Does Lumu Email do any spam filtering?
No. Spam filtering and Lumu Email are two vastly different solutions.
Spam filtering solutions are intended to block all malicious content. With Lumu you implement the following principle: blocking spam is good, analyzing it is better, continuously, and intentionally hunting for compromises and connecting the dots of the full compromise life-cycle.
Lumu breaks down your organization’s level of compromise in real time and provides a factual context for each step of the compromise life-cycle through a continuous collection and analysis of your network metadata that includes DNS, netflows, proxy & firewall access logs, inbox and spambox. These data streams tell your unique story, and Lumu correlates them against each other, so we can definitively illuminate your compromised IT assets and provide concrete evidence and context of every step the adversary is taking in your network infrastructure.
Check out our Lumu Email documentation
for general guidance and configuration.
How does Lumu measure compromise in real time?
Lumu systematically collects, normalizes, and analyzes a wide range of network metadata, including DNS, Net flows, Proxy, Firewall Access Logs, Inbox and Spambox. The level of visibility that only these data sources provide, allows us to understand ...
What is the difference between Lumu Free, Lumu Insights and Lumu Defender?
Lumu Free offers a starting point for understanding your compromise level. It is always free and provides network-level visibility of confirmed IoCs (Indicators of Compromise) and retains incident data for 45 days. With Lumu Insights you can ...
What is Continuous Compromise Assessment?
Lumu’s Continuous Compromise Assessment is a patent-pending model that enables organizations to measure their unique compromise levels, using their own network metadata. This model allows you to identify when, where, and how your infrastructure is ...
Lumu Notification Emails
The Lumu Portal notification system makes compromise intelligence much more consumable and shareable. In this article, we describe the email format of the notifications. The notification e-mails are incident-centric and will be sent for each new ...
What is Lumu Insights?
Your network traffic is your ground zero for illuminating threats and adversaries. Using existing network data sources, Lumu Insights continuously assesses the entire enterprise to determine the level of compromise. Implementing Lumu’s patent-pending ...