Adlumin Features
Network Management (3)
Activity Monitoring
Based on 28 Adlumin reviews.
Documents the actions from endpoints within a network. Alerts users of incidents and abnormal activities and documents the access point.
Asset Management
20 reviewers of Adlumin have provided feedback on this feature.
Keeps records of each network asset and its activity. Discovers new assets accessing the network.
Log Management
As reported in 26 Adlumin reviews.
Provides security information and stores the data in a secure repository for reference.
Incident Management (3)
Event Management
As reported in 26 Adlumin reviews.
Alerts users of incidents and allows users to intervene manually or triggers an automated response.
Automated Response
Based on 24 Adlumin reviews.
Reduces time spent remedying issues manually. Resolves common network security incidents quickly.
Incident Reporting
26 reviewers of Adlumin have provided feedback on this feature.
Documents cases of abnormal activity and compromised systems.
Security Intelligence (4)
Threat Intelligence
Based on 27 Adlumin reviews.
Stores information related to common threats and how to resolve them once incidents occur.
Vulnerability Assessment
This feature was mentioned in 23 Adlumin reviews.
Analyzes your existing network and IT infrastructure to outline access points that can be easily compromised.
Advanced Analytics
25 reviewers of Adlumin have provided feedback on this feature.
Allows users to customize analytics with granulized metrics that are pertinent to your specific resources.
Data Examination
24 reviewers of Adlumin have provided feedback on this feature.
Allows users to search databases and incident logs to gain insights on vulnerabilities and incidents.
Analysis (4)
Continuous Analysis
13 reviewers of Adlumin have provided feedback on this feature.
Constantly monitors traffic and activity. Detects anomalies in functionality, user accessibility, traffic flows, and tampering.
Behavioral Analysis
13 reviewers of Adlumin have provided feedback on this feature.
Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns and fraud indicators.
Data Context
This feature was mentioned in 12 Adlumin reviews.
Provide insights into why trends are occurring and what issues could be related.
Activity Logging
12 reviewers of Adlumin have provided feedback on this feature.
Monitors, records, and logs both real-time and post-event activity.
Detection (3)
Anomaly Detection
As reported in 13 Adlumin reviews.
Constantly monitors activity related to user behavior and compares activity to benchmarked patterns.
Incident Alerts
12 reviewers of Adlumin have provided feedback on this feature.
Gives alerts when incidents arise. Some responses may be automated, but users will still be informed.
Activity Monitoring
As reported in 14 Adlumin reviews.
Monitors the actions from endpoints within a network. Alerts users of incidents and abnormal activities and documents the access point.
Risk Analysis (3)
Risk Scoring
Based on 16 Adlumin reviews.
Identifies and scores potential network security risks, vulnerabilities, and compliance impacts of attacks and breaches.
Reporting
As reported in 16 Adlumin reviews.
Creates reports outlining log activity and relevant metrics.
Risk-Prioritization
15 reviewers of Adlumin have provided feedback on this feature.
Allows for vulnerability ranking by customized risk and threat priorities.
Vulnerability Assesment (4)
Vulnerability Scanning
15 reviewers of Adlumin have provided feedback on this feature.
Analyzes your existing network and IT infrastructure to outline access points that can be easily compromised.
Vulnerability Intelligence
15 reviewers of Adlumin have provided feedback on this feature.
Stores information related to common vulnerabilities and how to resolve them once incidents occur.
Contextual Data
This feature was mentioned in 13 Adlumin reviews.
Identify risk data attributes such as description, category, owner, or hierarchy.
Dashboards
Based on 15 Adlumin reviews.
Provides the ability to create custom reporting dashboards to further explore vulnerability and risk data.
Automation (4)
Automated Remediation
Based on 14 Adlumin reviews.
Reduces time spent remedying issues manually. Resolves common network security incidents quickly.
Workflow Automation
Based on 12 Adlumin reviews.
Streamlines the flow of work processes by establishing triggers and alerts that notify and route information to the appropriate people when their action is required within the compensation process.
Security Testing
Based on 13 Adlumin reviews.
Allows users to perfrom hands-on live simulations and penetration tests.
