Page tree

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 6 Next »

Lumeta Lumeta amplifies the value of your security stack by feeding it comprehensive and authoritative data about your network. These feeds are accomplished through the Lumeta API and through various integrated data connectors.  Some of these connectors identify vulnerable networks and devices by matching Lumeta-discovered data with ingested threat intelligence. Indexed data on these correlations are provided to users via Lumeta's browser interface. Unstructured data and query results are delivered via API to other systems in a user's network ecosystem. These enable customers to resolve, re-route, sandbox, patch, and remediate problems when they occur and maintain the health and security of the system as a whole.

This illustration is intended to give you an overview of dashboard dependencies—the relationship between dashboards and the data sources from which they are populated.

The following table is intended to give you an overview of the dashboards and data sources that are correlated with Lumeta discovered-and-indexed network data. You can sort the table by column heading. Open the Dashboards dropdown on the Home page of this site for more on each add-in.

IntegrationTypeDashboard(s)
BlueCat
BlueCat Management
Carbon BlackEndpoint Detection & ResponseEndpoint Management
Cisco pxGridUser IdentificationCisco pxGrid

Emerging Threats (open source)

Breach DetectionBreach Detection
FireMon Security Manager
FireMon Management

Gigamon Netflow

NetFlow

Breach Detection

QualysHost Vulnerability ManagementQualys Management
iDefenseBreach DetectionBreach Detection - iDefense
InfobloxIPAMInfoblox Management
ISC PortsBreach DetectionBreach Detection
Meraki
none - augments device details
McAfee ePOEndpoint Detection & ResponseMcAfee ePO Management
Rapid7
Rapid7 Management
RedSealEndpoint SecurityRedSeal Management
TORBreach DetectionBreach Detection
Tenable SecurityCenterHost Vulnerability ManagementTenable SecurityCenter Management
  • No labels