{"id":11021,"date":"2020-08-25T15:44:38","date_gmt":"2020-08-25T15:44:38","guid":{"rendered":"https:\/\/ermprotect.com\/?page_id=11021"},"modified":"2022-07-15T11:25:35","modified_gmt":"2022-07-15T16:25:35","slug":"lumu-insights","status":"publish","type":"page","link":"https:\/\/uln.ucp.mybluehost.me\/website_c8c6d12e\/lumu-insights\/","title":{"rendered":"Lumu Insights"},"content":{"rendered":"<div id=\"pl-11021\"  class=\"panel-layout\" ><div id=\"pg-11021-0\"  class=\"panel-grid panel-has-style\" ><div class=\"siteorigin-panels-stretch panel-row-style panel-row-style-for-11021-0\" data-stretch-type=\"full\" ><div id=\"pgc-11021-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-11021-0-0-0\" class=\"so-panel widget widget_sow-image panel-first-child widgetopts-SO\" data-index=\"0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-image so-widget-sow-image-default-e4c2d9f6c920-11021\"\n\t\t\t\n\t\t>\n<div class=\"sow-image-container\">\n\t\t<img \n\tsrc=\"https:\/\/uln.ucp.mybluehost.me\/website_c8c6d12e\/wp-content\/uploads\/2020\/08\/Asset-1-1.png\" width=\"167\" height=\"80\" sizes=\"(max-width: 167px) 100vw, 167px\" title=\"Asset 1\" alt=\"\" \t\tclass=\"so-widget-image\"\/>\n\t<\/div>\n\n<\/div><\/div><div id=\"panel-11021-0-0-1\" class=\"so-panel widget widget_sow-headline widgetopts-SO\" data-index=\"1\" ><div class=\"panel-widget-style panel-widget-style-for-11021-0-0-1\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-headline so-widget-sow-headline-default-47ca92edf927-11021\"\n\t\t\t\n\t\t><div class=\"sow-headline-container \">\n\t\t\t\t\t\t\t<h1 class=\"sow-headline\">\n\t\t\t\t\t\tContinuous Compromise Assessment Tool\t\t\t\t\t\t<\/h1>\n\t\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"sow-sub-headline\">\n\t\t\t\t\t\tUse Your Own Network Metadata to Detect Incidents\t\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t<\/div>\n<\/div><\/div><\/div><div id=\"panel-11021-0-0-2\" class=\"so-panel widget widget_sow-button panel-last-child widgetopts-SO\" data-index=\"2\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-button so-widget-sow-button-flat-ea0b707a3fd0-11021\"\n\t\t\t\n\t\t><div class=\"ow-button-base ow-button-align-center\"\n>\n\t\t\t<a\n\t\t\t\t\thref=\"https:\/\/calendly.com\/jmiller-125\/lumu-demo\"\n\t\t\t\t\tclass=\"sowb-button ow-icon-placement-left ow-button-hover\" \t>\n\t\t<span>\n\t\t\t\n\t\t\tREQUEST A DEMO\t\t<\/span>\n\t\t\t<\/a>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><div id=\"pg-11021-1\"  class=\"panel-grid panel-has-style\" ><div class=\"siteorigin-panels-stretch panel-row-style panel-row-style-for-11021-1\" data-stretch-type=\"full\" ><div id=\"pgc-11021-1-0\"  class=\"panel-grid-cell\" ><div class=\"lumucol1 panel-cell-style panel-cell-style-for-11021-1-0\" ><div id=\"panel-11021-1-0-0\" class=\"so-panel widget widget_sow-headline panel-first-child widgetopts-SO\" data-index=\"3\" ><div class=\"panel-widget-style panel-widget-style-for-11021-1-0-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-headline so-widget-sow-headline-default-74c425f7944d-11021\"\n\t\t\t\n\t\t><div class=\"sow-headline-container \">\n\t\t\t\t\t\t\t<h1 class=\"sow-headline\">\n\t\t\t\t\t\tAI-Powered Compromise Data in Real-Time\t\t\t\t\t\t<\/h1>\n\t\t\t\t\t\t<\/div>\n<\/div><\/div><\/div><div id=\"panel-11021-1-0-1\" class=\"so-panel widget widget_sow-editor panel-last-child widgetopts-SO\" data-index=\"4\" ><div class=\"panel-widget-style panel-widget-style-for-11021-1-0-1\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p>Lumu Technologies has developed an AI-powered Continuous Compromise Assessment tool that systematically collects and analyzes a wide range of network metadata sources for con\ufb01rmed indications of compromise. It provides immediate, actionable intelligence on compromises by geography, network segments, devices, domains, critical asset and more. <strong>We believe in the product so much we've signed on as a reseller.