Information security and quality engineer at Federacion de Aseguradores Colombianos Fasecolda
User
2022-09-27T00:00:00Z
Sep 27, 2022
I am happy with the current features. However, one important one is to improve the reports. The good thing is that they already captured my feedback regarding this and are working on a new version of the reports. Besides that, I am happy with the features and value they provide to our cybersecurity operation. With this solution, you don’t need to invest in expensive cybersecurity software because you can operate within the product easily. I am glad about the results so far and expect to have even more features when we upgrade to Defender.
Nothing so far needs to be improved. The new features that have been added are very nice. I can't think of any new capabilities that need to be added. Overall this product meets our needs and does what we need it to do. As mentioned, it adds another layer to our cybersecurity stack.
Deputy Manager Technical Support at Restaurantes TOKS
User
2022-06-23T14:20:00Z
Jun 23, 2022
The reports need improvement. They need to have more complete reports that can be provided to the management area - although I understand that it is something they are already working on. With that information, cybersecurity can be escalated within the organization and the different executive stakeholders see it as something to which they should pay attention. Otherwise, it is a very complete tool that is evolving rapidly, so users benefit from these new features. The team is always attentive to receiving feedback and passing it on to the product team when necessary
Find out what your peers are saying about Lumu Technologies, ProtectWise, Splunk and others in Intrusion Detection and Prevention Software (IDPS). Updated: March 2024.
What Is an Intrusion Detection System? Intrusion detection systems (IDSes) analyze network traffic for signatures of known attackers. The systems can be hardware devices or software solutions. An IDS can mitigate existing malware, such as backdoors, rootkits, and trojans.The goal of an intrusion detection system is to detect an attack as it occurs. The system starts by analyzing inbound and outbound network traffic for signs of known attackers.
Some activities an IDS performs...
It would be good if we could access the physical logs. Sometimes Lumu gives them to us, but we would have to wait a day.
I am happy with the current features. However, one important one is to improve the reports. The good thing is that they already captured my feedback regarding this and are working on a new version of the reports. Besides that, I am happy with the features and value they provide to our cybersecurity operation. With this solution, you don’t need to invest in expensive cybersecurity software because you can operate within the product easily. I am glad about the results so far and expect to have even more features when we upgrade to Defender.
Nothing so far needs to be improved. The new features that have been added are very nice. I can't think of any new capabilities that need to be added. Overall this product meets our needs and does what we need it to do. As mentioned, it adds another layer to our cybersecurity stack.
The reports need improvement. They need to have more complete reports that can be provided to the management area - although I understand that it is something they are already working on. With that information, cybersecurity can be escalated within the organization and the different executive stakeholders see it as something to which they should pay attention. Otherwise, it is a very complete tool that is evolving rapidly, so users benefit from these new features. The team is always attentive to receiving feedback and passing it on to the product team when necessary