Home Powered by ECSO

Main navigation

  • Solutions
  • Vendors
  • Investors
  • Community
    • Announcements
    • ECSO Market Pulse Reports 2025
    • Events
    • Invest4Cyber Networking Nights
    • Articles
  • About
    • Memberships
    • Vision & mission
    • Powered by ECSO
    • Friends of the hive
  • Matrix™
  • Register

User account menu

  • Log in
Home Powered by ECSO

Main navigation

  • Solutions
  • Vendors
  • Investors
  • Community
    • Announcements
    • ECSO Market Pulse Reports 2025
    • Events
    • Invest4Cyber Networking Nights
    • Articles
  • About
    • Memberships
    • Vision & mission
    • Powered by ECSO
    • Friends of the hive
  • Matrix™
  • Register

User account menu

  • Log in
Home

Main navigation

  • Solutions
  • Vendors
  • Investors
  • Community
    • Announcements
    • ECSO Market Pulse Reports 2025
    • Events
    • Invest4Cyber Networking Nights
    • Articles
  • About
    • Memberships
    • Vision & mission
    • Powered by ECSO
    • Friends of the hive
  • Matrix™
  • Register

User account menu

  • Log in

Breadcrumb

  1. Home
  2. Solutions
solution image

Cyber Deception platform

by Pawel Rybczyk from Labyrinth Security Solutions
(0 reviews)
View portfolio Contact us
Taxonomy:
  • Detect
    • Detection Processes
      • Honeypots / Cybertraps

Description

Labyrinth creates the illusion of a real infrastructure vulnerability for an attacker. The solution is based on Points, a smart host simulation. Each part of the simulation environment reproduces the services and content of an actual network segment. The system consists of four components that interact with each other. The main components of the Platform are:

  • Admin VM is the main component. All collected information is sent to it for analysis. The console notifies the security team and sends the necessary data to third-party systems.

  • Worker - a host/virtual machine for deploying a set of Labyrinth network decoys (Points) on it. It can work in several VLANs simultaneously. Several Worker hosts can be connected to the same management console simultaneously. 

  • Points are intelligent hosts that mimic software services, content, routers, devices, etc. Points detect all malicious activities within the corporate network, providing complete coverage of all possible attack vectors. 

  • Seeder agents deployed on servers and workstations imitate the most attractive file artifacts for an attacker. By creating various decoy files, the agent directs attackers to network decoys (Points) through their contents. 

The Platform automatically deploys points (decoys) in the IT/OT network based on information about services and devices in the network environment. In addition, decoys can be deployed manually, providing users with a powerful tool to develop their unique deception platform based on their specific needs and best practices. The Labyrinth provokes an attacker to act and detects suspicious activity. As the attacker passes through the fake target infrastructure, the Platform captures all the details of the enemy. The security team receives information about the sources of threats, the tools used, the vulnerabilities exploited, and the attacker's behavior. At the same time, the entire real infrastructure continues to operate without any negative impact.

KEY CHARACTERISTICS:

  • Multiple types of decoys for IT/OT environments.

  • Easy to deploy and maintain.

  • No alert fatigues.

  • Fully virtualised (Microsoft Hyper-V, VMWare, KVM).

  • MSSP/SOC services ready with the multi-tenancy support.

  • Fair licensing scheme.

  • The 3rd party integrations: Splunk, IBM QRadar, CrowdStrike, Fortinet and more,

Gartner Peer Insights: click here

Additional resources: click here 

Let us know if you have any additional questions: info@labyrinth.tech

 

Thank you!

Labyrinth Team.

Solution properties

  • Cloud, SaaS, web-based
    On-premise Windows
    On-premise Linux
  • Market independent/agnostic (Means the solution overlaps all markets, and is linked to all)
  • System integrator(s)
    The vendor did not specify this data field

Summary on Pricing plans

  • Subscription (monthly/yearly)
    Custom pricing

Vendor overview

Labyrinth Security Solutions

Labyrinth Deception Platform has been developed by a team of experienced cybersecurity researchers and engineers. Our system is powered by unique threat detection technologies, our deception solution provides attackers with an illusion of real IT infrastructure vulnerabilities.

  • Partner(s)

Contact details

  • Founded in 2019
  • KRAKOWSKA 39A/1, 41-808 ZABRZE, POLAND
  • Poland
Visit the website Visit our website
cybersecurity made in europe

Solution details

  • Non-profit
    Small business
    Mid-size business
    Large enterprise
    Public administration
  • English
  • Polish
  • Ukrainian
  • The vendor did not specify this data field

Support services offered by the vendor ensuring the right implementation and functioning of the solution

Email/Help Desk
FAQs/Forum
Knowledge Base
Phone Support

Training services offered by the vendor enabling the end-user to use the solution

Documentation
In Person
Live Online
Videos
Webinars

Media

docment
docment
docment
docment

Ratings & reviews

This solution has not been reviewed yet.

Do you want to leave a rating?

Login or register to proceed

Login Register

Follow us

Subscribe to our newsletter


Footer menu

  • Contact
  • Data Privacy Policy
  • FAQ

Manage your cookie preferences 


 

European Cyber Security Organisation, asbl

Avenue des Arts 46, Brussels, 1000, Belgium | VAT: BE0656734936 - REG 656734936  
Copyright © 2024 Cyberhive ®: Discover solutions from Europe™ | Powered by ECSO, developed by Trust-IT Services srl