Complete protection. In transit and at rest.
Built with cybersecurity and customer privacy in mind, Lumana features secure by default and fully encrypted architecture.


Storage
Video remains on-premises, stored locally with AES 256 encryption.
AES 256

Network
No open ports. Data transfer is secured via HTTPS encryption with TLS v1.2.
AES 256, TLS v1.2

Cloud
Data is always accessible and secured, in transit and at rest, with AES 256.
AES 256
Application security
Fortified
APIs
Unique organization-based API keys ensure only authenticated and authorized users can access the system.
Vulnerability management
Lumana is routinely pen tested and features automatic firmware updates to stay ahead of emerging threats.
Single sign-on (SSO)
Unified credentials across applications streamline access management and enhance overall system security.
Integrated audit logs
Easily monitor how users interact with Lumana and see when activities occur and what specific actions have taken place.
Redundant cloud backup
Keep footage secure and inaccessible from physical and external threats by automatically storing video data in the cloud for up to 365 days,
Multi-factor authentication
Lumana supports Google Authenticator, offering robust Multi-Factor Authentication to protect against unauthorized access.
Role-based access control
Customizable user permissions and organizational roles provide the appropriate levels of access to locations and cameras.
External storage
Utilize external storage options, such as S3 compliance objects, to securely extend backup retention.
Network security
No port-forwarding
No port forwarding is required, limiting your exposure to open ports, security risks, unauthorized access, and cyber attacks.
User identity authentication
System users are automatically authenticated via Okta, a lead Identity and Access Management (IAM) provider, to verify system access.
HTTPS in transit
All network traffic operates via HTTPS, guaranteeing encryption, authentication, and data integrity during transmission.
Independent local network
Lumana Core enables physical separation of your camera's local network from the internet, utilizing dual NIC configuration.
Compliance

NDAA Compliant
Lumana cameras comply with the US 2019 National Defense Authorization Act (Section 889), which prohibits governing bodies from purchasing video communication equipment from specific manufacturers.

SOC-2 Type 2
Advantage Partners, an independent auditor, has confirmed that Lumana's design and controls in protecting customer data meet the requirements outlined in the AICPA 2017 Trust Services Criteria for Security.
HIPAA Compliant
Health Insurance Portability and Accountability Act safeguards the privacy, security, and integrity of individuals' health information, ensuring it is properly protected and confidential.