Lumeta Lumeta amplifies the value of your security stack by feeding it comprehensive and authoritative data about your network. These feeds are accomplished through the Lumeta API and through various integrated data connectors. Some of these connectors identify vulnerable networks and devices by matching Lumeta-discovered data with ingested threat intelligence. Indexed data on these correlations are provided to users via Lumeta's browser interface. Unstructured data and query results are delivered via API to other systems in a user's network ecosystem. These enable customers to resolve, re-route, sandbox, patch, and remediate problems when they occur and maintain the health and security of the system as a whole.
This illustration is intended to give you an overview of dashboard dependencies—the relationship between dashboards and the data sources from which they are populated.
The following table is intended to give you an overview of the dashboards and data sources that are correlated with Lumeta discovered-and-indexed network data. You can sort the table by column heading. Open the Dashboards dropdown on the Home page of this site for more on each add-in.
|Carbon Black||Endpoint Detection & Response||Endpoint Management|
|Cisco pxGrid||User Identification||Cisco pxGrid|
Emerging Threats (open source)
|Breach Detection||Breach Detection|
|FireMon Security Manager||FireMon Management|
|Qualys||Host Vulnerability Management||Qualys Management|
|iDefense||Breach Detection||Breach Detection - iDefense|
|ISC Ports||Breach Detection||Breach Detection|
|Meraki||none - augments device details|
|McAfee ePO||Endpoint Detection & Response||McAfee ePO Management|
|RedSeal||Endpoint Security||RedSeal Management|
|TOR||Breach Detection||Breach Detection|
|Tenable SecurityCenter||Host Vulnerability Management||Tenable SecurityCenter Management|