Information security and quality engineer at Federacion de Aseguradores Colombianos Fasecolda
User
2022-09-27T00:00:00Z
Sep 27, 2022
We want to know where the threats are inside our network, with this solution, we can automate the network metadata analysis and see where and when bad things happen so we can take immediate action. Lumu is easy to use, so we didn’t need a long training process, and the implementation was quick. Our environment is hybrid so having the option of Virtual Appliance, agents, and other options of the collection was a must. We are evaluating the option to upgrade from Insights to Defender to have the benefit of visibility and automatic response.
We use Lumu in various ways across the network with a focus on firewall logging and active blocking. We also leverage the data that Lumu provides for email monitoring. We use a couple of applications to work through. We use it to block items missed in the web filter and firewall scan from outside. It's been helpful for overall extended network visibility.
Deputy Manager Technical Support at Restaurantes TOKS
User
2022-06-23T14:20:00Z
Jun 23, 2022
The objective has been to be able to identify compromises within my network, in a hybrid and complex environment, having visibility of what is happening and how we can react quickly has been key. It also has a great advantage and that is the ability to automate the response. Lumu has an API and out-of-the-box integrations that make the process very easy. In a very short time and with the help of your team, I was able to integrate other existing cybersecurity solutions. Lumu helps me to be able to do it by investing my team's time in cybersecurity efficiently.
Find out what your peers are saying about Lumu Technologies, ProtectWise, Splunk and others in Intrusion Detection and Prevention Software (IDPS). Updated: March 2024.
What Is an Intrusion Detection System? Intrusion detection systems (IDSes) analyze network traffic for signatures of known attackers. The systems can be hardware devices or software solutions. An IDS can mitigate existing malware, such as backdoors, rootkits, and trojans.The goal of an intrusion detection system is to detect an attack as it occurs. The system starts by analyzing inbound and outbound network traffic for signs of known attackers.
Some activities an IDS performs...
When Lumu sends us a report that something is unsound, we respond to it. Some of the things we have are automated, and some are not.
We want to know where the threats are inside our network, with this solution, we can automate the network metadata analysis and see where and when bad things happen so we can take immediate action. Lumu is easy to use, so we didn’t need a long training process, and the implementation was quick. Our environment is hybrid so having the option of Virtual Appliance, agents, and other options of the collection was a must. We are evaluating the option to upgrade from Insights to Defender to have the benefit of visibility and automatic response.
We use Lumu in various ways across the network with a focus on firewall logging and active blocking. We also leverage the data that Lumu provides for email monitoring. We use a couple of applications to work through. We use it to block items missed in the web filter and firewall scan from outside. It's been helpful for overall extended network visibility.
The objective has been to be able to identify compromises within my network, in a hybrid and complex environment, having visibility of what is happening and how we can react quickly has been key. It also has a great advantage and that is the ability to automate the response. Lumu has an API and out-of-the-box integrations that make the process very easy. In a very short time and with the help of your team, I was able to integrate other existing cybersecurity solutions. Lumu helps me to be able to do it by investing my team's time in cybersecurity efficiently.