When greater visibility is desired, implement network metadata collectors inside your network infrastructure with Lumu Insights . Lumu Defender completes Lumu’s vision of closing the feedback loop in cybersecurity by adding the ability to integrate Lumu’s real-time analysis into your security stack for mitigation and orchestration.

Lumu Free - Start Understanding your Compromise Level

Lumu Free offers a freemium account to taste the Continuous Compromise Assessment through limited network metadata collection. It takes about 5 minutes to set up Lumu Free and you can start seeing DNS traffic immediately by using Gateways.

Lumu Free is permanently offered at no cost; it is not a limited-time free trial. You may set up your account now and keep it for as long as you like.
Lumu Free - start understanding your compromise levelLumu Free - start understanding your compromise level.
Lumu Free includes:
  1. Real-time DNS ingestion using Lumu gateways as a collector for Continuous Compromise Assessment
  2. Network-level visibility of confirmed indicators of compromise (IoCs)
  3. Access to Lumu Portal, including Compromise Context, network traffic grouping, business priority, and incident management.
  4. 45-day incident retention
  5. Lumu Academy
  6. Email support

Lumu Insights - Incorporate the Continuous Compromise Assessment into Your Security Operation

Lumu Insights offers detailed visibility with your security operation. With Lumu Insights, you can deploy Agents, Spambox, Custom Connectors API, and unlimited Virtual Appliances for 360-degree visibility that continuously assesses and highlights your network compromise.

Lumu Insights provides you with unprecedented visibility into the detailed malicious activity of each private IP address in your network in real time. Lumu Insights can tell you exactly where the IoCs are located to help you eradicate compromises.
Lumu Insights and its collector’s variety.
With Lumu Insights, besides all features available in Lumu Free, you also have:
  1. Seamless integration with your current infrastructure for automatic and real-time ingestion of extensive metadata sources: DNS, netflows, access logs, and spam box.
  2. Custom data collection via API
  3. Unlimited Virtual Appliances for on-premise and Cloud data collection
  4. Remote endpoint monitoring and compromised assets pinpointed
  5. Bring Your Own Threat Intelligence
  6. Sophisticated attack pattern recognition with asset level visibility
  7. The automated MITRE ATT&CK Matrix
  8. Email & Telephone Support.
  9. 1 year of incident retention
  10. STIXX Module and Single Sign On on the Lumu Portal
  11. Lumu-to-SIEM Alert Integrations

Lumu Defender - Closing the Feedback Loop in Cybersecurity

A genuinely proficient cybersecurity operation requires collecting information on the cybersecurity architecture’s performance and using that information to improve the system continuously. Lumu already measures the output of the system: its level of compromise. Now, with Lumu Defender, you can augment the capabilities of current cybersecurity investments with confirmed compromise information.

Lumu Defender includes all the features offered by Lumu Insights, plus adds the ability to integrate Lumu’s real-time analysis into automated responses and up to 2 years of data retention with flexible reporting capabilities (Playback).
Sending the confirmed compromise instances collected by Lumu allows SOC teams to operationalize the concept of ‘block first, and investigate later.’ The SOC team will always be the ultimate decision maker. However, through automation, the threat actor’s window of opportunity can be drastically shortened, especially in cases where the attack occurs outside of normal working hours.
Lumu Defender and its integrations capabilities.Lumu Defender and its integrations capabilities.
To know more about the different options to take advantage of Lumu and pricing, consult our website .

Next Steps

Now that you know our illumination options, it is time to set up your environment. We created step-by-step guides to help you have Lumu illuminating your environment in minutes.
  1. Lumu Free Guide
  2. Lumu Deployment and Integration Guide
        • Related Articles

        • Lumu Free Guide

          As we show in our Lumu offerings article, Lumu Free is a limited-visibility offering for getting started with the power of Lumu’s Continuous Compromise Assessment model. With Lumu Free you can set up real-time DNS ingestion using Lumu Gateways. ...
        • Lumu Deployment and Integration Guide

          Incorporate the Continuous Compromise Assessment into Your Security Operation. As we show in our Lumu Offerings article, when greater visibility is desired, it's necessary to insert network metadata collectors inside your network infrastructure. Lumu ...
        • Getting Started with Lumu

          In this article, we introduce you to all you need to know about using Lumu to measure and understand your business’s compromise level in real time. If you want to go straight to the deployment documentation, click here. Welcome to Lumu! Lumu ...