Security?First.

From how we approach infrastructure to how we onboard and off-board employees. We protect your data at every layer.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Lumos Deploys Within Minutes Without Agents

By connecting with native Office 365 and Google Workspace APIs, you receive a source of truth for all your applications. No agents, network access, or other end-user installs are required.

SOC 2

We’re SOC 2 Type II Compliant

Security

We take the security of your data seriously. By being SOC 2 compliant, we can assure you that we have strict controls in place to protect your information and keep it out of the wrong hands.

Trust

By achieving SOC 2 compliance, we are showing our commitment to maintaining the highest level of security and integrity for your sensitive information.

Peace of Mind

By achieving SOC 2 compliance, we are showing our commitment to maintaining the highest level of security and integrity for your sensitive information.

Encrypted With The Highest Standards

We encrypt at transit and at rest with secure protocols, including AES256 and TLS1.2+. Our encryption keys are based on AWS's Key Management Service. We rotate them on a periodic basis and protect the creation, storage, retrieval, and destruction of secrets.

We Keep Our Networks Safe

Our infrastructure is deployed on a secure Virtual Private Cloud (VPC). We maintain compute and storage infrastructure in private-only subnets and control access through IP and port-based firewalls. Endpoint monitoring software on employee workstations and servers ensure that we keep our infrastructure secure and your data safe.

Penetration Testing

We regularly work with third party firms to identify and remediate security vulnerabilities.

Security Controls

We continuously monitor the operation of our security controls. This ensures we stay up to date and follow best practices (e.g. MFA).

Employee Training

We require security training from all employees. Developers complete a secure coding training which includes the OWASP Top 10 vulnerabilities.

mel reyes

Mel Reyes

VP of Information Security & Technology at Scopely

“Our goal with Lumos is to make our employees even more productive. At the same time, we’ve dramatically stepped up our compliance and security. Only Lumos can do that!”

Learn More About Mel
arrow right icon
lumos logo

Govern Your Apps With One Platform

Easily manage SaaS spend, privileged access, and compliance.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Request a demo in under a minute.