Talk to an expert

Lumifi ShieldVision™ 2.0

Lumifi's proprietary technology

Contextualize Every Security Alert 

ShieldVision™ empowers security teams to build use cases and response flows for SIEM, EDR, NDR technologies, and more. Out of the box, it includes more than 1,000 pieces of content including searches, automated response Threat Flows, and prebuilt reports. This enables endpoint, network, and cloud responses using specific queries to customize workflows for your individual business needs.

ShieldVision™ also grants users the ability to control alert noise granularly by implementing exclusions at a global or per-alert level, in addition to dynamic enrichment and exclusions in Threat Flow. 

ShieldVision™ 2.0 New Features

Investigate with repeatable clarity and precision using Composer

  • Design investigations once using Composer templates, leveraging hundreds of prebuilt queries, or use your own.
  • Templatize Composer investigations and run them ad-hoc, or as part of Threat Flow.
  • Rich export options, including omission of certain results, in-line visualizations, and reordering of individual Composer elements as you see fit.

Design, export, and modify reports

  • Address compliance needs with templatized reports that drive clear, presentable visualizations
  • On-demand support for custom visualizations and data relationships. Don’t see what you need? Let us build it for you.

MSP-ready, out of the box

  • Multi-tenant MSP dashboard with data relationships specifically designed for the MSP use case, aiding your team in understanding your clients’ activity from a single control plane.
  • Click-in functionality to see the platform as a client would, work investigations, and assist with configuration.
  • Leverage global visibility and access with multi-tenant content deployment, cross-client incident management, and threat hunting.
  • On-demand provisioning and client setup. 

Incident Management

  • Seamlessly interact with findings produced by ShieldVision, observe Lumifi’s actions and
    responses, and coordinate your team’s efforts.
  • Pull incident and event data directly into your ticketing system of choice via API and/or webhook.
  • Escalate existing or create new cases across all three Lumifi SOC Teams; Analysts, Content, and Engineering. 

A single, cohesive SaaS platform for SOC service and cybersecurity technology

  • Manage, detect, and respond to threats within a consumable, digestible interface
  • Automate common security tasks and tackle challenging orchestration use cases with ease
  • Configure endpoint security policies, log ingestion, and data integrations
  • Interact with Lumifi’s industry-leading SOC service across multiple teams

Fully customizable dashboards

  • Design, templatize, and modify dashboards for different audiences with a broad set of available visualizations.
  • See in real time the same metrics and data relationships available in the Report Designer.

Flexible means of data ingestion

  • "Ride-along”: retrieve alerts and other criteria-driven data snippets to form the basis for alerting, investigation, and response.
  • “Single-point”: Bulk ingestion of data directly into ShieldVision, enabling comprehensive data search and maximizing ShieldVision’s means of contextualization.
  • “Hybrid”: Combine ride-along and single-point, allowing ShieldVision to selectively query external services while storing other data sets of your choosing within ShieldVision itself. 

Lumifi Security Operations Center

  • Full SOC personnel, headquartered in Scottsdale, Arizona.
  • See for yourself – meet the team, visit with technical leadership, and understand how one of the most tenured players in the space operates on a day-to-day basis.

ShieldVision™ 2.0 Ingests Information From Anywhere & Any Time

ShieldVision™ draws its information from every data source in the security tech stack – including historical data. Our SOC analysts can query logs of security data from the past and observe how similar security events played out in previous scenarios. 

Conducting investigations of this depth can lead to any number of valuable insights: 

  • Is the security event part of a larger cyberattack? 
  • Have additional, undiscovered security incidents already occurred on your network? 
  • What type of response led to the best outcome for this type of event? 

 

Ready to get started?
We're here to help.

Connect with a professional solutions architect today for expert guidance and consultation
Talk to an expert

📣  New Webinar Alert! 

Q3: SOC Quarterly Threat Briefing

🗓️ Date: Oct. 30th, 2024
🕒 Time: 11 AM (PT)

Secure Your Spot!
Privacy PolicyTerms & ConditionsSitemapSafeHotline
magnifiercrossmenuchevron-down linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram