June 26, 2017 9:00 am

Lumeta’s library includes Datasheets for our products, technology integrations, and professional services; Solution Briefs; Whitepapers; Analyst Reports; and Tech Talks and other technology video presentations.

 

Datasheets (Products, Integrations, Services)

Lumeta Spectre (formerly ESI) Datasheets:

Lumeta Spectre and Lumeta Spectre Portal datasheet (NEW!)

Lumeta Spectre for Managed Security Service Providers (MSSPs) (NEW!)

Technology Partner Integrations:

Accenture iDefense and Lumeta Spectre integration datasheet (NEW!)

McAfee ePO and Lumeta Spectre integration datasheet (NEW!)

Lumeta Spectre Endpoint Solution integration datasheet  (NEW!)

Gigamon and Lumeta Spectre solution brief (NEW!)

Qualys and Lumeta Spectre integration datasheet (NEW!)

Carbon Black Enterprise Response and Lumeta ESI integration datasheet

 

Lumeta IPSonar Datasheets:

Lumeta IPsonar datasheet Lumeta IPsonar [point-in-time view]

Technology Partner Integrations:

Infoblox and Lumeta – integration datasheet

Qualys and Lumeta IPSonar – integration datasheet

Tripwire IP360 and Lumeta IPsonar – integration datasheet

 

Lumeta Professional Services:

Lumeta Kick Start Fact Sheet – Master Lumeta’s capabilities for an implementation that’s smooth, seamless

Lumeta Tune Up Fact Sheet

Lumeta Maintenance Support and Professional Services Fact Sheet

 

Solution Briefs

Lumeta Spectre ESG Lab Validation Report (NEW!)

ESG Lab performed hands-on testing of Lumeta Spectre, looking at how Lumeta’s real-time, always-on monitoring and integration with best-of-breed cybersecurity tools can enable organizations to gain complete visibility into their network, enabling detection, prevention, and remediation of threats and vulnerabilities. ESG Lab First Look
Lumeta: Cyber Situational Awareness

Lumeta ESI for IoT/ICS Segmentation and Breach Prevention (NEW!)

Organizations that support Industrial Control Systems (ICS) are adopting more Internet of Things (IoT) where critical infrastructure is supporting more commonly available network and operating systems. This has led to the breakdown of the  separation between Operational Technology and Information Technology, exposing OT systems to a much greater attack surface. In addition, as existing approaches have been incapable to prevent IT infrastructure breaches, CSOs of these organizations are greatly concerned about the increased exposure of their OT infrastructure to attack, especially as ransomware and political motivations are increasingly shaping the threat landscape. In this Solution Brief, we cover the challenges ICS IT and OT teams face in securing their infrastructure and how Lumeta is a critical piece of their overall security strategy. Lumeta Solution Brief: Preventing Breaches in IoT/ICS Environments Through Real-Time Network Visibility and Validated Network Segmentation

European Union NIS Directive with Lumeta ESI

The European Commission has adopted the recent Directive on Security of Network and Information Systems (‘NIS Directive’), which represents the first EU-wide legislation on cybersecurity. Real-time network cyber visibility is required to prepare for implementation of the NIS Directive. Operators of essential services and digital service providers (DSPs) now have risk management and incident reporting obligations. Businesses in these sectors will have to take appropriate security measures and to notify serious incidents to the relevant national authority. Lumeta Solution Brief: European Union NIS Directive

Enterprise Security Data Lakes (Big Data Analytics) with Lumeta ESI

Many government agencies and Fortune 500/Global 500 organizations are internally developing enterprise security data lakes – Big Data analytics projects – to connect together all of their systems and broaden their breach detection capabilities. Lumeta ESI is the source of real-time network metadata which can be fed into an enterprise security data lake. This “network infrastructure state” metadata is a key feed as real-time, accurate and up-to-date intelligence isn’t available for consumption from other network and security data sources. Lumeta Solution Brief: Enterprise Security Data Lakes (Big Data Analytics)

