Try our new research platform with insights from 80,000+ expert users

Lumu vs Vectra AI comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 8, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Lumu
Ranking in Intrusion Detection and Prevention Software (IDPS)
10th
Ranking in Network Detection and Response (NDR)
8th
Ranking in Extended Detection and Response (XDR)
18th
Average Rating
9.4
Reviews Sentiment
7.8
Number of Reviews
7
Ranking in other categories
No ranking in other categories
Vectra AI
Ranking in Intrusion Detection and Prevention Software (IDPS)
2nd
Ranking in Network Detection and Response (NDR)
2nd
Ranking in Extended Detection and Response (XDR)
9th
Average Rating
8.6
Reviews Sentiment
7.1
Number of Reviews
44
Ranking in other categories
Identity Threat Detection and Response (ITDR) (5th), AI-Powered Cybersecurity Platforms (4th)
 

Mindshare comparison

As of March 2025, in the Intrusion Detection and Prevention Software (IDPS) category, the mindshare of Lumu is 3.3%, up from 0.7% compared to the previous year. The mindshare of Vectra AI is 11.5%, up from 10.7% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Intrusion Detection and Prevention Software (IDPS)
 

Featured Reviews

Juan Solano - PeerSpot reviewer
Protects against threats and handles it in time with moderate pricing
Mostly, Lumu is an automatic tool. We'll deploy on firewalls and DNS servers. Lumu detects every attack on our network. The other day, we had CLC, the command controller, and the tool reacted automatically. It detected the attack and immediately blocked it without intervention from my team. The improvement is in the security process, as it's now entirely automated. We no longer require a technician or engineer to monitor our network 24/7. Lumu updates with AI and global threat intelligence, which greatly assists us. Since our workload is lighter, Lumu handles all of our tasks. We're using FortiGate for the firewall and Kaspersky for endpoints. If you are going to Lumu, you need another solution for the endpoint. You need to integrate with other tools like firewalls or another antivirus. I recommend the solution based on the price, usability, and service offered by the solution. Overall, I rate the solution a nine out of ten.
Mohammad Alkurdi - PeerSpot reviewer
Innovative detection features enhance monitoring
The advantages of the integration are not entirely out-of-the-box. You have to do it manually. When I'm doing tier response, an out-of-the-box solution is not available. You need to have a Linux server, and from the Linux server, you must perform AI tasks, and there is a lot to be handled in the back end. This is a major consideration about them. The recall feature, if it can be placed in some areas instead of the cloud, and charged for, would be better. Recall the storage where you watch all the traffic, and you can recall it and try to analyze it in the back end. It’s cloud-based. If they offer it on-prem, it would be better. I think they have a solution, but I have never tested it, to be honest with you.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The context provided by the tool is very complete, it includes the miter matrix, playbooks, links, hashes, and much more."
"It's been helpful for overall extended network visibility."
"I like Lumu's simple user interface. When we deployed it, we got full access, allowing us to identify IP addresses on the network and connect machine names to users. It helped us identify and block threats via the firewall. I also appreciate the chat support and ticket closure process. We're currently reviewing network detection solutions, and my recommendations include Lumu, Sentinel, and a few others. Regarding functionality and user-friendliness, I would recommend Lumu over the others."
"Lumu protects against threats immediately and handles them in time."
"Most of it is automated, so I do not have to watch it to get alerts."
"You can access external links, playbooks, MITRE Matrix, and a lot of information."
"The tool's support team helps partners resolve any problems with the product."
"The fact that we get the visualization of what's happening on our network, which is a way of improving our security in-depth is most valuable."
"One of the things that we didn't expect to happen was that our network team also jumped on it faster than we thought. In most cases, if it's a security tool that's working on the network part, they can also use it to find out certain flaws that have been in the system. Certain flaws, related to some legacy stuff, were already there for quite a few years, which they couldn't explain at first, but we could explain them based on the timing of certain things."
"One of the most valuable features of the platform is its ability to provide you with aggregated risk scores based on impact and certainty of threats being detected. This is both applied to individual and host detections. This is important because it enables us to use this platform to prioritize the most likely imminent threats. So, it reduces alert fatigue follow ups for security operation center analysts. It also provides us with an ability to prioritize limited resources."
"One of the most valuable features is all the correlation that it does using AI and machine learning. An example would be alerting on a host and then alerting on other things, like abnormal behavior, that it has noticed coming from the same host. It's valuable because we're a very lean team."
"The most valuable feature for Cognito Detect, the main solution, is that external IDS's create a lot of alerts. When I say a lot of alerts I really mean a lot of alerts. Vectra, on the other hand, contextualizes everything, reducing the number of alerts and pinpointing only the things of interest. This is a key feature for me. Because of this, a non-trained analyst can use it almost right away."
"It provides various dashboards that facilitate the identification of connections and can detect data exfiltration, meaning data sent from your environment to another."
"Most of their use cases, including deployment, are managed by the tool itself, requiring less manual input from our team."
"It has reduced the time it takes to respond to attacks. That comes back to the proactive point. It makes us able to lower down in the kill chain, we can react now, rather than reacting to incidents that happened, we can see an instant, in some cases, as it's being implemented, or as it's being launched."
 

