Ready to Try?

Welcome to the Lucidum Data Group

(LDG)-Your Data Beard’s Best Friend!

Got data questions? Fear not! The LDG has all the answers, waiting just beneath the glorious folds of our metaphorical beards.

Your journey into data wisdom begins the moment you connect Lucidum through one of our 750+ read-only API connectors. Yes, you heard that right – 750! That’s more connections than a hipster barbershop!

ASK THE LDG

Choose Your LDG Below

Risk and Vulnerabilities

Which critical CVE are on the most assets?

Which assets are positive for this specific, newly exploited CVE?

Which departments have the riskiest assets?

Can I see a consolidated view of vulnerabilities across my estate?

Do my production servers have known exploited vulns?

How can I track security on my crown jewels?

which online assets have the greates risk by adjusted departmental business impact?

Which Known Exploited Vulnerabilities (KEVs) can I fix?

Are there Zero-Day vulnerabilities in my environment?

Which managers are responsible for their teams' insecure assets?

What are the most common risk factors in my environment?

How can I check for TOR nodes in my environment?

Security and IT Operations

How can I audit the encryption status of all assets in my environment?

How can I check for unscanned assets in my environment?

What are all my assets with toxic combos?

Who is accountable for managing my cloud multi-cloud environments cost?

How can I view all versions of an operating system in my environment?

How can I view a list of all software in my environment?

When do my certificates expire?

How can I track changes on my assets?

How many images am I storing in my Docker repos?

How can I locate all servers missing endpoint agents

Which assets are running end-of-life operating systems?

Where are my coverage gaps or whitespace?

How to focus on just Windows server builds?

Find all Apple devices seen in the past month

Which assets have Docker repos?

Which assets in my environment have changed recently?

Which versions of an application or OS are running in my environment?

Which laptop models do we need to replace?

Which ISPs are accessing my environment?

Do I have assets without IP addresses?

How can I view assets in each department?

How many container images are in my environment?

What are the asset types in my environment?

Find all firewalls in your environment

Find all mobile assets in your environment

Do I have assets that are exposing open ports to the Internet?

Are there servers that need patches?

Which of our sales laptops are not encrypted?

Are there people accessing the network from ITAR-restricted countries?

How can I identify a user if I know the IP that was in use?

How can I find all assets with a CVSS score greater than 8?

Are people from ITAR-restricted countries using known TTPs

Cloud

What are the CIDR subnets in my AWS environment?

How can I locate all cloud assets?

How can I ensure that mandatory tags are being added to my cloud instances?

Locate all EC2 instances launched from a problematic AMI

Locate all EC2 instances launched from a public AMI

Are we still building from ancient images?

Are any EC2 instances using the default security group?

Are we balanced across availability zones?

Do I have public-facing cloud storage?

What are the cloud storage assets in my environment?

What are the cloud compute assets in my environment?

How can I see the size of each cloud compute instance in my environment?

What are the AWS Security Groups in my environment and how many assets in each?

What are the CIDR Blocks in my AWS environment?

Identities

Which assets are assigned to which user?

How can I view users in each department

Who is not using multi-factor authentication and who do they work for?

How can I see all identities in my environment?

How can I see all deactivated identities in my environment

How can I see a list of new users?

Do I have unauthorized users in my environment?

Are there zombie users offboarded in directory services but active in other solutions we use?

Who is not using identity and access management?

After a merger or acquisition, are there Zombie users in my environment.

Which users have privileged access rights?

Which users in my environment have changed recently?

How can I view all service accounts in my environment?

What are the deactivated users in my environment?

Find users who have not reset their passwords

Compliance

Which are the most common compliance violations?

Is replication enabled on all of our critical object stores?

Is logging enabled on all of our critical object stores?

Is versioning enabled on all of our critical object stores?

Has my code scanner picked up any problems?

Application

Which assets are running a vulnerable version of some package/application?