Test Automation
Based on 11 Adlumin reviews.
Runs pre-scripted vulnerability scans and security tests without requiring manual work.
Assessment (3)
Continuous Assessment
The abillity to automate assessment or have assesments scheduled and delivered continuously.
Phishing Assessment
Sends users phishing emails, voicemails, messages through SMS, Slack, Teams, etc. to test user's threat-identification abilities.
Baselining
Assess current state of user security training, prior to training, which can be used to track performance and improvement.
Training (3)
Content Library
Provides users with a pre-built library of useable security-related informational content.
Interactive Training
Engages users through content in the form of interactive applications, games, and modules.
Gamification
Contains gamification tools, including but not limited to badges, leaderboards, and point scoring.
Administration (5)
Risk-scoring
Calculates risk based on user behavior, baselines, and improvements.
Customization
Customizable solution so administers can adjust content to industry, position, etc.
White-Labeling
Allows users to implement their own branding throughout the platform.
Reporting
Provides analytics tools that reveal important business metrics and track progress.
AI-generated Content
Uses generative AI to create training scenarios, deepfake simulations, or tailored modules.
Detection & Response (4)
Response Automation
Reduces time spent remedying issues manually. Resolves common network security incidents quickly.
Threat Hunting
Facilitates the proactive search for emerging threats as they target servers, endpoints, and networks.
Rule-Based Detection
Allows administrators to set rules specified to detect issues related to issues such as sensitive data misuse, system misconfiguration, lateral movement, and/or non-compliance.
Real-Time Detection
Constantly monitors system to detect anomalies in real time.
Management (3)
Extensibility
Allows for customized support for hybrid environments
Workflow Automation
Streamline the flow of work processes by establishing triggers and alerts that notify and route information to the appropriate people when their action is required within the compensation process.
Unified Visibility
Provides all-encompassing display and analysis of environments, resources, traffic, and activity across networks.
Analytics (3)
Threat Intelligence
Stores information related to common threats and how to resolve them once incidents occur.
Artificial Intelligence & Machine Learning
Facilitates Artificial Intelligence (AI) such as Machine Learning (ML) to enable data ingestion, performance suggestions, and traffic analysis.
Data Collection
Collects information from multiple sources to cross reference and build contextual to correlate intelligence.
Platform Features (7)
24/7 support
As reported in 20 Adlumin reviews.
Provides 24/7 support to customers with technical questions.
Proactive report alerts
As reported in 19 Adlumin reviews.
Proactively sends reports or alerts to customers.
Application control
As reported in 18 Adlumin reviews.
Lets users detect and block applications that are not a security threat.
Proactive threat hunting
As reported in 18 Adlumin reviews.
Proactively hunts threats.
Rapid response time
This feature was mentioned in 20 Adlumin reviews.
Provides rapid reponse time to cyber threats.
Customizeable reports
This feature was mentioned in 18 Adlumin reviews.
Provides the ability to customize reports.
Managed Services
Offers MDR as a service.
Automation Capabilities (3)
Automated remediation
This feature was mentioned in 20 Adlumin reviews.
Ability to automatically neutralize or eliminate active vulnerabilities.
Automated investigation
19 reviewers of Adlumin have provided feedback on this feature.
Ability to automatically investigate networks and endpoints for threats.
AI Agents
Utilizes AI agents for detection and response tasks.
Agentic AI - Security Information and Event Management (SIEM) (4)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Multi-step Planning
Ability to break down and plan multi-step processes
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Decision Making
Makes informed choices based on available data and objectives
Agentic AI - User and Entity Behavior Analytics (UEBA) (4)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Multi-step Planning
Ability to break down and plan multi-step processes
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Decision Making
Makes informed choices based on available data and objectives
Agentic AI - Extended Detection and Response (XDR) Platforms (3)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Decision Making
Makes informed choices based on available data and objectives
Agentic AI - AWS Marketplace (3)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Multi-step Planning
Ability to break down and plan multi-step processes
Cross-system Integration
Works across multiple software systems or databases
Services - Extended Detection and Response (XDR) (1)
Managed Services
Offers managed detection and response services.





