CIO at a tech consulting company with 1-10 employees
Real User
Top 20
2024-08-01T14:17:31Z
Aug 1, 2024
My company is currently dealing with Lumu's onboarding process. Lumu is used to monitor the environment permanently and validate if there is ransomware that can exploit our infrastructure.
Chief Solutions Architect at a government with 51-200 employees
Real User
Top 20
2024-05-29T13:48:00Z
May 29, 2024
We implemented Lumu for network detection. We deployed it to detect threats on the LAN and Wi-Fi networks. Currently, it's used within the IT department to detect any threats. Extending it to our servers will be deployed across the entire organization, covering our LAN and Wi-Fi networks.
Information security and quality engineer at Federacion de Aseguradores Colombianos Fasecolda
User
2022-09-27T00:00:00Z
Sep 27, 2022
We want to know where the threats are inside our network, with this solution, we can automate the network metadata analysis and see where and when bad things happen so we can take immediate action. Lumu is easy to use, so we didn’t need a long training process, and the implementation was quick. Our environment is hybrid so having the option of Virtual Appliance, agents, and other options of the collection was a must. We are evaluating the option to upgrade from Insights to Defender to have the benefit of visibility and automatic response.
We use Lumu in various ways across the network with a focus on firewall logging and active blocking. We also leverage the data that Lumu provides for email monitoring. We use a couple of applications to work through. We use it to block items missed in the web filter and firewall scan from outside. It's been helpful for overall extended network visibility.
Deputy Manager Technical Support at Restaurantes TOKS
User
2022-06-23T14:20:00Z
Jun 23, 2022
The objective has been to be able to identify compromises within my network, in a hybrid and complex environment, having visibility of what is happening and how we can react quickly has been key. It also has a great advantage and that is the ability to automate the response. Lumu has an API and out-of-the-box integrations that make the process very easy. In a very short time and with the help of your team, I was able to integrate other existing cybersecurity solutions. Lumu helps me to be able to do it by investing my team's time in cybersecurity efficiently.
Find out what your peers are saying about Lumu Technologies, Darktrace, ProtectWise and others in Intrusion Detection and Prevention Software (IDPS). Updated: November 2024.
Intrusion Detection and Prevention Software (IDPS) helps organizations identify potential security threats and respond to them effectively to protect sensitive data and maintain network integrity.
IDPS provides real-time monitoring and analysis of network traffic to detect malicious activities. By leveraging advanced algorithms and machine learning, IDPS solutions can identify unusual patterns and potential threats that traditional firewalls might miss. This proactive approach helps in...
My company is currently dealing with Lumu's onboarding process. Lumu is used to monitor the environment permanently and validate if there is ransomware that can exploit our infrastructure.
We implemented Lumu for network detection. We deployed it to detect threats on the LAN and Wi-Fi networks. Currently, it's used within the IT department to detect any threats. Extending it to our servers will be deployed across the entire organization, covering our LAN and Wi-Fi networks.
When Lumu sends us a report that something is unsound, we respond to it. Some of the things we have are automated, and some are not.
We want to know where the threats are inside our network, with this solution, we can automate the network metadata analysis and see where and when bad things happen so we can take immediate action. Lumu is easy to use, so we didn’t need a long training process, and the implementation was quick. Our environment is hybrid so having the option of Virtual Appliance, agents, and other options of the collection was a must. We are evaluating the option to upgrade from Insights to Defender to have the benefit of visibility and automatic response.
We use Lumu in various ways across the network with a focus on firewall logging and active blocking. We also leverage the data that Lumu provides for email monitoring. We use a couple of applications to work through. We use it to block items missed in the web filter and firewall scan from outside. It's been helpful for overall extended network visibility.
The objective has been to be able to identify compromises within my network, in a hybrid and complex environment, having visibility of what is happening and how we can react quickly has been key. It also has a great advantage and that is the ability to automate the response. Lumu has an API and out-of-the-box integrations that make the process very easy. In a very short time and with the help of your team, I was able to integrate other existing cybersecurity solutions. Lumu helps me to be able to do it by investing my team's time in cybersecurity efficiently.