June 26, 2017 9:00 am

Lumeta’s library includes Datasheets for our products, technology integrations, and professional services; Solution Briefs; Whitepapers; Analyst Reports; and Tech Talks and other technology video presentations.


Datasheets (Products, Integrations, Services)

Lumeta Spectre Datasheets:

Lumeta Spectre and Lumeta Spectre Portal datasheet

Lumeta Spectre for Managed Security Service Providers (MSSPs)

Lumeta Spectre for Internet of Things (IoT) and Industrial Control System (ICS) Infrastructures (NEW!)

Lumeta Spectre for Cloud Security (NEW!)

Lumeta Spectre for Leak Path Monitoring (NEW!)

Technology Partner Integrations:

Accenture iDefense and Lumeta Spectre integration datasheet

McAfee ePO and Lumeta Spectre integration datasheet

Lumeta Spectre Endpoint Solution integration datasheet 

Gigamon and Lumeta Spectre solution brief

Qualys and Lumeta Spectre integration datasheet

Carbon Black Enterprise Response and Lumeta Spectre integration datasheet


Lumeta IPSonar Datasheets:

Lumeta IPsonar datasheet Lumeta IPsonar [point-in-time view]

Technology Partner Integrations:

Infoblox and Lumeta – integration datasheet

Qualys and Lumeta IPSonar – integration datasheet


Lumeta Professional Services:

Lumeta Kick Start Fact Sheet – Master Lumeta’s capabilities for an implementation that’s smooth, seamless

Lumeta Tune Up Fact Sheet

Lumeta Maintenance Support and Professional Services Fact Sheet

Case Studies

Lumeta Spectre Large Healthcare System Provider Case Study (NEW!)


Solution Briefs

Lumeta Spectre to Better Achieve PCI DSS Compliance (NEW!)

Learn how Lumeta Spectre can help you achieve your PCI compliance objectives based on the latest PCI DSS Requirements. Lumeta Spectre can provide critical capabilities for discovery, inventorying and tracking any real-time changes in network infrastructure and connected devices. In addition, Lumeta Spectre offers capabilities to understand leak paths and segmentation policy violations, and security  of cloud infrastructure, which are all documented in the latest PCI DSS. You can download the solution brief here: Lumeta Spectre to Better Achieve PCI DSS Compliance 

Lumeta Spectre for IoT/ICS Segmentation and Breach Prevention (NEW!)

Organizations that support Industrial Control Systems (ICS) are adopting more Internet of Things (IoT) where critical infrastructure is supporting more commonly available network and operating systems. This has led to the breakdown of the  separation between Operational Technology and Information Technology, exposing OT systems to a much greater attack surface. In addition, as existing approaches have been incapable to prevent IT infrastructure breaches, CSOs of these organizations are greatly concerned about the increased exposure of their OT infrastructure to attack, especially as ransomware and political motivations are increasingly shaping the threat landscape. In this Solution Brief, we cover the challenges ICS IT and OT teams face in securing their infrastructure and how Lumeta Spectre is a critical piece of their overall security strategy. Lumeta Solution Brief: Preventing Breaches in IoT/ICS Environments Through Real-Time Network Visibility and Validated Network Segmentation

European Union NIS Directive with Lumeta Spectre (NEW!)

The European Commission has adopted the recent Directive on Security of Network and Information Systems (‘NIS Directive’), which represents the first EU-wide legislation on cybersecurity. Real-time network cyber visibility is required to prepare for implementation of the NIS Directive. Operators of essential services and digital service providers (DSPs) now have risk management and incident reporting obligations. Businesses in these sectors will have to take appropriate security measures and to notify serious incidents to the relevant national authority. Lumeta Solution Brief: European Union NIS Directive

FFIEC OCC Cybersecurity with Lumeta Spectre

As banking regulators pursue improved resiliency and cybersecurity preparedness, real-time network visibility takes center stage. Financial institutions affected by heightened Federal Reserve, FDIC, OCC & FFIEC cybersecurity standards deploy Lumeta Spectre to hunt breaches and identify IT network infrastructure anomalies in real time. Lumeta Solution Brief: FFIEC OCC Cybersecurity

Real-Time Network Behavior Analytics and Cybersecurity Breach Detection with Lumeta Spectre

Organizations are at constant risk of infiltration by adversaries on the Internet or the Dark Web, and need to quickly detect breaches to minimize their effect on the network and organization. Lumeta Solution Brief: Real-Time Network Behavior Analytics and Cybersecurity Breach Detection

Operationalizing Threat Intelligence using Lumeta IPsonar plus Cyber Threat Probe

Network Situational Awareness coupled with external threat intelligence service feeds identifies botnets, zombies and other cyber threats. Lumeta Solution Brief: Operationalizing Threat Intelligence using Lumeta IPsonar plus Cyber Threat Probe

Lumeta ESI IPv6 Discovery

With IPv6 infiltrating data centers and externally exposed devices such as smart phones, tablets, and POS systems it is essential to understand that networks are still open to the same vulnerabilities as IPv4 networks. There may also be even more at risk due to the fact that these IPv6 networks are not yet as widely patrolled and monitored. Lumeta Solution Brief: IPv6 Discovery

Using Lumeta ESI to Provide Dynamic Validation of Network Segmentation Policies – in Real Time

Giving vendors, suppliers, partners and customers access to an organization’s internal network poses risk. Every network connection does. Network architectures that segment a network to isolate risk and manage these connections carefully and continuously have become state of the art. Lumeta Solution Brief: Real Time Dynamic Validation Network Segmentation Policies

Lumeta for DHS Continuous Diagnostics and Mitigation (CDM)

Lumeta offers significant advantages to organizations seeking to address the DHS CDM program that involves the implementation of Critical Controls 1, 4 & 5 of the SANS Twenty Critical Security Controls for Effective Cyber Defense (Functional Areas 1, 4 & 5 of CDM). Lumeta Solution Brief: DHS CDM



The Universal Gap in Preventing Breaches: Leak Path Detection and Mitigation (NEW!)