FFIEC OCC Cybersecurity with Lumeta ESI

As banking regulators pursue improved resiliency and cybersecurity preparedness, real-time network visibility takes center stage. Financial institutions affected by heightened Federal Reserve, FDIC, OCC & FFIEC cybersecurity standards deploy Lumeta ESI to hunt breaches and identify IT network infrastructure anomalies in real time. Lumeta Solution Brief: FFIEC OCC Cybersecurity

Real-Time Network Behavior Analytics and Cybersecurity Breach Detection with Lumeta ESI

Organizations are at constant risk of infiltration by adversaries on the Internet or the Dark Web, and need to quickly detect breaches to minimize their effect on the network and organization. Lumeta Solution Brief: Real-Time Network Behavior Analytics and Cybersecurity Breach Detection

Operationalizing Threat Intelligence using Lumeta IPsonar plus Cyber Threat Probe

Network Situational Awareness coupled with external threat intelligence service feeds identifies botnets, zombies and other cyber threats. Lumeta Solution Brief: Operationalizing Threat Intelligence using Lumeta IPsonar plus Cyber Threat Probe

Lumeta ESI IPv6 Discovery

With IPv6 infiltrating data centers and externally exposed devices such as smart phones, tablets, and POS systems it is essential to understand that networks are still open to the same vulnerabilities as IPv4 networks. There may also be even more at risk due to the fact that these IPv6 networks are not yet as widely patrolled and monitored. Lumeta Solution Brief: IPv6 Discovery

Using Lumeta ESI to Provide Dynamic Validation of Network Segmentation Policies – in Real Time

Giving vendors, suppliers, partners and customers access to an organization’s internal network poses risk. Every network connection does. Network architectures that segment a network to isolate risk and manage these connections carefully and continuously have become state of the art. Lumeta Solution Brief: Real Time Dynamic Validation Network Segmentation Policies

Lumeta for DHS Continuous Diagnostics and Mitigation (CDM)

Lumeta offers significant advantages to organizations seeking to address the DHS CDM program that involves the implementation of Critical Controls 1, 4 & 5 of the SANS Twenty Critical Security Controls for Effective Cyber Defense (Functional Areas 1, 4 & 5 of CDM). Lumeta Solution Brief: DHS CDM

 

Whitepapers

Survey Report & Infographic: Breach Detection & Real-Time Network Visibility

The “Current Trends in Enterprise IT Network Security” survey of U.S. IT executives was conducted by independent research firm LTM Research on behalf of Lumeta. Findings revealed that, in terms of cybersecurity breach detection, there is a large disconnect between IT professionals’ needs and today’s realities. . Access the Infographic & Survey Report

Quick Guide: 5 Steps to Network Situational Awareness

Based on over a decade of experience with our clients – some of the largest global enterprise and government networks – Lumeta has developed a five step program to achieving Network Situational Awareness. Network Situational Awareness means understanding the state of your network infrastructure. It starts with creating a “steady-state” level of network intelligence, to more closely manage change within the enterprise. Lumeta QuickGuide: Network Situational Awareness

Continuous Cyber Situational Awareness

Continuous monitoring of security controls and comprehensive cyber situational awareness represent the building blocks of proactive network security. Cyber situational awareness answers the “who, what, when and how” of a cyber attack and is the foundation to any successful cyber security program. Organizations have the potential to predict and defeat a cyber attack only when a firm understanding of enterprise activity is in place. Cyber situational awareness includes recognizing emerging threats originating from within the organization and external to the enterprise, and requires a continuous monitoring approach to produce real-time visibility of an enterprise network and all of its connections and devices. Lumeta Report: Continuous Cyber Situational Awareness

 Why Leaks Matter: Leak Detection and Mitigation as a Critical Element of Network Assurance

