LUMA is not a security product that runs in the background. It is a forensic investigation tool. Connect a device, run the analysis, and get a clear answer: was this phone attacked - today, last week, or a year ago.
Real-time security products protect going forward. But they can't tell you if a device was already compromised before they were installed. Zero-click exploits leave no visible trace. Stalkerware hides as system services. State-sponsored tools erase their own logs.
LUMA works differently. It performs a forensic examination of the device's history - crash logs, sensor activity, network behavior, permissions, and process data - and produces an evidence-based report showing whether the device was attacked, when, and by what.
LUMA scans the device's forensic history against known indicators of the world's most advanced surveillance platforms. If a device was compromised last month or last year, the traces are still there. LUMA finds them.
NSO Group (Israel)
Cytrox / Intellexa (EU)
Candiru (Israel)
QuaDream (Israel)
RCS Lab (Italy)
Unknown Origin
Serbian Intelligence
Wintego (Israel)
APT41 (China)
600+ known apps
15,000+ indicators of compromise from Amnesty Tech, MVT Project, and specialized intelligence sources. Updated regularly.
Your clients already trust you to sweep their offices. Now you can answer the question they always ask: "What about my phone?"
Add mobile threat scanning to your existing TSCM services. Clients expect it.
If you can run a USB cable, you can run LUMA. The AI handles the forensics.
Hand your client a branded forensic report instead of a verbal "looks clean".
iPhone and Android in the same tool. One workflow for both platforms.
A single compromised phone can expose board-level discussions, M&A plans, and client data. Your security products protect going forward, but can they tell you what already happened? LUMA performs a forensic check and gives you a clear answer.
Stop outsourcing device checks. Your IT security team can run LUMA independently.
All analysis runs locally. Diagnostic logs never leave your machine. Zero cloud dependency.
From device connection to full report in under 30 minutes. No waiting for lab results.
600+ commercial surveillance apps in the database. Domestic threats are real too.
When your threat model includes Pegasus, Predator, and nation-state actors, you need to know if a device was targeted. LUMA performs deep forensic analysis offline, in air-gapped networks, and produces court-grade evidence of what happened.
Enterprise edition runs entirely on your infrastructure. Nothing leaves the building.
Hebrew, English, Russian, Spanish, Arabic. Ready for international operations.
Detects if the device was previously acquired by Cellebrite, GrayKey, or similar tools.
Deploy to field teams under managed licenses. Central oversight, distributed operation.
LUMA is not always-on software. It is used at specific moments when you need to know: was this device compromised?
Scan executive phones before sensitive board meetings or negotiations. Verify the device was not compromised before the meeting.
Verify personal devices are clean before granting access to corporate resources. Baseline the device state.
Verify a source's phone is clean before accepting sensitive communications. Document the check with a forensic report.
Suspected stalkerware on a client's device. Run a scan, generate a court-admissible report, provide evidence.
Post-trip scan after visiting high-risk countries. Detect proximity attacks, rogue WiFi, and new surveillance indicators.
Data leak suspected. Scan all relevant devices. Get a structured, comparable report for each one.
Contact us for a live demo, pricing, or deployment consultation.
Contact Sales Back to LUMA