

ExtraHop Reveal(x) and Lumu are network monitoring and security products. Lumu appears to have an edge with its advanced features.
Features: ExtraHop Reveal(x) provides real-time network insights, anomaly detection, and automated threat response. It integrates with CrowdStrike, allows packet flow inspection, and offers customizable dashboards. Lumu provides threat intelligence, continuous compromise assessment, and integrates easily with various other tools to simplify complex data presentations.
Room for Improvement: ExtraHop Reveal(x) could improve by offering more complete packet captures, enhancing its threat detection customization, and reducing the complexity of its initial setup. Lumu might benefit from real-time threat exploration, a more comprehensive alert system, and addressing delayed threat visibility in some scenarios.
Ease of Deployment and Customer Service: ExtraHop Reveal(x) is deployable in complex environments, supported by strong customer service. Lumu offers straightforward deployment, excellent user interface simplicity, and effective customer communication.
Pricing and ROI: ExtraHop Reveal(x) requires a significant initial investment but promises a substantial ROI with enterprise-level features. Lumu, being budget-friendly, provides an attractive ROI for organizations focusing on advanced threat assessments within a limited budget.
It self-reports as saving 10 to 20 hours a week of engineer time.
I would rate their technical support nine out of ten.
It picks up on borderline issues that matter.
Stability has been excellent.
Currently, we have to check manually as we do not receive any notifications about new patches, maintenance, or firmware releases.
I would like to see improvements in areas where events are getting dropped; we're not able to view complete insights.
Having some sort of certification or training, along with more periodic webinars might be helpful.
In our environment, it costs approximately 1200 a month.
If I want to know a specific IP and which server it has been connected to, it's easy to gather those kinds of trees from the NDR.
The solution offers a friendly GUI for security features.
It provides peace of mind knowing that any device on our network, whether it is our own, BYOD device, or an unauthorized device, is being tracked and analyzed at multiple levels.
| Product | Mindshare (%) |
|---|---|
| ExtraHop Reveal(x) | 6.1% |
| Lumu | 3.1% |
| Other | 90.8% |

| Company Size | Count |
|---|---|
| Small Business | 3 |
| Midsize Enterprise | 4 |
| Large Enterprise | 9 |
| Company Size | Count |
|---|---|
| Small Business | 6 |
| Midsize Enterprise | 1 |
| Large Enterprise | 4 |
ExtraHop Reveal(x) offers advanced network visibility and threat detection through seamless integration with CrowdStrike. It enhances security with machine learning-driven behavioral analysis and customizable dashboards.
ExtraHop Reveal(x) excels in network detection and response by decrypting SSL traffic and providing real-time packet inspection. Users benefit from its dynamic triggers and historical data tracing. The platform is valued for its depth of information, powerful analytics, and cloud-based administration. It allows effective monitoring of attack chains and integrates with other solutions to boost security. However, there is room for improvement in pricing flexibility, licensing models, and integration capabilities, particularly with Microsoft Sentinel.
What are ExtraHop Reveal(x)'s Key Features?ExtraHop Reveal(x) is employed across industries for network traffic monitoring, malware detection, and real-time analysis. Analysts use it for server-to-server networking insights and application troubleshooting. Companies leverage its capabilities for behavioral analytics and compliance monitoring without deploying sensors on individual devices.
Lumu detects and validates network compromises by analyzing metadata like DNS, NetFlow, and proxy logs. It provides real-time indicators and context to enhance detection, improve threat visibility, and reduce investigation time.
Lumu offers organizations a streamlined solution to identify network compromises through comprehensive metadata analysis, including DNS, NetFlow, and proxy logs. By providing real-time compromise indicators alongside contextual information, Lumu elevates threat visibility and shortens investigation durations. Its simple interface and integration flexibility with platforms, alongside automated incident responses, highlight its value. While users appreciate limited false positives, ease of use, and the context provided, enhancements in SIEM and XDR integration, asset context enrichment, and reporting are areas users would like to see further developed.
What features define Lumu?Organizations use Lumu to monitor outbound traffic, detect compromised endpoints, log firewall activities, and enable active threat blocking. Its integration ease via API supports threat detection across LAN and Wi-Fi, monitoring email traffic, and acting as a managed SOC for security event coordination. Companies appreciate Lumu's adaptability in hybrid environments and its ability to efficiently locate and analyze threats within network metadata, ensuring quick deployment and extendibility across external platforms.
We monitor all Network Detection and Response (NDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.