<\/strong><\/p>\n<p>Lumu\u2019s approach rethinks the security paradigm, one that has tried to keep attackers out of key enterprise networking assets. Instead, Lumu makes the assumption that cybercriminals are already inside the enterprise\u2019s environments and creates a Continuous Compromise Assessment model: collecting, normalizing, and analyzing network metadata, including DNS, Net\ufb02ows, Proxy and Firewall Access Logs, and Spambox. <strong>This continuous data assessment flags compromises so organizations can react in real-time.<\/strong><\/p>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><div id=\"pgc-11021-1-1\"  class=\"panel-grid-cell\" ><div class=\"lumucol1 panel-cell-style panel-cell-style-for-11021-1-1\" ><div id=\"panel-11021-1-1-0\" class=\"so-panel widget widget_sow-headline panel-first-child widgetopts-SO\" data-index=\"5\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-headline so-widget-sow-headline-default-f1ce9e56129a-11021\"\n\t\t\t\n\t\t><div class=\"sow-headline-container \">\n\t\t\t\t\t\t\t<h1 class=\"sow-headline\">\n\t\t\t\t\t\tKey Facts\t\t\t\t\t\t<\/h1>\n\t\t\t\t\t\t<\/div>\n<\/div><\/div><div id=\"panel-11021-1-1-1\" class=\"so-panel widget widget_sow-editor panel-last-child widgetopts-SO\" data-index=\"6\" ><div class=\"panel-widget-style panel-widget-style-for-11021-1-1-1\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<ul>\n<li><strong>Data breaches have surged 88% from 2014 to 2019<\/strong><\/li>\n<p><\/p>\n<li><strong>Cybersecurity spending is projected to have grown by 57% from 2014 to 2019<\/strong><\/li>\n<p><\/p>\n<li><strong>In 2019, an attacker avoided detection for an average of 206 days<\/strong><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><div id=\"pg-11021-2\"  class=\"panel-grid panel-has-style\" ><div class=\"siteorigin-panels-stretch panel-row-style panel-row-style-for-11021-2\" data-stretch-type=\"full\" ><div id=\"pgc-11021-2-0\"  class=\"panel-grid-cell\" ><div id=\"panel-11021-2-0-0\" class=\"so-panel widget widget_sow-headline panel-first-child widgetopts-SO\" data-index=\"7\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-headline so-widget-sow-headline-default-c701543743b1-11021\"\n\t\t\t\n\t\t><div class=\"sow-headline-container \">\n\t\t\t\t\t\t\t<h1 class=\"sow-headline\">\n\t\t\t\t\t\tThe Answer is in Your Own Network Metadata\t\t\t\t\t\t<\/h1>\n\t\t\t\t\t\t<\/div>\n<\/div><\/div><div id=\"panel-11021-2-0-1\" class=\"so-panel widget widget_sow-editor widgetopts-SO\" data-index=\"8\" ><div class=\"panel-widget-style panel-widget-style-for-11021-2-0-1\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p style=\"text-align: center;\">All attacks have a common denominator: <strong>the threat actor must use the network to compromise an organization.<\/strong> Therefore they leave behind a trail of evidence that Lumu follows by looking at a comprehensive array of metadata sources.<\/p>\n<\/div>\n<\/div><\/div><\/div><div id=\"panel-11021-2-0-2\" class=\"so-panel widget widget_sow-features panel-last-child widgetopts-SO\" data-index=\"9\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-features so-widget-sow-features-default-cdd83edbd545-11021\"\n\t\t\t\n\t\t><ul\n\tclass=\"sow-features-list\n\tsow-features-responsive\">\n\n\t\t\t<li\n\t\t\tclass=\"sow-features-feature sow-icon-container-position-right\"\n\t\t\tstyle=\"display: flex; flex-direction: row; width: calc(50% - 25px);\"\n\t\t>\n\t\t\t\n\t\t\t\t\t\t<div\t\t\t\tclass=\"sow-icon-container sow-container-round\"\n\t\t\t\tstyle=\"color: #ededed; \"\n\t\t\t\t\n\t\t\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\t\t<div