Collector | Logo
|
| |
| |
| |
| |
| |
| |
Collect Firewall Metadata with Lumu VA and Check Point |
|
Collect Firewall Metadata with Lumu VA and pfSense
|
|
Collect Firewall Metadata with Lumu VA and Zscaler Cloud
|
|
Collect Firewall Metadata with Lumu VA and Sophos | |
Collect Firewall Metadata with Lumu VA and Barracuda CloudGen | |
Collect Firewall Metadata with Lumu VA and Forcepoint NGFW | |
Collect Firewall Metadata with Lumu VA and Packetbeat |
The Lumu Virtual Appliance (VA) offers the option to create Collectors, a seamless way to integrate with network metadata of your entire enterprise and forward it to the Lumu cloud with the lowest impact on the network operation .
In cases where the attacks avoid domain resolution, the traces of
adversarial contact can lie in the access logs of firewalls. This option
is also available for accommodating networks where DNS configuration is
not possible. In this scenario, the firewall forwards the logs to
Lumu’s VA for processing traffic. If the firewall has URL filtering
enabled, and the URLs can be included in the logs, all the IT assets
using the firewall would be monitored. This approach ensures compromise
visibility without having to make major changes.