Cons

"The free version is minimal compared to the full version."
"It would be good if we could access the physical logs."
"The integration with different vendors and endpoints could be improved."
"Nothing so far needs to be improved."
"The reports need improvement."
"I am happy with the current features. However, one important one is to improve the reports."
"Lumu's ability to discover threats is an area of concern where improvements are needed."
"The rules for threats are not always precise and Vectra AI should improve this."
"I would like to see data processed onshore. Right now, the cloud components, like Office 365, must be processed on servers outside of Australia. I would like to see a future adoption of onshore processing."
"Vectra is still limited to packet management. It's only monitoring packet exchanges. While it can see a lot of things, it can't see everything, depending on where it's deployed. It has its limits and that's why I still have my SIEM."
"We had another product with Vectra AI and used the MDR solution as an add-on. Initially, it wasn't fully appropriately configured, so we didn't get the expected results. Even once configured correctly, we weren't fully satisfied with its response. The issue was both with their service response and the product's capabilities."
"The solution needs to become more proactive. When Vectra AI is the primary solution in an environment - like it is in our case - you must work on response time. We have a small team so response time at endpoint level is vital."
"We are using SMB 3.0, which is an encrypted protocol. When we get some alerts or something, we cannot go deep into the protocol to see what's wrong because it's encrypted. We need to decrypt the protocol in another way, which is quite difficult. We might go back to SMB 2.0 just for this reason, but that's not a good solution."
"The false positives and the tuning side of it is something that could use improvement. But that could be from our side."
"A blind spot that I have is around the ease with which you can automate threat intervention."
 

Pricing and Cost Advice

"It is the cheapest solution we found."
"Compared to Lumu, other solutions are more expensive. SentinelOne was a bit cheaper, and another provider's price structure is unclear, but Lumu fit our budget nicely. SentinelOne's cost depends on the number of devices, and it might be similar to Lumu's, depending on deployment."
"The tool is available at a good price. The tool offers a good and competitive price for customers."
"From a pricing perspective, they are very commercially competitive. From a licensing perspective, just be conscious that some of their future cloud solutions come with additional subscriptions. Also, if you're outside of the US, you will get charged freight for the device back to your country."
"Vectra AI's pricing is cheaper than that of Darktrace."
"We are running at about 90,000 pounds per year. The solution is a licensed cost. The hardware that they gave us was pretty much next to nothing. It is the license that we're paying for."
"We have a desire to increase our use. However, it all comes down to budget. It's a very expensive tool that is very difficult to prove business support for. We would like to have two separate networks. We have our corporate network and PCI network, which is segregated due to payment processing. We don't have it for deployed in the PCI network. It would be good to have it fully deployed there to provide us with additional monitoring and control, but the cost associated with their licensing model makes it prohibitively expensive to deploy."
"The pricing is very good. It's less expensive than many of the tools out there."
"The solution's pricing was 50 percent lower than the other vendors shortlisted."
"The solution is low-cost and affordable."
"Their licensing model is antiquated. I'm not a fan of their licensing model. We have to pay for licensing based on four different things. You have to pay based on the number of unique IPs, the number of logs that we send through Recall and Stream, and the size of our environment. They need to simplify their licensing down to just one thing. It should be based on the amount of data, the number of devices, or something else, but there should be just one thing for everything. That's what they need to base their licensing on. Cost-wise, they're not cheap. They were definitely the most expensive option, but you get what you pay for. They're not the cheapest option."
report
Use our free recommendation engine to learn which Intrusion Detection and Prevention Software (IDPS) solutions are best for your needs.
842,388 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Educational Organization
13%
Computer Software Company
10%
Comms Service Provider
8%
Insurance Company
8%
Financial Services Firm
13%
Computer Software Company
13%
Manufacturing Company
8%
Government
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Lumu?
Lumu protects against threats immediately and handles them in time.
What needs improvement with Lumu?
Lumu's ability to discover threats is an area of concern where improvements are needed.
What is your primary use case for Lumu?
My company is currently dealing with Lumu's onboarding process. Lumu is used to monitor the environment permanently and validate if there is ransomware that can exploit our infrastructure.
What is the biggest difference between Corelight and Vectra AI?
The two platforms take a fundamentally different approach to NDR. Corelight is limited to use cases that require the eventual forwarding of events and parsed data logs to a security team’s SIEM or ...
What do you like most about Vectra AI?
The solution is currently used as a central threat detection and response system.
What is your experience regarding pricing and costs for Vectra AI?
It is very acceptable when you compare it with Darktrace, for example.
 

Comparisons

 

Also Known As

No data available
Vectra Networks, Vectra AI NDR
 

Overview

 

Sample Customers

Information Not Available
Tribune Media Group, Barry University, Aruba Networks, Good Technology, Riverbed, Santa Clara University, Securities Exchange, Tri-State Generation and Transmission Association
Find out what your peers are saying about Lumu vs. Vectra AI and other solutions. Updated: March 2025.
842,388 professionals have used our research since 2012.