class=\"sow-icon-image\" style=\"background-image: url(https:\/\/uln.ucp.mybluehost.me\/website_c8c6d12e\/wp-content\/uploads\/2020\/08\/Asset-10.png); font-size: 84px\"><\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t<div class=\"textwidget\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h5 class=\"sow-features-feature-title\">\n\t\t\t\t\t\tDNS Queries\t\t\t\t\t<\/h5>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"sow-features-feature-text\">\n\t\t\t\t\t<p>When a device is compromised, it will resolve a domain that belongs to adversarial infrastructure, offering concrete compromise evidence.<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/li>\n\n\t\t\t<li\n\t\t\tclass=\"sow-features-feature sow-icon-container-position-right\"\n\t\t\tstyle=\"display: flex; flex-direction: row; width: calc(50% - 25px);\"\n\t\t>\n\t\t\t\n\t\t\t\t\t\t<div\t\t\t\tclass=\"sow-icon-container sow-container-round\"\n\t\t\t\tstyle=\"color: #ededed; \"\n\t\t\t\t\n\t\t\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\t\t<div class=\"sow-icon-image\" style=\"background-image: url(https:\/\/uln.ucp.mybluehost.me\/website_c8c6d12e\/wp-content\/uploads\/2020\/08\/Asset-9.png); font-size: 84px\"><\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t<div class=\"textwidget\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h5 class=\"sow-features-feature-title\">\n\t\t\t\t\t\tProxy and Firewall Logs\t\t\t\t\t<\/h5>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"sow-features-feature-text\">\n\t\t\t\t\t<p>If the attack does not use DNS infrastructure, it\u2019s only other option is to connect directly to an IP address.<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/li>\n\n\t\t\t<li\n\t\t\tclass=\"sow-features-feature sow-icon-container-position-right\"\n\t\t\tstyle=\"display: flex; flex-direction: row; width: calc(50% - 25px);\"\n\t\t>\n\t\t\t\n\t\t\t\t\t\t<div\t\t\t\tclass=\"sow-icon-container sow-container-round\"\n\t\t\t\tstyle=\"color: #ededed; \"\n\t\t\t\t\n\t\t\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\t\t<div class=\"sow-icon-image\" style=\"background-image: url(https:\/\/uln.ucp.mybluehost.me\/website_c8c6d12e\/wp-content\/uploads\/2020\/08\/Asset-8.png); font-size: 84px\"><\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t<div class=\"textwidget\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h5 class=\"sow-features-feature-title\">\n\t\t\t\t\t\tNetwork Flows\t\t\t\t\t<\/h5>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"sow-features-feature-text\">\n\t\t\t\t\t<p>Network \ufb02ows provide insightful information into an adversary\u2019s objective and attempts to move laterally.<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/li>\n\n\t\t\t<li\n\t\t\tclass=\"sow-features-feature sow-icon-container-position-right\"\n\t\t\tstyle=\"display: flex; flex-direction: row; width: calc(50% - 25px);\"\n\t\t>\n\t\t\t\n\t\t\t\t\t\t<div\t\t\t\tclass=\"sow-icon-container sow-container-round\"\n\t\t\t\tstyle=\"color: #ededed; \"\n\t\t\t\t\n\t\t\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\t\t<div class=\"sow-icon-image\" style=\"background-image: url(https:\/\/uln.ucp.mybluehost.me\/website_c8c6d12e\/wp-content\/uploads\/2020\/08\/Asset-7.png); font-size: 84px\"><\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t<div class=\"textwidget\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h5 class=\"sow-features-feature-title\">\n\t\t\t\t\t\tSpambox\t\t\t\t\t<\/h5>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"sow-features-feature-text\">\n\t\t\t\t\t<p>Blocking spam is good, but analyzing it is better because you can discover who is targeting your organization, how they are doing it, and how successful they are.