Lumeta Lumeta amplifies the value of your security stack by feeding it comprehensive and authoritative data about your network. These feeds are accomplished through the Lumeta API and through various integrated data connectors. Some of these connectors identify vulnerable networks and devices by matching Lumeta-discovered data with ingested threat intelligence. Indexed data on these correlations are provided to users via Lumeta's browser interface. Unstructured data and query results are delivered via API to other systems in a user's network ecosystem. These enable customers to resolve, re-route, sandbox, patch, and remediate problems when they occur and maintain the health and security of the system as a whole.This illustration is intended to give you an overview of dashboard dependencies—the relationship between dashboards and the data sources from which they are populated.
The setup to receive data feeds from third party applications to Lumeta involves adding a URL or IP address to your firewall whitelist. This information has been added to each integration's configuration page on Settings > Integrations.
A few representative examples:
The IP address will display for these integrations:
Emerging Threats - http://rules.emergingthreatspro.com
The following table is intended to give you an overview of the dashboards and data sources that are correlated with Lumeta discovered-and-indexed network data. You can sort the table by column heading. Open the Dashboards dropdown on the Home page of this site for more on each add-in.