No more typing reviews! Try our Samantha, our new voice AI agent.

What is your primary use case for Lumu?

Julia Miller - PeerSpot reviewer
Community Director at PeerSpot
  • 0
  • 12
PeerSpot user
Get the report
Helped 893,244 peers since 2012

7 Answers

Last answered May 23, 2025
JJ
Director, Information Technology at a educational organization with 201-500 employees
Real User
Top 10
May 23, 2025
Search for a product comparison
reviewer2518473 - PeerSpot reviewer
CIO at a tech consulting company with 1-10 employees
Real User
Top 10
Aug 1, 2024
reviewer2390580 - PeerSpot reviewer
Chief Solutions Architect at a government with 51-200 employees
Real User
Top 10
May 29, 2024
Martin Albanese - PeerSpot reviewer
Network Security Analyst at ALACHUA COUNTY ITS
Real User
Top 5
Jun 14, 2023
DC
Information security and quality engineer at Federacion de Aseguradores Colombianos Fasecolda
User
Sep 27, 2022
Martin Albanese - PeerSpot reviewer
Network Security Analyst at ALACHUA COUNTY ITS
Real User
Top 5
Jun 24, 2022
Learn what your peers think about Lumu. Get advice and tips from experienced pros sharing their opinions. Updated: May 2026.
893,244 professionals have used our research since 2012.
reviewer1895349 - PeerSpot reviewer
Deputy Manager Technical Support at Restaurantes TOKS
User
Jun 23, 2022
Lumu detects and validates network compromises by analyzing metadata like DNS, NetFlow, and proxy logs. It provides real-time indicators and context to enhance detection, improve threat visibility, and reduce investigation time.Lumu offers organizations a streamlined solution to identify network compromises through comprehensive metadata analysis, including DNS, NetFlow, and proxy logs. By providing real-time compromise indicators alongside contextual information, Lumu elevates threat...
Download Lumu ReportRead more