<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/li>\n\n\t<\/ul>\n<\/div><\/div><\/div><\/div><\/div><div id=\"pg-11021-3\"  class=\"panel-grid panel-has-style\" ><div class=\"siteorigin-panels-stretch panel-row-style panel-row-style-for-11021-3\" data-stretch-type=\"full\" ><div id=\"pgc-11021-3-0\"  class=\"panel-grid-cell\" ><div id=\"panel-11021-3-0-0\" class=\"so-panel widget widget_sow-headline panel-first-child widgetopts-SO\" data-index=\"10\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-headline so-widget-sow-headline-default-c701543743b1-11021\"\n\t\t\t\n\t\t><div class=\"sow-headline-container \">\n\t\t\t\t\t\t\t<h1 class=\"sow-headline\">\n\t\t\t\t\t\tThe Illumination Process - How it Works\t\t\t\t\t\t<\/h1>\n\t\t\t\t\t\t<\/div>\n<\/div><\/div><div id=\"panel-11021-3-0-1\" class=\"so-panel widget widget_sow-editor widgetopts-SO\" data-index=\"11\" ><div class=\"panel-widget-style panel-widget-style-for-11021-3-0-1\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p style=\"text-align: center;\">Lumu\u2019s Illumination Process is the core enabler of Continuous Compromise Assessment that correlates network metadata with known IoCs and AI, and results in actionable, con\ufb01rmed compromise evidence.<\/p>\n<\/div>\n<\/div><\/div><\/div><div id=\"panel-11021-3-0-2\" class=\"so-panel widget widget_sow-features panel-last-child widgetopts-SO\" data-index=\"12\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-features so-widget-sow-features-default-e302e603d76b-11021\"\n\t\t\t\n\t\t><ul\n\tclass=\"sow-features-list\n\tsow-features-responsive\">\n\n\t\t\t<li\n\t\t\tclass=\"sow-features-feature sow-icon-container-position-right\"\n\t\t\tstyle=\"display: flex; flex-direction: row; width: calc(33.333% - 25px);\"\n\t\t>\n\t\t\t\n\t\t\t\t\t\t<div\t\t\t\tclass=\"sow-icon-container sow-container-round\"\n\t\t\t\tstyle=\"color: #ffffff; \"\n\t\t\t\t\n\t\t\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\t\t<div class=\"sow-icon-image\" style=\"background-image: url(https:\/\/uln.ucp.mybluehost.me\/website_c8c6d12e\/wp-content\/uploads\/2020\/08\/Asset-6.png); font-size: 84px\"><\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t<div class=\"textwidget\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h5 class=\"sow-features-feature-title\">\n\t\t\t\t\t\tConfirmed Compromise Intelligence\t\t\t\t\t<\/h5>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"sow-features-feature-text\">\n\t\t\t\t\t<p>Detailed, real-time compromise intelligence on how enterprise assets are communicating with adversary infrastructure.<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/li>\n\n\t\t\t<li\n\t\t\tclass=\"sow-features-feature sow-icon-container-position-right\"\n\t\t\tstyle=\"display: flex; flex-direction: row; width: calc(33.333% - 25px);\"\n\t\t>\n\t\t\t\n\t\t\t\t\t\t<div\t\t\t\tclass=\"sow-icon-container sow-container-round\"\n\t\t\t\tstyle=\"color: #ffffff; \"\n\t\t\t\t\n\t\t\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\t\t<div class=\"sow-icon-image\" style=\"background-image: url(https:\/\/uln.ucp.mybluehost.me\/website_c8c6d12e\/wp-content\/uploads\/2020\/08\/Asset-1.png); font-size: 84px\"><\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t<div class=\"textwidget\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h5 class=\"sow-features-feature-title\">\n\t\t\t\t\t\tCompromise Context\t\t\t\t\t<\/h5>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"sow-features-feature-text\">\n\t\t\t\t\t<p>Robust context around con\ufb01rmed compromise incidents that enables teams to enact the precise response in a timely manner.