Getting Started with Lumu
In this article, we introduce you to all you need to know about using Lumu to measure and understand your business’s compromise level in real time. If you want to go straight to the deployment documentation, click here. Welcome to Lumu! Lumu ...
Deploy and Integrate
As we described in our Get Started article, all successful attacks have a common denominator: the cybercriminal must use the network. Lumu covers from simple to complex infrastructures collecting network metadata from your extended perimeter through ...
Lumu Free Deployment Guide
As we show in our Deployment and Integration article, Lumu Free is a limited-visibility offering for getting started with the power of Lumu’s Continuous Compromise Assessment model. With Lumu Free you can set up real-time DNS ingestion using Lumu ...
Lumu Insights Deployment and Integration Guide
Incorporate the Continuous Compromise Assessment into Your Security Operation. As we show in our Deployment and Integration article, when greater visibility is desired, it's necessary to insert network metadata collectors inside your network ...