Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Lumu Introduces Lightweight Solution to Improve Security for Remote Workforce

New Lumu Agent for Windows Works Silently to Measure Remote Worker Compromise Levels in Real Time

Lumu, creators of the Continuous Compromise Assessment cybersecurity model, announced the launch of the Lumu Agent for Windows, a lightweight software built for remote workers in mind, that measures user device’s compromise levels in real time. Once installed on an end user’s machine, the Lumu Agent silently and persistently runs in the background, collecting network metadata which is then correlated and analyzed by Lumu to provide the most complete compromise visibility available today.

According to a March 2020 survey conducted by Gartner, 88% of organizations worldwide have either mandated or encouraged their employees to w************* due to the global pandemic with many organizations having since announced they will continue to allow employees to work remotely even after the pandemic has ended. Since millions of employees began logging in from home, opportunistic cyber criminals have been aggressively targeting remote employees with ransomware and spearphishing campaigns, which when successful can provide them with unfettered access to the corporate network. With cloud technology and adoption skyrocketing over the years, fear of a cloud data security breach has increased significantly just in the past two years, with 53% of IT professionals citing it as a top security concern in 2020.

Recommended AI News: Open Systems Hires New Security Experts as It Increases Its Share of the Growing Enterprise Market

Related Posts
1 of 40,645

“WFH has become incredibly popular, and many organizations have realized the efficiencies of this method of work, rethinking offices altogether. Unfortunately, enterprises are not the only ones taking advantage of this modality — cybercriminals have found a path to least resistance with remote workers and cyberthreats are an all-time-high,” said Ricardo Villadiego, founder and CEO of Lumu. “This innovation comes amid the loss of attack visibility resulting from employees working from outside the perimeter and the need to swiftly identify compromises and minimize lateral movement to high value assets. The Lumu Agent will make it easy for security teams to get a unified view of all of the endpoint devices connected to their network and understand whether any of these devices have been compromised.”

Recommended AI News: Avaya Appoints Rob Theis to Its Board of Directors

The Lumu Agent for Windows feeds directly into Lumu Insights, a cloud-based solution that collects and standardizes metadata from across the network, including DNS queries, Network Flows, access logs from perimeter proxies and firewalls, and spam box filters, and then applies its patent-pending Illumination Process to correlate threat intelligence from these disparate data sources to isolate confirmed points of compromise. With Lumu’s new Windows Agent, customers will realize some of the following benefits:

  • Extended Visibility Across the Distributed Network: IT and security teams can gain critical visibility to any machine or endpoint on which the Lumu Agent is running, effectively closing off any potential back doors a threat actor might use to compromise other network resources
  • Unified & Streamlined Deployment: The Lumu Agent can be quickly and easily deployed to an entire population of users and system administrators can control the installation groups and status of each agent via the Lumu Portal
  • Ensure Cloud Application Security: As more employees use a mix of personal and corporate owned devices to access cloud applications from home, the Lumu Agent provides an additional layer of secure access to provide assurance that user credentials and data are not being abused.
  • Map & Isolate Compromised Assets: By applying advanced network correlation with other network metadata sources, compromised assets can be quickly identified, mapped, and isolated in order to accelerate the mitigation of a compromised device.

Recommended AI News: AiThority Interview With Bob Lord, SVP Of Cognitive Applications At IBM

1 Comment
  1. Scrap Copper wire says

    Copper wire scrap suppliers Exporting Copper scrap Metal scrap reclamation and utilization
    Copper cable export documentation, Metal scrap reclamation yard, Copper recycling expertise

Leave A Reply

Your email address will not be published.