<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/li>\n\n\t\t\t<li\n\t\t\tclass=\"sow-features-feature sow-icon-container-position-right\"\n\t\t\tstyle=\"display: flex; flex-direction: row; width: calc(33.333% - 25px);\"\n\t\t>\n\t\t\t\n\t\t\t\t\t\t<div\t\t\t\tclass=\"sow-icon-container sow-container-round\"\n\t\t\t\tstyle=\"color: #ffffff; \"\n\t\t\t\t\n\t\t\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\t\t<div class=\"sow-icon-image\" style=\"background-image: url(https:\/\/uln.ucp.mybluehost.me\/website_c8c6d12e\/wp-content\/uploads\/2020\/08\/Asset-4.png); font-size: 84px\"><\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t<div class=\"textwidget\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h5 class=\"sow-features-feature-title\">\n\t\t\t\t\t\tCompromise Radar\t\t\t\t\t<\/h5>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"sow-features-feature-text\">\n\t\t\t\t\t<p>Powerful visualization tool that reveals attack patterns, conditions, and behavior.<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/li>\n\n\t\t\t<li\n\t\t\tclass=\"sow-features-feature sow-icon-container-position-right\"\n\t\t\tstyle=\"display: flex; flex-direction: row; width: calc(33.333% - 25px);\"\n\t\t>\n\t\t\t\n\t\t\t\t\t\t<div\t\t\t\tclass=\"sow-icon-container sow-container-round\"\n\t\t\t\tstyle=\"color: #ffffff; \"\n\t\t\t\t\n\t\t\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\t\t<div class=\"sow-icon-image\" style=\"background-image: url(https:\/\/uln.ucp.mybluehost.me\/website_c8c6d12e\/wp-content\/uploads\/2020\/08\/Asset-2.png); font-size: 84px\"><\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t<div class=\"textwidget\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h5 class=\"sow-features-feature-title\">\n\t\t\t\t\t\tSpambox Report\t\t\t\t\t<\/h5>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"sow-features-feature-text\">\n\t\t\t\t\t<p>Unprecedented intelligence on who is targeting your organization, how they are doing it, and how successful they are..<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/li>\n\n\t\t\t<li\n\t\t\tclass=\"sow-features-feature sow-icon-container-position-right\"\n\t\t\tstyle=\"display: flex; flex-direction: row; width: calc(33.333% - 25px);\"\n\t\t>\n\t\t\t\n\t\t\t\t\t\t<div\t\t\t\tclass=\"sow-icon-container sow-container-round\"\n\t\t\t\tstyle=\"color: #ffffff; \"\n\t\t\t\t\n\t\t\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\t\t<div class=\"sow-icon-image\" style=\"background-image: url(https:\/\/uln.ucp.mybluehost.me\/website_c8c6d12e\/wp-content\/uploads\/2020\/08\/Asset-3.png); font-size: 84px\"><\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t<div class=\"textwidget\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h5 class=\"sow-features-feature-title\">\n\t\t\t\t\t\tCloud-based Delivery\t\t\t\t\t<\/h5>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"sow-features-feature-text\">\n\t\t\t\t\t<p>Cloud-based model allows for accelerated deployment and immediate positive ROI.<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/li>\n\n\t\t\t<li\n\t\t\tclass=\"sow-features-feature sow-icon-container-position-right\"\n\t\t\tstyle=\"display: flex; flex-direction: row; width: calc(33.333% - 25px);\"\n\t\t>\n\t\t\t\n\t\t\t\t\t\t<div\t\t\t\tclass=\"sow-icon-container sow-container-round\"\n\t\t\t\tstyle=\"color: #ffffff; \"\n\t\t\t\t\n\t\t\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\t\t<div class=\"sow-icon-image\" style=\"background-image: url(https:\/\/uln.ucp.mybluehost.me\/website_c8c6d12e\/wp-content\/uploads\/2020\/08\/Asset-5.png); font-size: 84px\"><\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t<div class=\"textwidget\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h5 class=\"sow-features-feature-title\">\n\t\t\t\t\t\tPlayback\u2122\t\t\t\t\t<\/h5>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"sow-features-feature-text\">\n\t\t\t\t\t<p>Patent-pending capability that reviews up to 2 years of network metadata traf\ufb01c and compares it to new known IOCs.