Lumos

Lumos

Software Development

Silicon Valley, California 7,636 followers

The Unified Access Platform to manage all access to apps and data.

About us

IT and Security teams worldwide use Lumos to decrease technology spending, optimize access management processes, and strengthen their security posture. Companies like GitHub, MongoDB, and Major League Baseball use Lumos to manage software, access and vendors in one place.

Website
www.lumos.com
Industry
Software Development
Company size
51-200 employees
Headquarters
Silicon Valley, California
Type
Privately Held
Founded
2020
Specialties
Identity Governance, SaaS Management, Privileged Access Management, Software Asset Management, and Identity and Access Management

Products

Locations

Employees at Lumos

Updates

  • View organization page for Lumos, graphic

    7,636 followers

    There’s a reason companies deal with shadow IT, and it’s because users aren’t getting what they need when they need it. Employees may find sanctioned tools cumbersome or inconvenient, so they default to using something that they’re familiar with and like. Or, the tools they need simply don’t exist in the sanctioned IT portfolio. Users may also venture outside of company-sanctioned apps because access requests take too long. If it’s thwarting their productivity, odds are they’ll go rogue and start shopping so they can keep doing their jobs. Check out ways to combat this growing issue! https://buff.ly/3HxuK71

    Designing a Program that Mitigates the Risks and Costs Associated with Shadow IT

    Designing a Program that Mitigates the Risks and Costs Associated with Shadow IT

    lumos.com

  • View organization page for Lumos, graphic

    7,636 followers

    Besides delivering consistency and efficiency, automating routine tasks frees your team to cut through the noise and handle actual IT issues. In practice, today’s IT automation software can take a lot off your team’s plate, like access requests, provisioning users, deflecting tickets from your IT help desk to AI, and entitlement-level configurations – all while protecting access to sensitive data. Automated user provisioning in and of itself can save your team hours every day. It’s like the tankless water heater of your whole system – keeping things comfortable without constantly worrying about leaks. https://buff.ly/3LmDQ8y

    It’s Time For An IT Infrastructure Remodel

    It’s Time For An IT Infrastructure Remodel

    lumos.com

  • View organization page for Lumos, graphic

    7,636 followers

    Navigating the path to getting your IT project approved can be challenging. Here are some key strategies to enhance your proposal's chances: 1. Understand Stakeholder Needs: Align your project goals with the strategic objectives of your stakeholders. 2. Build a Solid Business Case: Clearly demonstrate the ROI and benefits your project will deliver. 3. Communicate Effectively: Use clear, concise, and compelling language to articulate your vision. 4. Showcase Expertise: Highlight your team's skills and past successes to build confidence in your ability to deliver. Check out this insightful article from Lumos: https://buff.ly/4cyDdVh

    Get Your (Risky) Innovative IT Approach Approved and Well-Funded

    Get Your (Risky) Innovative IT Approach Approved and Well-Funded

    lumos.com

  • View organization page for Lumos, graphic

    7,636 followers

    🌈✨ Celebrating Pride Month at Lumos! ✨🌈 This June, we marked Pride Month with an incredible Lip Sync for Your Life competition (inspired by the queen herself, RuPaul). Our team shined brightly and brought amazing energy to the event! 🎤💃🕺 We also sported our "Shine with Pride" hats, a reminder to celebrate our authentic selves every day. At Lumos, diversity strengthens us, and we proudly support the LGBTQ community. Thank you to everyone who made this month special. Let's keep the Pride spirit alive all year! 🌟❤️🧡💛💚💙💜 #PrideMonth #ShineWithPride #DiversityAndInclusion #TeamLumos #Pride2024

    • No alternative text description for this image
  • View organization page for Lumos, graphic

    7,636 followers

    Check out the latest post from our Founder and CEO, Andrej Safundzic. Full post below, here's a snippet: "My belief is that security problems are almost always hygiene problems, and hygiene problems always have inefficiencies. To measure ROI, you can measure inefficiencies as a second-order signal for potential cybersecurity problems. Leadership understands inefficiencies more than they understand risk, and it’s super easy to translate that for them. For example, if you are spending a lot of time cleaning up your RBAC roles for your onboarding & offboarding workflows or if you are spending too much time on user access reviews, it means employees generally have too much access, which means you have an insider threat problem. What do you think?"

    View profile for Andrej Safundzic, graphic

    Co-Founder, CEO, Alchemist @ Lumos

    The funny thing about security is that CISOs never really feel pressure to show ROI, and the only measurement that seems to matter from the top is "Have we been breached?" I always asked myself why that is. First of all, it seems impossible to prove actual ROI in cybersecurity. This reminded me of Ian Grigg's essay “The Market for Silver Bullets” [link in comments], which gives an answer to why ROI is hard to prove in security. Grigg argues that both cybersecurity buyers and sellers lack sufficient information to make rational decisions, making the market inefficient and prone to hype over substance. The result is a market flooded with quick fixes that promise much but deliver little. As shown in the Matrix of Markets in Imperfect Information (see picture), we can compare how information asymmetry informs how solutions are built and delivered: - Efficient Goods: Both buyer and seller have sufficient information (e.g., buying everyday consumer products like new laptops with lots of ratings and open specs). - Lemons: Seller knows more than the buyer (e.g., used cars where the seller knows the car's history and potential issues). - Limes: Buyer knows more than the seller (e.g., health insurance where the consumer knows their health status better than the insurance provider). - Silver Bullets: Neither party has sufficient information (e.g., cybersecurity solutions promising unverifiable results). Unlike other sectors, where performance can be tested and quantified, cybersecurity deals with preventing unknown and ever-evolving threats. How do you measure the effectiveness of something that prevents incidents that may never occur? Now, what should we do about it? Grigg argues that we need more transparency, which makes sense. An example I appreciate is from James Berthoty, a security practitioner who created Latio.tech to showcase different security solutions and their impact. However, I think there needs to be some back-of-the-envelope calculation that you can run around ROI and make it easy to understand for leadership. My belief is that security problems are almost always hygiene problems, and hygiene problems always have inefficiencies. To measure ROI, you can measure inefficiencies as a second-order signal for potential cybersecurity problems. Leadership understands inefficiencies more than they understand risk, and it’s super easy to translate that for them. For example, if you are spending a lot of time cleaning up your RBAC roles for your onboarding & offboarding workflows or if you are spending too much time on user access reviews, it means employees generally have too much access, which means you have an insider threat problem. What do you think?

    • The Matrix of Markets in Imperfect Information
  • View organization page for Lumos, graphic

    7,636 followers

    Tristan Cary, Sr. Enterprise Applications Manager at Roku, shares best practices on how IT and Security teams can collaborate well: IT can achieve their goal of providing frictionless experiences to the end user and Security can achieve their goal of ensuring users don't have over-privileged access. Check out the clip! #ITandSecurity #LumosAppStore https://buff.ly/3VBWMFX

    Webinar Clip - Tristan Cary from Roku: How IT and Security Can Best Work Together

    Webinar Clip - Tristan Cary from Roku: How IT and Security Can Best Work Together

    lumos.com

Similar pages

Browse jobs

Funding

Lumos 2 total rounds

Last Round

Series B

US$ 35.0M

See more info on crunchbase