We review vendors based on rigorous testing and research but also take into account your feedback and our affiliate commission with providers. Some providers are owned by our parent company.
Learn more
vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.
Advertising Disclosure

vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.

Lumeta – Providing Complete Visibility and Real-time, Actionable Data

Eytan Morgenstern Technical Interviewer and Writer

Cyber security strategy requires that networks be protected from attacks from any number of sources and plenty of products are available that provide some level of protection – both device and network-based. But, how do we deal with unknown threats? How do we discover critical data that we don’t even know that we don’t know about?  The key, according to Pat Donnellan, CEO of Lumeta, is 100% accurate network and endpoint visibility in real-time.  Only by knowing everything that is happening on the network at every given moment, can network, endpoint and ultimately data integrity be protected.

Tell us about Lumeta.  How did you get involved in large-scale enterprise and government cyber security?

I’ve been involved with IT and network security for years, most recently as CEO of AEP Networks, a former Ireland-based startup that I led from its founding through four acquisitions.

Lumeta, a spinoff of Bell Labs, was initially a hardware-focused network compliance and visibility company. Since 2013, we’ve transformed into a virtual, subscription-based, security intelligence platform.

Our technology offers real-time, 100% accurate network visibility for federal government and enterprise markets.  On average, we find that compared to networks that don’t use our products, we are able increase visibility of the network and networked infrastructure by 40%. Our thesis is that in the next generation stack that is evolving, without a clear foundational understanding of your entire network and 100% visibility – your strategy is fundamentally is flawed.

Beyond network visibility, we also validate and monitor changes in network segmentation, which means that in real-time we expose unauthorized, leak paths between networks or to the Internet that should not have traffic going between them. Thus, for any service provider or contract manufacturer that needs to ensure separation between clients, for example Apple from Samsung, we can provide real-time, actionable data in order to correct lock down unauthorized communications and prevent any stray traffic or worse, malicious activity like talking to malware sites or data exfiltration.  We find that before implementation of our technology, about 70% of our clients have significant issues with leak paths.

Our products also come integrated  with a continuously updated threat intelligence library from Accenture iDefense and can also pull in other feeds.  This allows us to vector, in real-time a specific IP address on the specific network that has come on - highlight it and notify that a potential bad actor conversation is in process at that nanosecond and, in turn, alert a user directly or feed that information any or all the parts of the stack.

Large-scale network security is quite complex, how does Lumeta ensure that networks with hundreds of thousands, or even millions, of nodes are secure?

We operate on the network layer itself using technology that has active and passive listening capabilities that are processed through a highly efficient big data engine. That, combined with multiple methods for real-time  discovery of existing, new or removed devices anywhere in the infrastructure, builds a fast, accurate picture of what is going on in the network.

By correlating real-time patented active techniques and passive ‘listening’ to the network layer as well as ingesting netflow– that’s our ‘secret sauce’ - we can know details such as “this specific device came on to this specific segment of your network at this specific time and is now communicating to a bad known IP address.”  We can then immediately alert other security solutions, such as McAfee’s the ePolicy Orchestrator (ePO) to take action to manage and secure the device more effectively or decide to quarantine it to limit the impact of the threat.

Tell us a bit about your main product – Spectre.  How is it unique from other security and vulnerability assessment tools available on the market?

The security market is quite foggy, but it is clear that network visibility is a key factor in cyber security as evidenced by other scanning products such as Qualys or Skybox who are also putting the issue front and center. Increasingly, we are seeing that visibility, in real-time, is a mandatory requirement for the latest generation of cyber stacks that are now being installed.  The best way to see why we are unique is to look at the kind of clients we have that have implemented our technology into their cyber stack in 2017 and see the immense value provides over any other solution claiming visibility. – Lumeta Spectre has really come into its own this year.  I can’t give too many details here, of course, but for example:

  • One of the largest military operations in the world installed a combination of Spectre with McAfee ePO to be delivered as a service by a third party to their multi-million IP address installation worldwide. In that tender, which we won in March 2017, we were against 11 other competitors.
  • One of the largest intelligence agencies in the world.
  • One of the top five banks in the world.
  • Looking to sign 2 of the 3 top entertainment organizations by the end of the year.
  • Looking to sign 2 of the top 10 players in the US healthcare players.

We believe that no product unto itself can resolve the ‘holy grail’ of remediation and automation needed in cyber security.  We are one of a small number of companies that effectively contribute the visibility, the network scanning, and the real-time breach analytics.  With our unique level of network context, we are directly integrated with companies like Qualys, Rapid7, and McAfee to extend their ability to be more effective in hardening systems, and offering better protection against cyber threats without leaving a single device or endpoint open to compromise.   When you couple that with understanding changes in real-time, leak path detection, and applied security intelligence to reveal suspicious or malicious network activity, our foundational components provide a level of assurance and integrity which no other product can provide - and at any scale.

Lumeta provides what you call ‘Cyber Situational Awareness’ – can you explain what that means?

The term is fundamentally rooted in military language, referencing the 'theater of war.' In a defensive context, one must have comprehensive awareness of the surroundings. In our instance, this equates to maintaining real-time, in-depth knowledge of our network. As an entity, it's crucial for us to have immediate and context-sensitive information about our network at every nanosecond, because lacking that would hinder us from executing an effective strategy.

What are the top threats that Lumeta is seeing today in cyber security?

From our perspective, we see a number of threats or challenges.  The lack of visibility in the broader market is scary.  The lack of human capital to address those challenges and the reluctance, which is decreasing, to move to more automated solutions are also of concern.  Finally, there is still confusion in the market on who exactly does what.

When we walk into a meeting with a potential client, 7 out 10 cases we hear “we got this covered, we understand our network – so we don’t need you.”  Then, when we show a proof of concept of what we can do – it is just night and day.  If the average across all industries is 40% lack of visibility – that is a very significant challenge.

We tell them, “you told me you were covered – are you sure you are covered?”  And that opens up the conversation about visibility, about real-time versus continuous data and where they are in terms of heading towards remediation and automation.  Where are they in terms of the inevitability of the move into the cloud?  Where are they in terms of being open to a service provider model?  Those are the dynamics of the market.  You need to know what you already have and don’t have.

These unresolved challenges are leading to the rising success of ransomware, attacks on critical infrastructure, such as utiliites and manufacturing, and cloud-focused threats. It is where we come in to help out customers.

You list Professional Services prominently on their site. Is that a real revenue stream or a marketing tool?

No, it isn’t a marketing tool and to be honest, we need to be careful about what we are and what we aren’t.  We are not a professional services organization – we’re a product company. We have our hands full in terms of developing the product, executing it, etc.  Our professional services include providing proofs of concept and supporting partners as they come up to speed in terms of having their staff trained to deliver the service.

We review vendors based on rigorous testing and research but also take into account your feedback and our affiliate commission with providers. Some providers are owned by our parent company.
Learn more
vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.

About the Author

Eytan Morgenstern is a seasoned technology writer. He loves learning about new innovations, meeting the people behind them, and sharing their story.

Did you like this article? Rate it!
I hated it! I don't really like it It was ok Pretty good! Loved it!
out of 10 - Voted by users
Thank you for your feedback

Please, comment on how to improve this article. Your feedback matters!

Leave a comment

Sorry, links are not allowed in this field!

Name should contain at least 3 letters

The field content should not exceed 80 letters

Sorry, links are not allowed in this field!

Please enter a valid email address

Thanks for submitting a comment, %%name%%!

We check all comments within 48 hours to ensure they're real and not offensive. Feel free to share this article in the meantime.