<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/li>\n\n\t<\/ul>\n<\/div><\/div><\/div><\/div><\/div><div id=\"pg-11021-4\"  class=\"panel-grid panel-has-style\" ><div class=\"siteorigin-panels-stretch panel-row-style panel-row-style-for-11021-4\" data-stretch-type=\"full\" ><div id=\"pgc-11021-4-0\"  class=\"panel-grid-cell\" ><div class=\"panel-cell-style panel-cell-style-for-11021-4-0\" ><div id=\"panel-11021-4-0-0\" class=\"so-panel widget widget_sow-image panel-first-child panel-last-child widgetopts-SO\" data-index=\"13\" ><div class=\"panel-widget-style panel-widget-style-for-11021-4-0-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-image so-widget-sow-image-default-c67d20f9f743-11021\"\n\t\t\t\n\t\t>\n<div class=\"sow-image-container\">\n\t\t<img \n\tsrc=\"https:\/\/uln.ucp.mybluehost.me\/website_c8c6d12e\/wp-content\/uploads\/2020\/08\/mbm-300x185.jpg\" width=\"300\" height=\"185\" srcset=\"https:\/\/uln.ucp.mybluehost.me\/website_c8c6d12e\/wp-content\/uploads\/2020\/08\/mbm-300x185.jpg 300w, https:\/\/uln.ucp.mybluehost.me\/website_c8c6d12e\/wp-content\/uploads\/2020\/08\/mbm-1024x633.jpg 1024w, https:\/\/uln.ucp.mybluehost.me\/website_c8c6d12e\/wp-content\/uploads\/2020\/08\/mbm-768x475.jpg 768w, https:\/\/uln.ucp.mybluehost.me\/website_c8c6d12e\/wp-content\/uploads\/2020\/08\/mbm-582x360.jpg 582w, https:\/\/uln.ucp.mybluehost.me\/website_c8c6d12e\/wp-content\/uploads\/2020\/08\/mbm-240x148.jpg 240w, https:\/\/uln.ucp.mybluehost.me\/website_c8c6d12e\/wp-content\/uploads\/2020\/08\/mbm-324x200.jpg 324w, https:\/\/uln.ucp.mybluehost.me\/website_c8c6d12e\/wp-content\/uploads\/2020\/08\/mbm.jpg 1286w\" sizes=\"(max-width: 300px) 100vw, 300px\" alt=\"\" \t\tclass=\"so-widget-image\"\/>\n\t<\/div>\n\n<\/div><\/div><\/div><\/div><\/div><div id=\"pgc-11021-4-1\"  class=\"panel-grid-cell\" ><div id=\"panel-11021-4-1-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child widgetopts-SO\" data-index=\"14\" ><div class=\"panel-widget-style panel-widget-style-for-11021-4-1-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p>For a <strong>FREE<\/strong> demonstration of <strong>Lumu Insights<\/strong>, simply pick a date on this calendar: <a href=\"https:\/\/calendly.com\/jmiller-125\/lumu-demo\">https:\/\/calendly.com\/jmiller-125\/lumu-demo<\/a><\/p>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Lumu Technologies has developed an AI-powered Continuous Compromise Assessment tool that systematically collects and analyzes a wide range of network metadata sources for con\ufb01rmed indications of compromise. It provides immediate, actionable intelligence on compromises by geography, network segments, devices, domains, critical asset and more. We believe in the product so much we&#8217;ve signed on as [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-11021","page","type-page","status-publish","hentry","post"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/uln.ucp.mybluehost.me\/website_c8c6d12e\/wp-json\/wp\/v2\/pages\/11021","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/uln.ucp.mybluehost.me\/website_c8c6d12e\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/uln.ucp.mybluehost.me\/website_c8c6d12e\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/uln.ucp.mybluehost.me\/website_c8c6d12e\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/uln.ucp.mybluehost.me\/website_c8c6d12e\/wp-json\/wp\/v2\/comments?post=11021"}],"version-history":[{"count":0,"href":"https:\/\/uln.ucp.mybluehost.me\/website_c8c6d12e\/wp-json\/wp\/v2\/pages\/11021\/revisions"}],"wp:attachment":[{"href":"https:\/\/uln.ucp.mybluehost.me\/website_c8c6d12e\/wp-json\/wp\/v2\/media?parent=11021"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}