About Lumu
Which Internet Browser versions can I use to access the Lumu Portal?
The Lumu Portal is designed to fully function on the most common and widely used browsers. It is worth noting that each browser is frequently updated and maintained by its respective developer. This means that accessing the Lumu Portal from older ...
Is Lumu similar to an IDPS?
Lumu and IDPS are different technologies from different eras, designed with different purposes in mind. For starters, Lumu is a technology that was built from the ground up with a single objective: help measure and understand your unique compromise ...
Can Lumu replace the DNS Firewall?
DNS firewalls and Lumu are solutions used to address different challenges. Lumu can add incredible value to the security strategy of your organization whether you have a DNS firewall or not. Organizations that have not invested in a DNS firewall find ...
How can Lumu and DNS Firewalls work together?
If your company already has a DNS firewall like OpenDNS (currently, Cisco Umbrella), Infoblox, or the like, Lumu seamlessly integrates with your DNS firewall to continue to benefit from blocking malicious DNS requests, while layering real-time ...
How does Lumu compare to a DNS firewall?
Lumu and DNS firewalls are different technologies, designed with different purposes in mind. For starters, Lumu is a technology that was built from the ground up with a single objective: help to measure and understand your unique compromise level in ...
What is Lumu Insights?
Your network traffic is your ground zero for illuminating threats and adversaries. Using existing network data sources, Lumu Insights continuously assesses the entire enterprise to determine the level of compromise. Implementing Lumu’s patent-pending ...
How do I configure Lumu?
Follow these simple steps to set up your network for real-time compromise assessment in minutes: Open a Lumu Free Account Create your Lumu Free account at portal.lumu.io . Create and Configure a Collector Deploy the best collector type for ...
What is the difference between Lumu Free, Lumu Insights and Lumu Defender?
Lumu Free offers a starting point for understanding your compromise level. It is always free and provides network-level visibility of confirmed IoCs (Indicators of Compromise) and retains incident data for 45 days. With Lumu Insights you can ...
I am worried about privacy, is Lumu able to see all the data that goes through my network?
We only see network metadata, which means that we do not see any confidential information like passwords. The information that we see are IPs and hostnames. All other information is discarded. To run Continuous Compromise Assessment, we do not need ...
How do you know what is (and isn't) a malicious domain or IP?
Our Illumination Process uses extensive threat intelligence of known and confirmed compromises. We also apply proprietary Artificial Intelligence and Machine Learning technology and deep correlation analysis that allows us to conclude when there is a ...
What is the source of your threat intelligence?
We have partnerships with over 70 leading threat intelligence providers. We also offer you the ability to Bring Your Own Threat Intelligence (BYOTI™), through which we can ingest additional IoCs into Lumu’s Illumination Process. Learn more about the ...
How does Lumu compare to a SIEM?
Lumu and SIEMs (Security Information and Event Management) are different technologies, designed with different purposes in mind. Lumu is a technology that was built from the ground up with a single objective: help measure and understand your unique ...
How can Lumu and SIEMs work together?
Lumu has the power to amplify the benefits of a standalone SIEM technology. Lumu enables organizations to maximize their resources by allowing security teams to work more effectively and proactively identify the assets communicating with adversarial ...
Can Lumu replace a SIEM?
SIEMs and Lumu are solutions used to address distinct challenges. Lumu can add incredible value to an enterprise’s SIEM, by pointing out exactly where the compromises are, reducing alert fatigue, and making daily security operations more effective. ...
What does Lumu do?
This is a brief comparison between what Lumu offers versus the capabilities Lumu may work with, but does not directly offer: Do Don’t Continuous Compromise Assessment Network Performance Analysis Implement “Assume you are Compromised” Strategy ...
How to partner with Lumu?
At Lumu, we’re deeply committed to collaborating with leading security technology, resellers, MSPs and xSPs worldwide. Together, we are helping organizations of all sizes exit the era of the breach dark days through Continuous Compromise Assessment. ...
What is Lumu On-Demand?
Lumu OnDemand is a one-time assessment of the entire enterprise to determine the level of compromise using your existing network data sources. Findings empower IT and security teams to illuminate threats and adversaries at speed within your unique ...
How does Lumu measure compromise in real time?
Lumu systematically collects, normalizes, and analyzes a wide range of network metadata, including DNS, Net flows, Proxy, Firewall Access Logs, Inbox and Email Intelligence. The level of visibility that only these data sources provide, allows us to ...
What is Continuous Compromise Assessment?
Lumu’s Continuous Compromise Assessment is a patent-pending model that enables organizations to measure their unique compromise levels, using their own network metadata. This model allows you to identify when, where, and how your infrastructure is ...
Get in touch with Lumu
Whether you have a question about features, deployment, or anything else, our team is ready to answer all your questions. I want to know more about Lumu If you have pricing, billing, licensing questions, or want to discuss your security needs with a ...