The Labyrinth solution was developed by a team of experienced cybersecurity researchers and engineers. Based on unique deception technologies, it gives attackers the illusion of real vulnerabilities in IT infrastructure. Through so-called Points, intelligent simulation hosts, each component of the imaginary environment mimics the services and content of real network segments.
Labyrinth provokes the attacker to act while simultaneously learning suspicious activity. Experienced specialists help construct the best “labyrinth” for complex environments. Its features provide advanced capabilities for detecting targeted attacks, BOTNETs, 0-day attacks, and malicious internal users.
Points mimic special software services, content, routers, IoT devices, etc. Each point detects all targeted and suspicious activities. While the cybercriminal traverses the false infrastructure of their target attack, the Labyrinth platform captures all the details of their actions.
This way, the organization receives information about threat sources, tools used, as well as the vulnerabilities exploited and attacker’s activities. Meanwhile, the actual infrastructure continues to operate without any impact on its performance.
All information collected by Labyrinth is sent to the Management Console for analysis, after which necessary data is sent to the incident response platform. The incident response platform in turn checks the metadata with external databases and accelerates incident response through integrations with third-party solutions that automate isolation, blocking, and threat search.