Continuous changes to the network landscape, including infrastructure, operating systems, and applications can cause organizational security policy and network defense configuration to become misaligned, contributing to a proliferation of leaks. And it only takes one leak to allow malicious intrusion into a network. In this paper, learn some of the causes for leaks, the impact of inbound versus outbound leaks, how leak path mitigation is critical to network assurance and compliance and best practices for identifying and locking down leak paths. Access the report HERE.

Survey Report & Infographic: Breach Detection & Real-Time Network Visibility

The “Current Trends in Enterprise IT Network Security” survey of U.S. IT executives was conducted by independent research firm LTM Research on behalf of Lumeta. Findings revealed that, in terms of cybersecurity breach detection, there is a large disconnect between IT professionals’ needs and today’s realities. . Access the Infographic & Survey Report

Quick Guide: 5 Steps to Network Situational Awareness

Based on over a decade of experience with our clients – some of the largest global enterprise and government networks – Lumeta has developed a five step program to achieving Network Situational Awareness. Network Situational Awareness means understanding the state of your network infrastructure. It starts with creating a “steady-state” level of network intelligence, to more closely manage change within the enterprise. Lumeta QuickGuide: Network Situational Awareness

Continuous Cyber Situational Awareness

Continuous monitoring of security controls and comprehensive cyber situational awareness represent the building blocks of proactive network security. Cyber situational awareness answers the “who, what, when and how” of a cyber attack and is the foundation to any successful cyber security program. Organizations have the potential to predict and defeat a cyber attack only when a firm understanding of enterprise activity is in place. Cyber situational awareness includes recognizing emerging threats originating from within the organization and external to the enterprise, and requires a continuous monitoring approach to produce real-time visibility of an enterprise network and all of its connections and devices. Lumeta Report: Continuous Cyber Situational Awareness

 Why Leaks Matter: Leak Detection and Mitigation as a Critical Element of Network Assurance

Network Assurance assesses the impact of network change on security, availability and compliance. Modern organizations are discovering that only with a comprehensive set of network facts can true global visibility be achieved and its benefits of reduced network risk be realized. Network leaks or unauthorized connectivity to or from the public Internet are a classic example of the problems that Network Assurance programs uncover. This paper concludes that leaks can pose serious risk to the integrity of systems and data and are a risky exposure that organizations must mitigate on an ongoing basis. Lumeta Report: Why Leaks Matter

Discover and Manage Your Network Perimeter

If your network consists of more than a dozen routers or more than a few hundred hosts, chances are good that you do not know exactly where your network ends and other networks – such as the networks of your current and past business partners, suppliers, customers, outsourcers, divestitures and acquisitions – begin. You are not alone; most enterprises and government agencies are finding it increasingly difficult to determine and manage their ever-changing network perimeter. Lumeta Report: Discover and Manage Network Perimeter

Top 3 Undiscovered Vulnerabilities IPsonar Finds on a First Scan

Lumeta IPsonar uniquely fills a gap in situational awareness – by discovering and providing data on the entire network including all assets and connections, both known and previously “unknown.” Finding, identifying, and cataloging several hundred thousand devices across a global, secure infrastructure extremely rapidly and without disruption or triggering alarms on security tools is what IPsonar does best. IPsonar performs active probes of the address space, empirically discovering everything that’s on the network – not just the IP range that is supplied for scanning. Lumeta Report: Top 3 Undiscovered Vulnerabilities

Bringing Better Business Value to Mergers and Acquisitions

Performing IT due diligence is a critical step to ensure the success of mergers, acquisitions and divestitures. During M&A activities, businesses place an enormous amount of pressure on IT to deliver the large volume of required network changes on time and within budget. These pressures often lead IT managers to make decisions without all the facts, resulting in actions that impact the network’s infrastructure, availability, security, and compliance. Lumeta Report: M&A IT Due Diligence

The Significance of Common Criteria, Protection Profiles, and Lumeta IPsonar

The aim of the new Common Criteria is to ensure that commercial enterprise security products represent a good practice level of security, with a goal of secure-by-default products suitable for emerging threats. Standards like Common Criteria help ensure that security products are effective and trustworthy across international borders. Common Criteria certification is significant because it provides independent, standards-based verification of the security functions delivered by IT products. Certification provides customers the highest level of confidence that the solutions deliver on their security promises and meet global security standards. Lumeta Report: Common Criteria IPsonar (US)

Tech Talks (and technology video presentations)

Lumeta Tech Talk: 5 Steps to Network Situational Awareness – Overview
Lumeta Tech Talk: Network Situational Awareness – Step 1 (Validating The Address Space)
Lumeta Tech Talk: Network Situational Awareness – Step 2 (Validating The Network Edge)
Lumeta Tech Talk: Network Situational Awareness – Step 3 (Conduct Census)
Lumeta Tech Talk: Network Situational Awareness – Step 4 (ID Devices)
Lumeta Tech Talk: Network Situational Awareness – Step 5 (ID Vulnerabilities)
Lumeta Tech Talk: IPv6 Discovery
Video Presentation: Leak Path Identification
Video Presentation: Multi-Homed Hosts, Split Tunneling or devices with unauthorized bridging device identification