Page tree

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 12 Next »

Lumeta Lumeta amplifies the value of your security stack by feeding it comprehensive and authoritative data about your network. These feeds are accomplished through the Lumeta API and through various integrated data connectors.  Some of these connectors identify vulnerable networks and devices by matching Lumeta-discovered data with ingested threat intelligence. Indexed data on these correlations are provided to users via Lumeta's browser interface. Unstructured data and query results are delivered via API to other systems in a user's network ecosystem. These enable customers to resolve, re-route, sandbox, patch, and remediate problems when they occur and maintain the health and security of the system as a whole.

This illustration is intended to give you an overview of dashboard dependencies—the relationship between dashboards and the data sources from which they are populated.

The following table is intended to give you an overview of the dashboards and data sources that are correlated with Lumeta discovered-and-indexed network data. You can sort the table by column heading. Open the Dashboards dropdown on the Home page of this site for more on each add-in.

IntegrationTypeDashboard(s)
BlueCatIP Address ManagementBlueCat Management
Carbon BlackEndpoint Detection & ResponseEndpoint Management
Cisco pxGridUser IdentificationCisco pxGrid

Emerging Threats (open source)

Breach DetectionBreach Detection
FireMon Security ManagerRisk ManagementFireMon Management

Gigamon Netflow

NetFlow

Breach Detection

QualysHost Vulnerability ManagementQualys Management
iDefenseBreach DetectionBreach Detection - iDefense
InfobloxIP Address ManagementInfoblox Management
ISC PortsBreach DetectionBreach Detection
MerakiIP Address Managementnone - augments device details
McAfee ePOEndpoint Detection & ResponseMcAfee ePO Management
Rapid7Risk ManagementRapid7 Management
RedSealEndpoint Detection & ResponseRedSeal Management
TORBreach DetectionBreach Detection
Tenable SecurityCenterHost Vulnerability ManagementTenable SecurityCenter Management
  • No labels