Laserfiche WebLink
<br />©2025 Lumifi Cyber, Inc. All rights reserved. <br />PRIVATE - Controlled by Lumifi Cyber <br /> <br />4/18 <br />PRIVATE - Controlled by Lumifi Cyber <br />SERVICE DESCRIPTION <br />Lumifi Cyber’s Cybersecurity-as-a-Service provides a comprehensive set of cybersecurity services for organizations. <br />This document outlines LUMIFI’s Managed Detection & Response (MDR), where LUMIFI monitors customer <br />environments for threats and provides notification & response if threats are detected. Additional add-on services are <br />also described in this document, such as Log Retention (LR) and Continuous Vulnerability Identification (CVI). A <br />full listing of Customer’s in-scope services is listed on the Statement of Service. Professional Services work will be <br />detailed in a separate Scope of Work. <br /> <br />Lumifi Cyber’s MDR service is built to both monitor customer’s existing security products, along with complimenting <br />those products with additional services such as LUMIFI-supplied Collector(s), Virtual Sensor(s) and a 24x7 SOC. The <br />in-scope Log Sources, Products, and Services that LUMIFI will monitor as part of the MDR service for the Customer <br />are documented in the Integration List. The level of services that LUMIFI can provide depends both on the product <br />capabilities that the customer is licensed for (i.e. Microsoft license level, licensed 3rd-party Endpoint Detection and <br />Response (EDR) capabilities) and what LUMIFI’s service is set up to support. <br /> <br />Lumifi Cyber’s Collector installed on LUMIFI owned and managed hardware allows LUMIFI to monitor network traffic <br />for on-premises environments. The Collector includes an intrusion detection system to monitor for threats, allows <br />Customer to transfer syslogs and Windows events to LUMIFI, along with providing continuous packet capture for <br />LUMIFI to review throughout the MDR service. <br /> <br />Lumifi Cyber’s Virtual Sensor for deployment on Customer-owned and -managed hypervisors allows LUMIFI to <br />monitor network traffic for on-premises networks without deploying new LUMIFI hardware. The Virtual Sensor, <br />which comes as a virtual machine image includes an intrusion detection system, deep packet inspection and a threat <br />sandbox to monitor for threats and allows Customer to transfer syslogs and Windows events to LUMIFI. <br /> <br />Lumifi Cyber’s Linux Server Sensor for deployment on Customer-owned and -managed Linux Servers allows LUMIFI <br />to monitor Linux Servers without deploying new LUMIFI hardware (NOTE: the Linux Server Sensor does not ship Linux <br />logs). The Linux Server Sensor, an agent installed by the Customer, allows LUMIFI to monitor process information, <br />command execution, files, and file events. The Linux Server Sensor converts that information to metadata that then <br />correlates traffic, processes, users, and commands for sec urity, DDoS, and breach attempt detections. <br /> <br />Lumifi Cyber’s Log Retention is an additional service designed and meant for long -term, secure, and compliant log <br />storage where LUMIFI retains, encrypts, and hashes customer logs sent to LUMIFI’s on -premises Collector(s). <br />Customers can then request a time-bounded extract of their logs by submitting a request to LUMIFI. <br /> <br />LUMIFI’s Continuous Vulnerability Identification service is an additional service that runs on the Collector which <br />utilizes an industry-standard network active scanning product to identify system vulnerabilities. LUMIFI provides <br />reports and dashboards for customers to manage their prioritized vulnerabilities. <br /> <br />The customer journey starts with onboarding where LUMIFI and Customer work together to integrate products to <br />activate MDR & additional services. Lumifi Cyber will monitor the in-scope products and respond to threats as they are <br />detected, following the Rapid Quarantine Playbooks agreed with Customer where relevant, and, where applicable, <br />providing response playbooks to Customer based on industry best practices. <br />