Network Assurance assesses the impact of network change on security, availability and compliance. Modern organizations are discovering that only with a comprehensive set of network facts can true global visibility be achieved and its benefits of reduced network risk be realized. Network leaks or unauthorized connectivity to or from the public Internet are a classic example of the problems that Network Assurance programs uncover. This paper concludes that leaks can pose serious risk to the integrity of systems and data and are a risky exposure that organizations must mitigate on an ongoing basis. Lumeta Report: Why Leaks Matter

Discover and Manage Your Network Perimeter

If your network consists of more than a dozen routers or more than a few hundred hosts, chances are good that you do not know exactly where your network ends and other networks – such as the networks of your current and past business partners, suppliers, customers, outsourcers, divestitures and acquisitions – begin. You are not alone; most enterprises and government agencies are finding it increasingly difficult to determine and manage their ever-changing network perimeter. Lumeta Report: Discover and Manage Network Perimeter

Top 3 Undiscovered Vulnerabilities IPsonar Finds on a First Scan

Lumeta IPsonar uniquely fills a gap in situational awareness – by discovering and providing data on the entire network including all assets and connections, both known and previously “unknown.” Finding, identifying, and cataloging several hundred thousand devices across a global, secure infrastructure extremely rapidly and without disruption or triggering alarms on security tools is what IPsonar does best. IPsonar performs active probes of the address space, empirically discovering everything that’s on the network – not just the IP range that is supplied for scanning. Lumeta Report: Top 3 Undiscovered Vulnerabilities

Bringing Better Business Value to Mergers and Acquisitions

Performing IT due diligence is a critical step to ensure the success of mergers, acquisitions and divestitures. During M&A activities, businesses place an enormous amount of pressure on IT to deliver the large volume of required network changes on time and within budget. These pressures often lead IT managers to make decisions without all the facts, resulting in actions that impact the network’s infrastructure, availability, security, and compliance. Lumeta Report: M&A IT Due Diligence

The Significance of Common Criteria, Protection Profiles, and Lumeta IPsonar

The aim of the new Common Criteria is to ensure that commercial enterprise security products represent a good practice level of security, with a goal of secure-by-default products suitable for emerging threats. Standards like Common Criteria help ensure that security products are effective and trustworthy across international borders. Common Criteria certification is significant because it provides independent, standards-based verification of the security functions delivered by IT products. Certification provides customers the highest level of confidence that the solutions deliver on their security promises and meet global security standards. Lumeta Report: Common Criteria IPsonar (US)

 

 Analyst Reports

Enterprise Strategy Group (ESG) Lab First Look:
Lumeta Cyber Situational Awareness (June 2017)  (NEW!)
2017 TAG Cyber Security Annual – Volume 1 (Version 1.0 – September 2016):
Practical Handbook and Reference Guide for the Working Cyber Security Professional
2017 TAG Cyber Security Annual – Volume 2 (Version 1.0 – September 2016):
Cyber Security Industry Luminary Interviews
2017 TAG Cyber Security Annual – Volume 3 (Version 1.0 – September 2016):
Comprehensive Cyber Security Industry Vendor Listings

Tech Talks (and technology video presentations)

Lumeta Tech Talk: 5 Steps to Network Situational Awareness – Overview
Lumeta Tech Talk: Network Situational Awareness – Step 1 (Validating The Address Space)
Lumeta Tech Talk: Network Situational Awareness – Step 2 (Validating The Network Edge)
Lumeta Tech Talk: Network Situational Awareness – Step 3 (Conduct Census)
Lumeta Tech Talk: Network Situational Awareness – Step 4 (ID Devices)
Lumeta Tech Talk: Network Situational Awareness – Step 5 (ID Vulnerabilities)
Lumeta Tech Talk: IPv6 Discovery
Video Presentation: Leak Path Identification
Video Presentation: Multi-Homed Hosts, Split Tunneling or devices with unauthorized bridging device identification