By Providing Real-Time Context About Existing Network Compromises, Lumu Helps IT Security Teams Further Minimize Alert Fatigue, Prioritize Response, and Accelerate Remediation
MIAMI, June 03, 2020 (GLOBE NEWSWIRE) — Lumu, the creators of Continuous Compromise Assessment cybersecurity model that empowers organizations to measure compromise in real-time, today announced the unveiling of a new ‘Compromise Context’ capability that offers robust contextual intelligence around confirmed compromise instances, enabling security teams to deploy accelerated incident response efforts with precision. This new contextual functionality is included as part of the Lumu Insights platform, its innovative cloud-based solution which collects and standardizes network metadata from a wide-range of network sources and puts it through a patent-pending Illumination Process to measure the technical distance between known IOCs.
“Security teams have long relied on conventional Indicators of Compromise as their primary vehicle to detect a network intrusion or other malicious activities. However as the word ‘indicator’ implies, it’s an inexact science at best that often leaves you with more questions than answers,” said Ricardo Villadiego, founder and CEO of Lumu. “As the age old saying goes, ‘context is everything’ and within the framework of network security, context is precisely what security teams need most these days. Not only does this context help defenders accelerate their response, it also enables IT strategists to better prioritize additional security investments based on empirical evidence of confirmed instances of compromise. ”
Lumu’s new Compromise Context capability aims to arm threat researchers and incident responders with real-time compromise intelligence that addresses fundamental questions about specific and confirmed instances of compromise, including: How and where is a particular compromise spreading? What is the attacker’s objective? How long has a specific compromise been taking place? With this new functionality, Lumu users can:
- Simply the Management of Threat Intelligence: By consolidating all of this contextual intelligence within a single view, security teams no longer need to chase down data from multiple network monitoring tools and can manage them in real-time, without having to invest additional time creating rules or applying conditions.
- Visualize the Sphere of Impact: Lumu’s proprietary Compromise Radar™ provides a dynamic visualization tool that displays how many malicious events and endpoints are being affected, enabling security analysts to quickly distinguish occasional contact with adversarial infrastructure from persistent, automated compromises that have the potential to cause immediate harm to their organization.
- Measure the Attack Distribution: Attack Distribution is another visualization tool that enables Lumu Insight users to track and measure critical environments such as SWIFT, PCI-DSS, IOTs, and OT networks and take immediate action. Attack Distribution can also show how and where a specific compromise is spreading inside an organization’s network.
- Accelerate and Prioritize their Response: Understanding which compromises represent the most immediate threat is an especially critical first step for cybersecurity first responders. Compromise context equips security defenders with the prescriptive real-time insights security analysts need to prioritize, isolate, and contain a network compromise.
- Conduct In-Depth Threat Research: Lumu users can gather and drill down with more information about a compromise with integrated links to related articles authored by leading security researchers covering a particular threat as well as corresponding incident response playbooks based on the NIST Framework which include best practices for how to respond to specific attacks.
To learn more about this new feature and view screenshots of Lumu’s Compromise Context feature, visit: https://lumu.io/compromise-context/
Headquartered in Miami, Florida, Lumu is a cybersecurity company focused on helping enterprise organizations illuminate threats and isolate confirmed instances of compromise. Applying principles of Continuous Compromise Assessment, Lumu has built a powerful closed-loop, self-learning solution that helps security teams accelerate compromise detection, gain real-time visibility across their infrastructure, and close the breach detection gap from months to minutes. Learn more about how Lumu illuminates network blindspots at www.lumu.io.
Powered by WPeMatico